Page 70 - Security Today, March 2019
P. 70
Creating User-Centric Citizen Identity Programs
Implementation of best practices must be employed
BGy Steve Warne
overnments are implementing innovative programs that are revolutionizing how the world looks at iden- tity and citizenship. There are many examples of na- tions that are using trusted identities to redefine how they interact with and deliver services to their citizens,
from India’s Aadhaar project for bringing personal identification to a record-breaking 1.2 billion people, to Tanzania and its quest to de- ploy an e-Passport program that anticipates future needs.
There are numerous system elements that are required for launch- ing a successful citizen identification program. These elements cover the whole identity journey from data capture and enrollment through
68
0319 | SECURITY TODAY
application processing, adjudication, and data preparation to person- alization and issuance. A truly end-to-end solution also must include supporting functionality for these processes such as lifecycle manage- ment, key management systems and signing and certification services.
For a successful project delivery, implementation best practices must be employed. No two projects are ever the same and therefore it is essential that there be an initial assessment of the legacy system, a full understanding of the customer’s requirements and a study of all relevant project constraints. In the program design and deployment stage, it is important to consider all necessary system elements and how they interact with any legacy processes, and take a customized,
IDENTIFICATION
Photographee.eu/Shutterstock.com