Next Article in Journal
What Message Characteristics Make Social Engineering Successful on Facebook: The Role of Central Route, Peripheral Route, and Perceived Risk
Next Article in Special Issue
Optimal Resource Allocation to Reduce an Epidemic Spread and Its Complication
Previous Article in Journal
An Intelligent Spam Detection Model Based on Artificial Immune System
Previous Article in Special Issue
Optimization and Security in Information Retrieval, Extraction, Processing, and Presentation on a Cloud Platform
Open AccessFeature PaperArticle

Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure

Politecnico di Torino, Dip. di Automatica e Informatica, Corso Duca degli Abruzzi 24, 10129 Torino, Italy
*
Author to whom correspondence should be addressed.
This paper is an extended version of the paper previously published by the authors in Proceedings of the 2018 22nd International Conference on System Theory, Control and Computing (ICSTCC 2018), Sinaia, Romania, 10–12 October 2018; pp. 691–696.
Information 2019, 10(6), 210; https://doi.org/10.3390/info10060210
Received: 8 April 2019 / Revised: 23 May 2019 / Accepted: 30 May 2019 / Published: 12 June 2019
(This article belongs to the Special Issue ICSTCC 2018: Advances in Control and Computers)
The European Union (EU) Regulation 910/2014 on electronic IDentification, Authentication, and trust Services (eIDAS) for electronic transactions in the internal market went into effect on 29 September 2018, meaning that EU Member States are required to recognize the electronic identities issued in the countries that have notified their eID schemes. Technically speaking, a unified interoperability platform—named eIDAS infrastructure—has been set up to connect the EU countries’ national eID schemes to allow a person to authenticate in their home EU country when getting access to services provided by an eIDAS-enabled Service Provider (SP) in another EU country. The eIDAS infrastructure allows the transfer of authentication requests and responses back and forth between its nodes, transporting basic attributes about a person, e.g., name, surname, date of birth, and a so-called eIDAS identifier. However, to build new eIDAS-enabled services in specific domains, additional attributes are needed. We describe our approach to retrieve and transport new attributes through the eIDAS infrastructure, and we detail their exploitation in a selected set of academic services. First, we describe the definition and the support for the additional attributes in the eIDAS nodes. We then present a solution for their retrieval from our university. Finally, we detail the design, implementation, and installation of two eIDAS-enabled academic services at our university: the eRegistration in the Erasmus student exchange program and the Login facility with national eIDs on the university portal. View Full-Text
Keywords: electronic identity; eIDAS infrastructure; security; academic attributes; user authentication electronic identity; eIDAS infrastructure; security; academic attributes; user authentication
Show Figures

Figure 1

MDPI and ACS Style

Berbecaru, D.; Lioy, A.; Cameroni, C. Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure. Information 2019, 10, 210.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop