Towards Cross-Border Authorization in European eID Federations

Identification, authentication, and authorization are essential processes in various areas of applications, where access to sensitive data needs to be protected and regulated. To achieve this, usually identity-management systems are put into place, where an identity provider manages digital identities and handles the identification and authentication process for a service provider, which hosts the protected data and regulates access to this information. Due to increasing mobility of citizens and cross-border public administration, interoperability across the border of national electronic identity management systems in the European eID landscape becomes more and more important. While there were several European initiatives ongoing for achieving cross-border identification and authentication in the last couple of years, there was actually no initiative to enable cross-border authorization in Europe. Hence, in this paper we propose an advanced architectural design towards cross-border authorization in Europe. This proposed solution extends the existing cross-border eID federation implementations, which are actually in place across Europe, to bring up also cross-border authorization support into these European eID infrastructures. The proposed architecture follows a modular and plug-in based approach to ease the integration into various heterogeneous eID infrastructures, which are actually deployed in European countries. We illustrate the practical applicability of the proposed architecture by implementing an Authorization Gateway for the Austrian eID infrastructure. This Authorization Gateway meets all national legal and technical requirements to transfer authorization information across borders.

[1]  Bernd Zwattendorfer,et al.  A Modular and Flexible Identity Management Architecture for National eID Solutions , 2015, WEBIST.

[2]  Carlos E. Rubio-Medrano,et al.  Federated Access Management for Collaborative Network Environments: Framework and Case Study , 2015, SACMAT.

[3]  Thomas Lenz A Modular and Flexible Attribute Mapping Service to Meet National Requirements in Cross-Border eID Federations , 2015 .

[4]  Tim Moses,et al.  EXtensible Access Control Markup Language (XACML) version 1 , 2003 .

[5]  Jerry den Hartog,et al.  SAFAX – An Extensible Authorization Service for Cloud Environments , 2015, Front. ICT.

[6]  Xin Jin,et al.  A role-based administration model for attributes , 2012, SRAS '12.

[7]  Rhona K. M. Smith Directive 2006/123/EC of the European Parliament and of the Council of 12 December 2006 , 2015 .

[8]  Norbert Ritter,et al.  On the Move to Meaningful Internet Systems: OTM 2013 Conferences , 2013, Lecture Notes in Computer Science.

[9]  Reinhard Posch,et al.  Security architecture of the Austrian citizen card concept , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[10]  Markus Franke,et al.  Federated Authentication and Authorization: A Case Study , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.

[11]  David F. Ferraiolo,et al.  Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .

[12]  Herbert Leitold,et al.  Middleware Architecture for Cross-Border Identification and Authentication , 2013 .

[13]  Xin Jin,et al.  A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.