Identity approach Call for Input from data providers February 2021
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Identity approach Call for Input from data providers February 2021
Contents Background 3 Digital Identities 4 Good Practice Guide (GPG) 45 7 Good Practice Guide (GPG) 44 7 Trust framework / model 9 Proposals 10 Request for feedback 11
Identity approach - Call for Input from data providers | February 2021 3 Background thereby supporting better planning for retirement and growing financial 1. The Financial Conduct Authority wellbeing. (FCA) recommended, in its Financial Advice Market Review in 2016, that 5. The consultation response set out industry should make pensions some overarching design principles, dashboards available to individuals which indicated that all dashboards to make it easier for them to engage should: with their pensions, a view which the government echoed in its budget that • put the individual at the heart of same year. the process by giving individuals access to clear information online 2. An industry-led project, set up in • ensure individuals’ data is 2016 sponsored by HM Treasury secure, accurate and simple to and managed by the Association of understand - minimising the risks British Insurers (ABI), developed to the individual and the potential and demonstrated a prototype for confusion for the dashboard in 2017. The project continued independently of • ensure that the individual is government, publishing its findings always in control over who has in October 2017, which included the access to their data call for a government-backed delivery authority to drive the completion of 6. At the heart of the design is the need the project. for a trust model that enables all parties to operate within the system 3. In December 2018, government with complete confidence that other launched a consultation, engaging participants are identifiable and have widely with stakeholders across the authority to act in the way that they pensions industry, to identify issues are. Within this framework, users are and options for delivering the service. required to evidence their identity In April 2019, it set out its position in through a digital identity solution, a response document1, stating that: which will mandate a minimum level of confidence is established. “Government will legislate to compel pension schemes to provide their 7. The government response to the data; and consultations states: The Money and Pensions Service “To enable a sufficient level of trust in (MaPS) will have responsibility for the service, the department expects enabling delivery of the dashboard a standard level of identity assurance service working with the pensions for all users (individuals and industry.” delegates) that satisfies the National Cyber Security Centre’s Good Practice 4. As a result, the Pensions Dashboards Guide 45 on ‘Identity Proofing and Programme (PDP) was created to Verification of an Individual’. lead the work of delivering an eco- system, via which members can find Our conclusion: the delivery and view their pension holdings. group must agree on a The widely shared aim for pensions standardised level of identity dashboards is to enable individuals which complies with the National to access their pensions information Cyber Security Centre’s Good online, securely and all in one place, Practice Guide 452&3.” 1 Pension Dashboards government response to consultation 2 Good Practice Guide 45 - identity-proofing-and-verification-of-an-individual 3 Good Practice Guidelines are published by Government Digital Services (GDS)
Identity approach - Call for Input from data providers | February 2021 4 8. This paper presents the basis of Digital Identities an identity process and seeks clarification from data providers (ie Why are identities important? pension providers, schemes, trustees etc) on what they believe would be an 10. Data providers, as data controllers, acceptable identity standard for retain the responsibility for incorrect them to provide pension information disclosure of data. It is vital that they to a user. have confidence that the party to whom they are releasing data is who 9. PDP has recently undertaken a they say they are and has authority to Request for Information exercise receive the information. with key participants from the identity market which, along with the 11. The digital architecture includes an feedback sought by this Call for Input, identity service at its core, which will help shape the requirements is intended to ensure we can verify defined for the identity service. the user to an acceptable level of confidence. Proposed digital architecture - overview of the Ecosystem Dashboard Provider Dashboard Provider Dashboard Provider MaPS Dashboard Dashboard Dashboard Dashboard Pensions Find request information and response flows to dashboard Pension Consent and Governance Identity Service Finder Service Authorisation Register Find request Response - register with consent and authorisation server Pension Provider Pension Scheme Integrated Service State Pensions Provider Pension Scheme Pension Provider Key Ecosystem Governance Framework MaPS Digital Dashboards/Pension State (technical, security, design, accessibility, Dashboard - Architecture Providers and Pension - performance and user experience MaPS - PDP Schemes - Industry DWP standards) - PDP to set and monitor
Identity approach - Call for Input from data providers | February 2021 5 12. The user will be passed from the dashboard of their choice to the consent and authorisation service, which will orchestrate their consent and pass them to the identity service. User C&A checks accesses existing consent dashboard and passes user to ID Service Pensions Dashboard Dashboard passes user Consent and Identity Service to C&A Authorisation Verified IDP Data Provider / ISP Pension Finder attributes establishes Service returned identity 13. Before the user can find their pension 16. Additionally, the user may be asked to entitlements, the identity service will provide the following, which may not prove their identity to a standard be validated by the identity provider: acceptable to the ecosystem as a whole. e. national insurance number f. address history 14. Data standards that are being developed to support the eco-system, g. email address include a matching data set that will h. telephone number provide information that pension data providers can use to search for a i. previous names user’s entitlement. 17. The PDP undertook a data standards 15. At present, the user will consent to Call for Input, which helped our an identity provider validating their understanding of the breadth identity and confirming the following of information required by data information: providers to enable them to locate a pension entitlement. a. first name 18. It is anticipated that the identity b. family name service will provide verified identity c. date of birth attributes to the pension finder service, alongside user asserted d. address
Identity approach - Call for Input from data providers | February 2021 6 attributes (highlighted in 15 and 16 identity document from a trusted above), which will then co-ordinate source (eg passport), if they match communication with data providers. the image in the passport, you would have a high degree of comfort that 19. Providing a central identity service they are who they say they are. in the architecture provides certainty in the strength of the identity 26. This is harder to do online, where verification. Within the trust model, visible validation is more difficult it ensures trust persists across the to achieve – this is where identity ecosystem. providers and identity standards look to fill the gap. 20. It has the additional benefit of providing an open solution that 27. Identity services look to measure enables the user to use a single a set of data attributes about the identity to access and manage their claimed identity against known consents, even if they view their sources and determine the assurance pensions on more than one dashboard. of the identity. 21. This supports the principle defined in 28. The assurance of the identity is the consultation response document benchmarked against a standard, that users must be able to manage which determines the strength of the their consent independently of any recognised identity. dashboard provider. 29. Government Digital Services good 22. The Central Identity Service will practice guides are a framework that manage identity verification and supports definition of standards for dashboard providers are free identity to suit the purpose of the to decide whether they wish service being provided. In this case, to implement their own access that purpose is for the release of management service. pension data to an individual. 23. The matching data from the pension 30. An identity standard under the good finder service will be provided via a practice guides (for the purposes of standard API implemented by the the Pensions Dashboards Programme) data provider. The data provider will concentrates on two elements: use the matching data to locate a user’s entitlements based on their a. confidence in the identity own search criteria, which reflects b. confidence in the authentication their interpretation of risk. approach What is an identity? 31. GPG 45, which reflects level of confidence in an identity, should be 24. An identity is a combination of considered alongside GPG 444, level of verified attributes about an individual authentication credential. which, when considered in unison, can provide assurance that a person 32. Level of confidence provides a view is who they say they are. of the evidence provided by the user and attributes values across five 25. In simple terms, if you met someone measures. face to face and they provided an 4 Good Practice Guide 44 - Using authenticators to protect an online service
Identity approach - Call for Input from data providers | February 2021 7 33. Level of authentication credential • which parts of the identity assesses the method by which an checking process are undertaken identity service proves the person • what scores each part of the requesting access is the same person identity checking process attain as previously permitted. 39. Scores can be combined in a number Good Practice Guide (GPG) 45 of ways, based on the identity criteria, to provide an overall level of 34. As documented in GPG 45, an identity confidence. These are measured as: is a combination of characteristics that identifies a person. A single • low confidence characteristic is not usually enough to tell one person apart from another, • medium confidence but a combination of characteristics • high confidence might be. • very high confidence 35. The process of checking an identity 40. Full details of how these levels takes characteristics included in a of confidence are attributed are claimed identity (typically, but not incorporated in GPG 45. limited to: name, address and date of birth) and validates them against five 41. PDP, with the assistance of identity criteria / steps: providers and data providers, will determine the appropriate level of • get evidence of the claimed identity confidence required to support the • check the evidence is genuine or release of information. valid • check the claimed identity has Good Practice Guide (GPG) 44 existed over time 42. Level of assurance through GPG 44, • check if the claimed identity is at takes into consideration the ways in high risk of identity fraud which the user is authenticated. • check that the identity belongs to the person who’s claiming it ‘You might need to know if someone has already used your service before 36. By doing different parts of the you give them access to it. This is identity checking process, the identity called ‘authentication’ and can be provider can build confidence that an useful if users need to sign into your identity is accurate. service more than once.’ 37. Identity checking can be completed 43. There are different types of at a point in time or can be built over authenticators. An authenticator will a period as more experience and usually be one of the following: verifiable sources become available. Each element of the checking process • something the user knows (often builds a score, which contributes to referred to as a secret) an overall level of confidence. • something the user has 38. A level of confidence depends on: • something the user is • how many pieces of evidence are collected
Identity approach - Call for Input from data providers | February 2021 8 44. Something the user knows could be: 50. An authenticator can be low, medium or high quality. The quality of an • a PIN authenticator will depend on how secure it is. • a password • an answer to a question that 51. The quality will be informed by how it only the user knows the answer was: to - also called knowledge-based verification (KBV) • created by a user (or a manufacturer if it’s something like 45. A secret is usually used with either: a physical token) • another piece of information, such • managed (including how the as a username or email address authenticator is issued and updated, and what happens when • a token, such as a chip and PIN it’s no longer being used) card, single use authentication code or digital certificate • captured (if it’s biometric information) 46. A measure of something the user is would normally take the form of a 52. Examples of low, medium and high- biometric input. Biometric information quality authenticators can be found in is a measurement of someone’s: the GPG 44 document. • biological characteristics, such as 53. An authenticator can protect the their fingerprint, facial recognition service from being accessed by someone who should not be able • behavioural characteristics, such to use it. How much protection the as their signature service needs depends on: 47. Using biometric information means • what information the user needs a service can easily tell if the user to use the service who is trying to sign in is the same person who created the account. This • what information the service is because: gives the user access to • what the service or user can do • each person’s biometric with that information information is unique to them • it’s difficult for biometric 54. Selecting the appropriate information to be forgotten, lost, authentication options is dependent stolen or guessed on how data controllers view risk and the level of protection required to 48. Services can be protected by using a ensure data integrity. combination of two authenticators =- ‘2 factor authentication’ (2FA). 55. The level of protection afforded by the authenticator/s is measured in a 49. 2FA should, but does not need range from low, through to very high to, utilise two different types of dependent on the strength and quality authenticator, as this will reduce of the authenticator/s used. the risk of two similar types of authenticator being compromised, 56. Other considerations which will need which is more likely than two different to be factored include: types.
Identity approach - Call for Input from data providers | February 2021 9 • recovery processes for forgotten, each other within the common trust lost and stolen authenticators framework. – enabling the rightful user to recover access 63. The consent and authorisation service • revocation processes so that is the trust anchor for identity, authenticators can be cancelled, authentication and authorisation: it and access denied enforces user authentication by the identity service, provides identity • monitoring of the credential as attributes to the pension finder it is in use to detect misuse or service, and access authorisation to hijack data providers. Trust framework / model 64. Data providers can rely on and implicitly trust the consent for the 57. All components of the architecture, user to access an individual’s pension including dashboard and data information by virtue of their trust providers, are covered by a trust relationships within the framework. model that is based on mutual and federated trust. 65. The PDP, or an appointed operating body, will monitor and audit with 58. All organisations abide by legal common standards, operational conditions and standards that support practices and levels of assurance, a common ‘root of trust’. under governance terms to be determined. 59. This role is performed by the governance register which maintains 66. The PDP are currently defining a all affiliations within the eco-system liability model that supports the eg dashboards, data providers, ID contractual arrangements that will suppliers, and each component is be applied to support the trust registered in the governance register framework. and managed accordingly. 67. The identity service will be relied 60. Trust is assured and enforced by upon to provide strong authentication services acting as trust brokers, credentials to a user and identity on behalf of other services: eg the verified to a defined level of identity service authenticates a confidence. dashboard user, and the consent and authorisation authorises release 68. Liability under the framework of pension data based on the user’s is currently under review and consent. proposals are in the process of being determined. It will be incorporated 61. By the common root of trust, each within the governance framework service may in turn trust each other, being defined for the programme and eg the implicit trust of a relying the ongoing solution. service (pension data provider) to return data to an authorised Proposals requesting service (pension dashboard). 69. In making this proposal on the approach for the identity service, PDP 62. All services within the ecosystem, recognises that feedback from identity including pensions dashboards and providers and the pensions industry is data providers, should explicitly trust
Identity approach - Call for Input from data providers | February 2021 10 important, and may suggest alternate 77. A Request for Information to the approaches. identity industry was broadly in agreement with this proposal. 70. The identity service will be required to prove identities of individuals. 78. In the event that there is compelling That may be a user viewing their own evidence that a lower level of pension entitlements or representing confidence is adequate, PDP will a regulated financial advice company review the option to adopt it, or a guidance body, with delegated following consultation, even if it does access rights. not match the GPG45 defined levels of confidence, provided it follows the 71. In addition to assuring the identity principles. of a user with delegated access, the ecosystem will be required to ensure 79. Under GPG 44, PDP similarly their registration / professional propose that a medium level accreditation is appropriate and valid. of authentication might meet the requirements of the pensions 72. At present PDP is not determining industry. This should incorporate a whether the identity service will minimum of 2 factor authentication include a single identity provider and attendant security of credential or multiple identity providers. lifecycle and transaction monitoring. 73. Similarly, no decision has been made 80. A Request for Information to the as to whether the service would identity industry was broadly in directly integrate with multiple agreement with this proposal. providers or whether the use of a broker / hub would be more 81. Compelling reasons to support a appropriate. This will depend on the different level of authentication will be responses received during this call for considered, under consultation with input and on the cross government data providers. and private sector identity landscape at the relevant time. 82. It is proposed that on initial identity assertion, the consent and 74. PDP will define the APIs and authorisation module will issue a communication protocols once the token that will have a defined life. approach to identity has been further clarified and other elements of the 83. This approach will streamline the user architecture baselined. experience such that there will be no need to reauthenticate until the token 75. In order to enable future development has expired. No defined life has been and innovation, our preference is determined yet and proposals will be for the identity service to support welcomed. We note Open Banking interoperability with other markets / has set an expectation of 90 days schemes. between strong reauthentications. 76. Under GPG 45, PDP indicatively 84. The identity service will need to reach propose to the pensions industry that a high proportion of the holders of medium level of confidence might UK pensions (regardless of current meet their requirements for assurance domicile). One of the key challenges of identity prior to data release will be to support members of the relating to find and view. public that do not have access to government issued identity documents,
Identity approach - Call for Input from data providers | February 2021 11 such as passports and driving licence If Yes, what elements do you think or have limited credit history. are the primary factors? 85. The ecosystem will be the only If No, what additional information relying party supported by the would you need to be able to make an Identity Service – the consent and assessment? authorisation service will orchestrate 3. The suggested levels of confidence transmission of asserted attributes, (GPG 45) and authentication (GPG with the users consent, on successful 44) are ‘medium’, which equates to validation of the user’s identity. the previous versions of the standard level of assurance two. Do you agree Request for feedback that this is the correct level? As we move into the next phase of If No, what would you suggest is analysis, ahead of a planned procurement the correct assurance level for both exercise, the direction remains that the proofing of identity and strength of identity solution should be based on authentication? GPG 45 and authentication on GP 44. 4. Is there an alternative to the default This assertion is based on the principle levels of assurance from the Good that a consistent, repeatable and Practice Guidelines and how would comprehensible standard, which can be you anticipate them being measured? independently certified, should be applied that will meet the requirements of both 5. Does your firm have any view on government and industry participants. proofing or authentication methods and operate a current internal To validate that assumption and standard that differs from the GPGs understand any additional requirements medium level? that would need to be considered, the PDP would welcome your feedback on If Yes, could you please provide an the following points, both from your overview that could help direct the company’s perspective and how you think programme’s approach? it will be reflected across the industry: 6. The architecture includes the central identity service to ensure that a 1. Do you agree that finding pensions uniform, controlled process exists, and viewing pension details via a and that a user can easily manage pensions dashboard should include a their own consents. central digital identity, asserted to an appropriate standard, in accordance Please provide your thoughts on this with the GPG 45? approach and any challenges that you may foresee. If no, what alternative approach 7. Are there any specific requirements would you recommend? that you would anticipate the 2. The proposal includes a level of Pensions Dashboards Programme confidence in identity and a level having to meet when seeking: of authentication. Do you have a view on the level of assurance a. your firm’s approval for a that needs to be achieved to standard approach to identity provide comfort to release pension assurance information? b. a cross industry agreement on a standard for identity assurance
Identity approach - Call for Input from data providers | February 2021 12 8. What security related controls (other than identity proofing and authentication) do you see as important in your acceptance of the PDP solution for Pensions Dashboards?
You can also read