SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
X-Road as a Platform to
Exchange MyData
PETTERI KIVIMÄKI, CTO
29TH AUGUST 2018
Table of Contents
u MyData Roles
u How Does X-Road Work?
u X-Road as a Technical Platform for MyData
u MyData via X-Road
u What X-Road Does and Does Not Provide
MyData Roles
Digital
Identity
MyData Operator
Data
Consent
Consent
Individual
Consent • Individual – a person who authorizes data flows with
consent.
• MyData Operator – provides a MyData accounts that
enable digital consent management.
• Data Source – provides data about individuals.
• Data Using Service – uses the data provided by data
sources.
Data Source Data Using Service
Access Logs
How Does X-Road Work?
Security Server Security Server
Service Consumer Service Provider
Signature and
time-stamping
of messages,
logging
Verify incoming
messages,
time-spamping,
logging, access
rights
Central Services
Registry of
trusted parties
(organizations,
servers)
Trust Services
Validity of certificates
(auth, sign)
Time-stamping
of messages
X-Road Core
Trust Services
X-Road as a Technical Platform for
MyData
Digital
Identity
MyData Operator
Access Logs
Consent
Consent
Individual
Access Logs
X-Road Security Server
Data
• Both consent and data are transferred via X-Road.
• X-Road logs all the requests and the logs are used for
providing a centralized view to access logs where the
individual can see who has accessed his or her data.
• X-Road provides
• Organization level authentication
• Machine to machine authentication
• Standardized messaging model
• Non-repudiation of messages
• Access rights management
• Address management and message routing
• Transportation level encryption.
Data Source Data Using Service
MyData via X-Road
Security Server Security Server
Data Source
3. Check
access rights
(global group)
MyData Operator
1. Check consent (*)
4. Return response
2. Send request
Access logs (*)
Data Using Service
3.1 Check consent (*)
(optional)
Access logs (*)
* Checking consents and transfering access logs is done via X-Road.
All the registered data using services have access to all the
registered data sources. Consents are used for managing
authorizations to access the data of individuals.
MyData via X-Road
u Consents are managed by the MyData Operator.
u Every data source and data using service must implement the required MyData
APIs and enable their services to be connected with MyData accounts.
u X-Road client/service identifier must be stored by the MyData Operator.
u Access rights to data sources are managed using X-Road global groups that
are centrally managed by the X-Road operator.
u Registered data using services are added as members of the global group by
the X-Road operator.
u Data sources grant the MyData global group access to their MyData services –
all the members of the group then have access to the services.
MyData via X-Road
u All the registered data using services have access to all the registered data
sources. Consents are used for managing authorizations to access the data
of individuals.
u Data using service is responsible for checking the consent before
sending a request.
u No consent is found => no request is sent.
u Consent is found => request is sent and the ID of the consent is included in the
request (with other required parameters, e.g. user ID).
u Data source trusts the data using service and does not re-check the
validity of the consent.
u Alternatively, data source may re-check the validity of the consent. Increases
trust – and overhead.
MyData via X-Road
u All the requests and responses are logged by X-Road.
u Information related to MyData requests/responses (consent ID, data
using service, data source, user ID identifying the individual,
date/time etc.) is made accessible to the MyData Operator.
u Individuals can view who has accessed their information through
their MyData account.
u Unauthorized use of individuals’ data can be
automatically detected by analyzing the logs and is subject
to penalties, e.g. exclusion from the service etc.
MyData via X-Road
MyData Operator
Data SourceData Using Service
Central Server
• Register data using service (subsystem):
FI.COM.12345-6.Client
• Add subsystem to MyData Clients global
group
• Publish data source:
FI.COM.65432-1.Service.getData.v1
• Register data using service:
FI.COM.12345-6.Client
• Register data source:
FI.COM.65432-1.Service.getData.v1
Certification Authority
(CA)
Security Server Security Server• Get auth and sign certificates.
• Check validity.
FI.COM.12345-6.Client FI.COM.65432-1.Service.getData.v1
MyData Clients (global group):
FI.COM.12345-6.Client
FI.GOV.XXXX.XXX
FI.COM.XXXX.XXX
.
.
Grant MyData Clients access to:
FI.COM.65432-1.Service.getData.v1
MyData Account and Consents
ID Individual Data Using Service Data Source User ID Validity
Label Consent ID
– random
string
Social
security
number
X-Road client identifier
of the data using service
X-Road service identifier of the data
source
The ID identifying the individual in the
data source, e.g. social security
number, Facebook ID, Google ID etc.
The period when the
consent is valid.
Example 619KOZDLS2 121275-123A FI.COM.12345-6.Client FI.COM.65432-1.Service.getData.v1 121275-123A 1.3.2018-31.12.2018
u Individuals manage consents through a MyData account.
u X-Road identifiers are used for identifyind the data using service and
data source (not visible to the user).
u If social media user ID is used, the social media account must be
confirmed and linked to the MyData account. In addition, the data
source must define the ID that’s used for identifying the user. By default
social security number is used.
X-Road Provides
u Organization level authentication
u Machine to machine authentication
u Standardized messaging model
u Non-repudiation of messages
u Logging of messages
u Access rights management
u Address management and message routing
u Transportation level encryption.
X-Road Does Not Provide
u Semantic interoperability
u Common business data models
u Standardized business APIs
u Implementation of the MyData Operator
u Consent verification.
Questions?
WWW.NIIS.ORG
petteri.kivimaki@niis.org
+372 7130 802

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Computing Architecture
Cloud Computing Architecture Cloud Computing Architecture
Cloud Computing Architecture Vasu Jain
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
 
Cloud computing in a nutshell
Cloud computing in a nutshellCloud computing in a nutshell
Cloud computing in a nutshellMehmet Gonullu
 
E-BM The Internet and World Wide Web: E-BM Infrastructure
E-BM The Internet and  World Wide Web:   E-BM  InfrastructureE-BM The Internet and  World Wide Web:   E-BM  Infrastructure
E-BM The Internet and World Wide Web: E-BM InfrastructureKaleemSarwar2
 
Using BacNET for Building Automation and Control Applications
Using BacNET for Building Automation and Control ApplicationsUsing BacNET for Building Automation and Control Applications
Using BacNET for Building Automation and Control ApplicationsAVEVA
 
Smart Campus - Features and Benefits of Smart Technology in School Campus
Smart Campus -  Features and Benefits of Smart Technology in School CampusSmart Campus -  Features and Benefits of Smart Technology in School Campus
Smart Campus - Features and Benefits of Smart Technology in School CampusSmart Schooling
 
Grid Computing Systems and Resource Management
Grid Computing Systems and Resource ManagementGrid Computing Systems and Resource Management
Grid Computing Systems and Resource ManagementSouparnika Patil
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
Hierarchical Storage Management
Hierarchical Storage ManagementHierarchical Storage Management
Hierarchical Storage ManagementJaydeep Patel
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloudAshok Kumar
 
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Edureka!
 

Was ist angesagt? (20)

Cloud computing ppts
Cloud computing pptsCloud computing ppts
Cloud computing ppts
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Presence cloud
Presence cloudPresence cloud
Presence cloud
 
Cloud Computing Architecture
Cloud Computing Architecture Cloud Computing Architecture
Cloud Computing Architecture
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Cloud computing in a nutshell
Cloud computing in a nutshellCloud computing in a nutshell
Cloud computing in a nutshell
 
E-BM The Internet and World Wide Web: E-BM Infrastructure
E-BM The Internet and  World Wide Web:   E-BM  InfrastructureE-BM The Internet and  World Wide Web:   E-BM  Infrastructure
E-BM The Internet and World Wide Web: E-BM Infrastructure
 
Using BacNET for Building Automation and Control Applications
Using BacNET for Building Automation and Control ApplicationsUsing BacNET for Building Automation and Control Applications
Using BacNET for Building Automation and Control Applications
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Smart Campus - Features and Benefits of Smart Technology in School Campus
Smart Campus -  Features and Benefits of Smart Technology in School CampusSmart Campus -  Features and Benefits of Smart Technology in School Campus
Smart Campus - Features and Benefits of Smart Technology in School Campus
 
Grid Computing Systems and Resource Management
Grid Computing Systems and Resource ManagementGrid Computing Systems and Resource Management
Grid Computing Systems and Resource Management
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Hierarchical Storage Management
Hierarchical Storage ManagementHierarchical Storage Management
Hierarchical Storage Management
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Web Servers (ppt)
Web Servers (ppt)Web Servers (ppt)
Web Servers (ppt)
 
cloud computing
cloud computingcloud computing
cloud computing
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
 
Sharepoint
SharepointSharepoint
Sharepoint
 

Ähnlich wie X-Road as a Platform to Exchange MyData

Product Identification Service
Product Identification ServiceProduct Identification Service
Product Identification ServiceSergeyWalsh
 
Product Identification Service
Product Identification ServiceProduct Identification Service
Product Identification ServiceSergeyWalsh
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Practical Federated Identity
Practical Federated Identity Practical Federated Identity
Practical Federated Identity WSO2
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
Managing Sensitive Information in an API and Microservices World
Managing Sensitive Information in an API and Microservices WorldManaging Sensitive Information in an API and Microservices World
Managing Sensitive Information in an API and Microservices WorldApigee | Google Cloud
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...gueste4e93e3
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311h-bauer2014
 
Trust Your Supplier - trust your product in the supply chain
Trust Your Supplier - trust your product in the supply chain Trust Your Supplier - trust your product in the supply chain
Trust Your Supplier - trust your product in the supply chain Mohan Venkataraman
 
Resilient Network Systems - Trust Network Overview Slides - July 2014
Resilient Network Systems - Trust Network Overview Slides - July 2014Resilient Network Systems - Trust Network Overview Slides - July 2014
Resilient Network Systems - Trust Network Overview Slides - July 2014Resilient Network Systems
 
Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...
Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...
Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...Amazon Web Services
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CloudIDSummit
 
Iiw east openidentityforopengovfinal
Iiw east openidentityforopengovfinalIiw east openidentityforopengovfinal
Iiw east openidentityforopengovfinalMaryIIW
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
Building Enterprise Solutions with Blockchain and Ledger Technology - SVC202 ...
Building Enterprise Solutions with Blockchain and Ledger Technology - SVC202 ...Building Enterprise Solutions with Blockchain and Ledger Technology - SVC202 ...
Building Enterprise Solutions with Blockchain and Ledger Technology - SVC202 ...Amazon Web Services
 
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...APIsecure_ Official
 

Ähnlich wie X-Road as a Platform to Exchange MyData (20)

180926 ihan webinar 2
180926 ihan webinar 2180926 ihan webinar 2
180926 ihan webinar 2
 
Product Identification Service
Product Identification ServiceProduct Identification Service
Product Identification Service
 
Product Identification Service
Product Identification ServiceProduct Identification Service
Product Identification Service
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Practical Federated Identity
Practical Federated Identity Practical Federated Identity
Practical Federated Identity
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Managing Sensitive Information in an API and Microservices World
Managing Sensitive Information in an API and Microservices WorldManaging Sensitive Information in an API and Microservices World
Managing Sensitive Information in an API and Microservices World
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311
 
Trust Your Supplier - trust your product in the supply chain
Trust Your Supplier - trust your product in the supply chain Trust Your Supplier - trust your product in the supply chain
Trust Your Supplier - trust your product in the supply chain
 
Resilient Network Systems - Trust Network Overview Slides - July 2014
Resilient Network Systems - Trust Network Overview Slides - July 2014Resilient Network Systems - Trust Network Overview Slides - July 2014
Resilient Network Systems - Trust Network Overview Slides - July 2014
 
Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...
Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...
Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...
 
Final Poster C4 G
Final Poster C4 GFinal Poster C4 G
Final Poster C4 G
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
 
Iiw east openidentityforopengovfinal
Iiw east openidentityforopengovfinalIiw east openidentityforopengovfinal
Iiw east openidentityforopengovfinal
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Building Enterprise Solutions with Blockchain and Ledger Technology - SVC202 ...
Building Enterprise Solutions with Blockchain and Ledger Technology - SVC202 ...Building Enterprise Solutions with Blockchain and Ledger Technology - SVC202 ...
Building Enterprise Solutions with Blockchain and Ledger Technology - SVC202 ...
 
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
 

Mehr von Petteri Kivimäki

2016-09-16-NationalArchitectureForDigitalServices
2016-09-16-NationalArchitectureForDigitalServices2016-09-16-NationalArchitectureForDigitalServices
2016-09-16-NationalArchitectureForDigitalServicesPetteri Kivimäki
 
2016-09-23-KaPA ja avoin lähdekoodi
2016-09-23-KaPA ja avoin lähdekoodi2016-09-23-KaPA ja avoin lähdekoodi
2016-09-23-KaPA ja avoin lähdekoodiPetteri Kivimäki
 
2015-11-20-Avoimet lisenssit ja parhaat käytännöt julkisen hallinnon ICTssä -...
2015-11-20-Avoimet lisenssit ja parhaat käytännöt julkisen hallinnon ICTssä -...2015-11-20-Avoimet lisenssit ja parhaat käytännöt julkisen hallinnon ICTssä -...
2015-11-20-Avoimet lisenssit ja parhaat käytännöt julkisen hallinnon ICTssä -...Petteri Kivimäki
 
X-Road in Finland & REST Gateway
X-Road in Finland & REST GatewayX-Road in Finland & REST Gateway
X-Road in Finland & REST GatewayPetteri Kivimäki
 
2014-12-01-Kansallinen palveluväylä
2014-12-01-Kansallinen palveluväylä2014-12-01-Kansallinen palveluväylä
2014-12-01-Kansallinen palveluväyläPetteri Kivimäki
 
Evaluating Open Source Software - New Library Sytem for Finnish Libraries in ...
Evaluating Open Source Software - New Library Sytem for Finnish Libraries in ...Evaluating Open Source Software - New Library Sytem for Finnish Libraries in ...
Evaluating Open Source Software - New Library Sytem for Finnish Libraries in ...Petteri Kivimäki
 

Mehr von Petteri Kivimäki (6)

2016-09-16-NationalArchitectureForDigitalServices
2016-09-16-NationalArchitectureForDigitalServices2016-09-16-NationalArchitectureForDigitalServices
2016-09-16-NationalArchitectureForDigitalServices
 
2016-09-23-KaPA ja avoin lähdekoodi
2016-09-23-KaPA ja avoin lähdekoodi2016-09-23-KaPA ja avoin lähdekoodi
2016-09-23-KaPA ja avoin lähdekoodi
 
2015-11-20-Avoimet lisenssit ja parhaat käytännöt julkisen hallinnon ICTssä -...
2015-11-20-Avoimet lisenssit ja parhaat käytännöt julkisen hallinnon ICTssä -...2015-11-20-Avoimet lisenssit ja parhaat käytännöt julkisen hallinnon ICTssä -...
2015-11-20-Avoimet lisenssit ja parhaat käytännöt julkisen hallinnon ICTssä -...
 
X-Road in Finland & REST Gateway
X-Road in Finland & REST GatewayX-Road in Finland & REST Gateway
X-Road in Finland & REST Gateway
 
2014-12-01-Kansallinen palveluväylä
2014-12-01-Kansallinen palveluväylä2014-12-01-Kansallinen palveluväylä
2014-12-01-Kansallinen palveluväylä
 
Evaluating Open Source Software - New Library Sytem for Finnish Libraries in ...
Evaluating Open Source Software - New Library Sytem for Finnish Libraries in ...Evaluating Open Source Software - New Library Sytem for Finnish Libraries in ...
Evaluating Open Source Software - New Library Sytem for Finnish Libraries in ...
 

Kürzlich hochgeladen

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 

Kürzlich hochgeladen (20)

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 

X-Road as a Platform to Exchange MyData

  • 1. X-Road as a Platform to Exchange MyData PETTERI KIVIMÄKI, CTO 29TH AUGUST 2018
  • 2. Table of Contents u MyData Roles u How Does X-Road Work? u X-Road as a Technical Platform for MyData u MyData via X-Road u What X-Road Does and Does Not Provide
  • 3. MyData Roles Digital Identity MyData Operator Data Consent Consent Individual Consent • Individual – a person who authorizes data flows with consent. • MyData Operator – provides a MyData accounts that enable digital consent management. • Data Source – provides data about individuals. • Data Using Service – uses the data provided by data sources. Data Source Data Using Service Access Logs
  • 4. How Does X-Road Work? Security Server Security Server Service Consumer Service Provider Signature and time-stamping of messages, logging Verify incoming messages, time-spamping, logging, access rights Central Services Registry of trusted parties (organizations, servers) Trust Services Validity of certificates (auth, sign) Time-stamping of messages X-Road Core Trust Services
  • 5. X-Road as a Technical Platform for MyData Digital Identity MyData Operator Access Logs Consent Consent Individual Access Logs X-Road Security Server Data • Both consent and data are transferred via X-Road. • X-Road logs all the requests and the logs are used for providing a centralized view to access logs where the individual can see who has accessed his or her data. • X-Road provides • Organization level authentication • Machine to machine authentication • Standardized messaging model • Non-repudiation of messages • Access rights management • Address management and message routing • Transportation level encryption. Data Source Data Using Service
  • 6. MyData via X-Road Security Server Security Server Data Source 3. Check access rights (global group) MyData Operator 1. Check consent (*) 4. Return response 2. Send request Access logs (*) Data Using Service 3.1 Check consent (*) (optional) Access logs (*) * Checking consents and transfering access logs is done via X-Road. All the registered data using services have access to all the registered data sources. Consents are used for managing authorizations to access the data of individuals.
  • 7. MyData via X-Road u Consents are managed by the MyData Operator. u Every data source and data using service must implement the required MyData APIs and enable their services to be connected with MyData accounts. u X-Road client/service identifier must be stored by the MyData Operator. u Access rights to data sources are managed using X-Road global groups that are centrally managed by the X-Road operator. u Registered data using services are added as members of the global group by the X-Road operator. u Data sources grant the MyData global group access to their MyData services – all the members of the group then have access to the services.
  • 8. MyData via X-Road u All the registered data using services have access to all the registered data sources. Consents are used for managing authorizations to access the data of individuals. u Data using service is responsible for checking the consent before sending a request. u No consent is found => no request is sent. u Consent is found => request is sent and the ID of the consent is included in the request (with other required parameters, e.g. user ID). u Data source trusts the data using service and does not re-check the validity of the consent. u Alternatively, data source may re-check the validity of the consent. Increases trust – and overhead.
  • 9. MyData via X-Road u All the requests and responses are logged by X-Road. u Information related to MyData requests/responses (consent ID, data using service, data source, user ID identifying the individual, date/time etc.) is made accessible to the MyData Operator. u Individuals can view who has accessed their information through their MyData account. u Unauthorized use of individuals’ data can be automatically detected by analyzing the logs and is subject to penalties, e.g. exclusion from the service etc.
  • 10. MyData via X-Road MyData Operator Data SourceData Using Service Central Server • Register data using service (subsystem): FI.COM.12345-6.Client • Add subsystem to MyData Clients global group • Publish data source: FI.COM.65432-1.Service.getData.v1 • Register data using service: FI.COM.12345-6.Client • Register data source: FI.COM.65432-1.Service.getData.v1 Certification Authority (CA) Security Server Security Server• Get auth and sign certificates. • Check validity. FI.COM.12345-6.Client FI.COM.65432-1.Service.getData.v1 MyData Clients (global group): FI.COM.12345-6.Client FI.GOV.XXXX.XXX FI.COM.XXXX.XXX . . Grant MyData Clients access to: FI.COM.65432-1.Service.getData.v1
  • 11. MyData Account and Consents ID Individual Data Using Service Data Source User ID Validity Label Consent ID – random string Social security number X-Road client identifier of the data using service X-Road service identifier of the data source The ID identifying the individual in the data source, e.g. social security number, Facebook ID, Google ID etc. The period when the consent is valid. Example 619KOZDLS2 121275-123A FI.COM.12345-6.Client FI.COM.65432-1.Service.getData.v1 121275-123A 1.3.2018-31.12.2018 u Individuals manage consents through a MyData account. u X-Road identifiers are used for identifyind the data using service and data source (not visible to the user). u If social media user ID is used, the social media account must be confirmed and linked to the MyData account. In addition, the data source must define the ID that’s used for identifying the user. By default social security number is used.
  • 12. X-Road Provides u Organization level authentication u Machine to machine authentication u Standardized messaging model u Non-repudiation of messages u Logging of messages u Access rights management u Address management and message routing u Transportation level encryption.
  • 13. X-Road Does Not Provide u Semantic interoperability u Common business data models u Standardized business APIs u Implementation of the MyData Operator u Consent verification.