Training for developers of X-Road interfaces

Slides:



Advertisements
Similar presentations
Introduction to Web Services Protocols. Talk titledate2 Communication and standards Efficient (or indeed any) communication is dependent on a shared vocabulary.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
UDDI v3.0 (Universal Description, Discovery and Integration)
SOAP & Security IEEE Computer Society Utah Chapter Hilarie Orman - Purple Streak Development Tolga Acar - Novell, Inc. October 24, 2002.
SOAP.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Secure Electronic Transaction (SET)
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
X-Road – Estonian Interoperability Platform
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Chapter 21 Distributed System Security Copyright © 2008.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Exercises for Chapter 9: Web Services.
Module 11: Securing a Microsoft ASP.NET Web Application.
Copyright © 2013 Curt Hill SOAP Protocol for exchanging data and Enabling Web Services.
EbXML Conference Ministry of Informatics
Digital Signatures and Digital Certificates Monil Adhikari.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Presented by : Piero Milani ( InfoCamere - Italy)Piero Milani InfoCamere - Italy VCD Signature & VCD Verification strategy as seen by InfoCamere ( WP1.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Training for developers of X-Road interfaces
Practical part: Testing X-Road dataservice
Architecture Review 10/11/2004
Module 6 Practical part: Creation of X-Road dataservice and client based on WSDL (.NET platform) Name Date.
Practical part: Creation of WSDL file of X-Road dataservice
Efficient and secure transborder exchange of patient data
Training for developers of X-Road interfaces
GrubTruck (iOS Food Truck App)
Module Overview Installing and Configuring a Network Policy Server
Sabri Kızanlık Ural Emekçi
WEB SERVICES From Chapter 19 of Distributed Systems Concepts and Design,4th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison.
Module 6 Practical part: Creation of X-Road dataservice and client based on WSDL (on Java platform) Name Date.
Cryptography and Network Security
Training for developers of X-Road interfaces
e-Health Platform End 2 End encryption
Configuring and Troubleshooting Routing and Remote Access
Module 8: Securing Network Traffic by Using IPSec and Certificates
Living in a Network Centric World
Living in a Network Centric World
Estonian e-Governance best practices and cooperation with UN Ingmar Vali Centre of Registers and Information Systems Estonia Who am I, where I am from:
Introduction of X-Road knowledge materials
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
Secure Electronic Transaction (SET) University of Windsor
Living in a Network Centric World
Training for developers of X-Road interfaces
IS4680 Security Auditing for Compliance
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
Multi-party Authentication in Web Services
Digital Certificates and X.509
X-Road as a Platform to Exchange MyData
Training for developers of X-Road interfaces
Dashboard eHealth services: actual mockup
Module 8: Securing Network Traffic by Using IPSec and Certificates
WEB SERVICES From Chapter 19, Distributed Systems
National Trust Platform
Presentation transcript:

Training for developers of X-Road interfaces Name Date

X-Road: what, why and for whom? X-Road provides to the members means for secure data exchange Using public internet Using data services (web services) Independent of the platform and architecture of the information system of a member Universality and IT security

Functioning of X-Road from the dataservice developer’s perspective Members are divided into providers of dataservices and users of dataservices Each member must pass the following stages: Affiliation of membership Description of dataservices and granting access rights Data exchange Long-term validation of transaction

Affiliation For development of dataservices, affiliation is required with X-Road development environment, where RIA is providing trust services

Development of dataservices and access rights Provider of the dataservice develops and describes the X-Road dataservice for provision. User of dataservice develops the necessary client application for the dataservice. User of dataservice requests access rights to the necessary dataservice. Provider of dataservice grants to other members access rights for using the dataservice.

Data exchange Drafting and signing a SOAP message, using OCSP validation (user) Creation of encrypted channel and transmission of message Verification of e-stamp and addition of body of SOAP message to message log Processing of messages in the information system of the provider Signature of response in the security server of the provider Sending response and closing the channel Verification of response signature and use of data

Technologies used in data exchange

Long-term validation of transaction Timestamping of messages Input to central monitoring (metainformation)

Security of X-Road Security is ensured by: Distributed architecture Security servers Standard technologies A member must ensure that nothing happens to the message between the security server and information system Confidentiality Availability Integrity

Distribution of X-Road Decentralised control Direct communication between members X-Road Center does not interfere with communication Maintains freedom of members Ensures authenticity of members

X-Road Center does not interfere with communication Universal membership Freedom of choice Direct communication

Role of X-Road Center Registration of members and verification of conformity User support (questions related to the installation of a security server, administration and organisational processes) Monitoring the ecosystem Supervision over members Organisation of the provision of trust services

Benefit of X-Road for the state Overview of the entire ecosystem Overview of communication between the parties Universality Improvement of ecosystem Saving resources

Development of X-Road through versions X-Road version Primary (and supported) version of message protocol Stage of e-state Main reasons for new version Version 1.0 (2001-2002) 1.0 First 40–50 e-services, predecessor of state portal www.eesti.ee, first ID cards Version 2.0 (2002-2003) 2.0 (1.0) XML-RPC → SOAP, WSDL Appearance of SOAP protocol Version 3.0 (2003-2004) 400–500 e-services Various updates: MS Active Directory-based user administration in MISP, etc. Version 4.0 (2005-2009) Over 40 million requests annually Focus on security (log encrypting option, etc.), RIHA Version 5.0 (2009-2017) 3.1 (3.0, 2.0) Over 2800 e-services Adoption of new technological developments, change in WSDL style (RPC/Encoded→Document/Literal wrapped), MISP2, new cryptoalgorithms Version 6.0 (2015- ...) 4.0 Cooperation with Finland Adoption of e-stamp to ensure integrity of messages. The need to get rid of legacy. The need to bring data exchange into conformity with the Digital Signatures Act

Main differences between X-Road versions 5 and 6: Message exchange Digital stamp added to message in security server (e-stamp) conforms to the Electronic Identification and Trust Services for Electronic Transactions Act No Yes Generation and preservation of evidential value In cooperation between security server and central server Security server ensures evidential value Message log Text file Database and ASiC-E containers in file system Message protocol 2.0, 3.0, 3.1 4.0 Digitas stamp/E-stamp verification capability In central server Through a verifier component installed with the security server

Main differences between X-Road versions 5 and 6: Description of SOAP profile Message header Changes related to hierarchical identifier: identifier of subsystem (security server client) and service identifier Message body There are no obligatory additional requirements in the content of messages. Version 6.0 has no obligation to use ‘request’ and ‘response’ elements or to duplicate request message in a response message. Namespace of messages is not fixed.

Main differences between X-Road versions 5 and 6: Rights and certificates Membership Differentiation of users and providers of service Members are organizations which affiliate just once. Member identifier is hierarchical and includes token of X-Road instance, information about member class (private, public) and registry code of authority. Service rights/access rights Database (e.g. ‘xkogu’) grants access rights to authorities Access rights are administered on the level of subsystem. Each subsystem is bound to X-Road member.  Subsystem Subsystem uses signature certificate of sub-authority Subsystem uses an e-stamp certificate of X-Road members Security server identifier unique identifier independent of the address and certificate of the security server  Certificates issued by RIA Qualified trust service provider

Main differences between X-Road versions 5 and 6: trust services Consumption of trust services Security server does not perform OCSP and timestamp requests Security server performs OCSP and timestamp requests at least with frequency specified in security policy Asynchronous services Supported Not supported

Main differences between X-Road versions 5 and 6: Other functionality Encoding service Supported Not supported International universality Support of several interfacing components

Thank You! First name Surname firstname.surname@amet.ee The training materials for developers of X-Road interfaces have been compiled with funding from the structural funds support scheme “Raising Public Awareness about the Information Society” of the European Regional Development Fund.