Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Used documentation

Cookbook/ materialsVersionLocation
Identity & Authorization Management (I.AM) - Overview1.0https://www.ehealth.fgov.be/ehealthplatform/file/view/c87f7d093e56ff1054c73d6aae09e0bb?filename=ehealth_i.am_-_overv
Identity & Authorization Management (I.AM) - Identity Provider (IDP)1.0https://www.ehealth.fgov.be/ehealthplatform/fr/data/file/view/d43784683d86392e68f1a95b860f721170f30c7b?name=ehealth_i.am_-_idp_v1.0.pdf
CSAM Youtube channel-https://www.youtube.com/channel/UCzMGudd9xdMeGjYpbpjsXFw
Gestion de clés numériques sur CSAM-https://iamapps.belgium.be/sma/generalinfo?redirectUrl=%2Fsma
S'identifier sur un smartphone ou une tablette avec un code de sécurité via une application-

Widget Connector
urlhttps://www.youtube.com/watch?v=2W3SA6t7T9c

itsme video-

Widget Connector
urlhttp://youtube.com/watch?v=yadk2bw0l0I

Gestion de clés numériques sur CSAM-https://iamapps.belgium.be/sma/generalinfo?redirectUrl=%2Fsma

General information

In the figure below, we provide an overview about the interaction between the different services of the e-health platform involved in the IAM. It is noteworthy that the presented architecture is dedicated to the WebSSO solution. 

Image ModifiedMobile

...

application supporting the TOTP protocols

There are several mobile applications available that generate a unique time-based security code with which the user can authenticate him/herself. For instance, the following applications support the TOTP protocol:

...


Basic flow

FlowSpecification








Image Added


Use case ID

ATH-UC-07-BF

Use case name

Authentication via TOTP

Actors

  • Citizen

  • Healthcare giver
  • Representative of an institution

Short Description

This use case denotes the authentication of a user via TOTP.


1 (High)

Must have: The system must implement this goal/ assumption to be accepted.

Pre-Conditions

  • The user has already an account

  • The user has:

  • an eID card

  • a PIN code of his/her eID card

  • a wireless card reader
      • a username and a password

      • a smartphone with  a TOTP-based mobile application to get a security code

    Post-Conditions

    • The user is authenticated

    • The user has access to the services of the mobile application

    Steps (basic flow)

    0

    The user access to the WebSSO application interface to authenticate him/herself and choose
    the option eID
    to connect via a security code via mobile app (TOTP)

    1

    The user connects using

    The user enters his/her username and his/her

    credentials (eID card + PIN) and the wireless card reader

    password


    2

    The application sends an access request
    The user connects to the
    SP
    TOTP based mobile application

    3The user chooses the digital key of CSAM and enters it in the authentication interface

    4

    The user sends his/her credentials


    5

    The

    3The

    SP sends a request message to the authorization server (AS) to access to the IDentity Provide (IDP)

    4


    6

    The AS sends a message to the IDP to identify the non authenticated user

    5

    7The IDP checks the identity of the user with the AA 
    6

    8

    The IDP sends a response message to the

    AA

    AS to inform it that the user is identified

    7

    9

    The AS sends a message with the identify of the user to the SP

    8

    10The SP returns a response message to the application to enable the authentication
    9

    11The user is authenticated
    and can use the the services of the mobile application

    Exceptions (exception flows)

    • The

    PIN of the eID card
    • username or the password is not

    correct
    • recognized

    • The creation is aborted (e.g. loss of connection

    , problem with the wireless card reader
    • , the session is expired)

    Frequency

    • Every time the user needs to authenticate to the mobile application via TOTP


    Alternative flow 1

    Specification

    Use case ID

    ATH-UC-07-AF-01

    Use case name

    First authentication via TOTP

    Actors

    • Citizen

    • Healthcare giver
    • Representative of an institution

    Short Description

    Depending on the profile of the actor, this alternative flow will be instantiated by one of the four use cases dedicated to the creation of a new account (refer to the basic flows): ATH-UC-01, ATH-UC-02, ATH-UC-03, ATH-UC-04. To implement this flow, the user should authenticate him/herself in the mobile application using

    the eID card

    a TOTP-based mobile application.

    Priority

    1 (High)

    Must have: The system must implement this goal/ assumption to be accepted.

    Pre-Conditions

    • The user has not an account

    • The user has:

    • an e-mail address

    • an eID card

    • a code PIN of his/her eID card

    • a wireless card reader

      • a username and a password

      • a smartphone with a TOTP-based mobile application to get a security code

    Post-Conditions

    • The user has an account

    • The user knows his credentials

    • The user is authenticated

    • The user has access to the services of the mobile application

    Steps

    For more details and depending on the type of the actor, see:

    Exceptions (exception flows)

    • The user makes an error when editing his/her credentials

    • The

    PIN of the eID card
    • username or the password is not

    correct
    • recognized

    • The creation is aborted (e.g. loss of connection, the session is expired)

    Frequency

    • Every time the user wants to authenticate him/herself via TOTP and he/she does not have an account.


    Exception flow 1

    Specification

    Use case ID

    ATH-UC-07-EF-01

    Use case name

    The

    PIN of the eID card

    username or the password is not

    correct

    recognized

    Actors

    • Citizen

    • Representative of an institution
    • Healthcare giver

    Short Description

    It denotes the use case when the user tries to authenticate

    with his/her eID card

    via a TOTP and fails in entering

    the PIN.

    his credentials (username/password)

    Priority

    1 (High)

    Must have: The system must implement this goal/ assumption to be accepted.

    Pre-Conditions

    • The user has already an account

    • The user has:

  • an eID card
  • a PIN code of his/her eID card

  • a wireless card reader
      • a username and a password
      • a smartphone with a TOTP-based mobile application to get a security code

    Post-Conditions

    • The authentication is interrupted
    • An error message should be displayed

    Steps (basic flow)

    0

    The user access to the WebSSO application interface to authenticate him/herself and choose

    the option eID

    1

    to connect via a security code via mobile app (TOTP)


    1

    The user enters his/her username and his/her password

    The user tries to connect using a wrong PIN code


    2

    The authentication is interrupted because the credentials are not recognized

    Frequency

    • Every time for a user needs to authenticate him/herself and enter

    a
    • wrong

    PIN code
    • credentials

    Exception flow 2

    Specification

    Use case ID

    ATH-UC-07-EF-02

    Use case name

    The creation is aborted (e.g. loss of connection,

    problem with

    the

    wireless card reader, the

    session is expired)

    Actors

    • Citizen

    • Representative of an institution
    • Healthcare giver

    Short Description

    It denotes the exception use case when the user loses the connection and he/she will not be able to finish the authentication. It may happens at any step of the basic and alternative flows.

    Priority

    1 (High)

    Must have: The system must implement this goal/ assumption to be accepted.

    Pre-Conditions

    • The user has already an account

    • The user has:

  • an eID card

  • a PIN code of his/her eID card

      • a username and a password
      • a smartphone with a TOTP-based mobile application to get a security code
    a wireless card reader

    Post-Conditions

    • The authentication is interrupted

    • An error message should be displayed

    Steps (basic flow)



    Frequency

    • Every time for a user needs to authenticate him/herself and loses the connection