Signet
GitHubCommunityWhat's NewChatBot
  • 🌐eSignet
  • 🔍Overview
    • ✨Features
      • Signup Portal
    • âš–ī¸Principles
    • 📏Standards & Security
    • 📜License
  • đŸ’ģDevelop
    • đŸĻžTechnology
      • đŸ“ĻTechnology Stack
      • âš™ī¸Components - eSignet
      • đŸ¤ŗComponents - Signup Portal
      • 📲API
    • âš™ī¸Configure eSignet
      • ACR
      • Claims
      • .well-known
        • jwks.json
        • oauth-configuration
        • openid-configuration
  • 🎮Test
    • đŸ•šī¸Try It Out
      • Using Mock Data
      • Register Yourself
      • Integrate with eSignet
    • 👨‍đŸ’ģEnd User Guide
      • Health Portal
        • Login with Biometrics
        • Login with Password
        • Login with OTP
        • Login with QR code (Inji)
        • Knowledge Based Identification
        • Signup and Login with OTP for Verified Claims
    • 🧩Integration Guides - eSignet
      • Authenticator Plugin
      • Key Binder Plugin
      • Audit Plugin
      • Digital Wallet
        • Credential Holder
        • Wallet Authenticator
      • Relying Party
    • 🔐Integration Guide - Signup Portal
      • Identity Verifier Plugin
      • Profile Registry Plugin
      • Integration with eSignet portal
  • đŸ› ī¸Deploy
    • â›´ī¸Deployment Architecture
      • On-Prem Installation Guidelines
    • ⚓Local Deployment
      • Mock Identity System
      • Mock Relying Party
  • 🔌Interoperability
    • MOSIP
    • Inji
    • OpenCRVS
  • 🚀Roadmap and Releases
    • đŸ›Ŗī¸Roadmap
      • Roadmap 2025
      • Roadmap 2024
    • 📖Releases
      • v1.5.1
        • Test Report
      • v1.5.0
        • Test Report
      • v1.4.2
      • v1.4.1
        • Test Report
      • v1.4.0
        • Test Report
      • v1.3.0
        • Test Report
      • v1.2.0
        • Test Report
      • v1.1.0
        • Test Report
      • v1.0.0
        • Test Report
      • v0.9.0
        • Test Report
  • 🤝Community
    • Code Contribution
    • Code of Conduct
  • 📌General
    • 📚Resources
    • ❓FAQs
    • 💡Glossary
Powered by GitBook

Copyright Š 2021 MOSIP. This work is licensed under a Creative Commons Attribution (CC-BY-4.0) International License unless otherwise noted.

On this page
  • Data Privacy đŸ›Ąī¸
  • No Vendor Lock-in 🔄
  • Commodity Computing đŸ“Ļ
  • Secure By Default 🔐

Was this helpful?

Edit on GitHub
Export as PDF
  1. Overview

Principles

Core principles that define eSignet.

eSignet is designed with the architectural principles mentioned below. These architecture principles are core to developing the system's features and greatly influence how and why specific software design patterns are used.

Data Privacy đŸ›Ąī¸

eSignet prioritizes user privacy by minimizing data exposure and ensuring secure interactions:

  • No ID Storage by Relying Parties: Users enter their ID directly on the eSignet page, preventing relying parties from storing it. This reduces the risk of profiling in case of data breaches.

  • Privacy-Enabled Token (PSUT): Instead of sharing user IDs, eSignet issues a unique Partner Specific User Token (PSUT) for each user-relying party pair.

  • Protection of Sensitive Data: Sensitive information is never stored or logged in clear text.

  • User Controlled Consent: Users have full control over what data is shared with relying parties.

No Vendor Lock-in 🔄

eSignet is designed to be vendor-neutral, ensuring flexibility and interoperability:

  • Open Standards: Any biometric device that complies with the IEEE P3167 SBI 2.0 specification can integrate with eSignet.

  • No Dependence on Proprietary Solutions: Organizations can choose their preferred biometric devices and infrastructure without being restricted to a single vendor.

Commodity Computing đŸ“Ļ

eSignet is optimized for cost-efficiency and scalability:

  • Containerized Backend: All eSignet backend services run as Docker containers, eliminating dependencies on specialized hardware or specific cloud providers.

  • Multi-Platform Support: It can be deployed on any general-purpose virtual machine (VM) that supports Docker.

  • Avoids Vendor Lock-in: Organizations are free to use their existing cloud or on-premise infrastructure.

Secure By Default 🔐

Security is a core principle of eSignet, ensuring end-to-end protection:

  • Encryption at All Stages: Data is encrypted in transit and at rest to prevent unauthorized access.

  • Trusted Integrations: eSignet only integrates with verified and trusted applications.

  • Fraud Prevention: Authentication is tied to specific transactions, reducing the risk of unauthorized access.

  • Digital Signatures: Every incoming and outgoing request is digitally signed to ensure authenticity.

  • Encrypted Data Sharing: All data shared with relying parties is encrypted for additional security.

  • Internal Threat Protection: Database records are secured with integrity checks to detect tampering.

  • Centralized Key Management: A robust key management system ensures secure cryptographic operations.

  • API Security: All APIs are protected using OAuth 2.0, ensuring secure access control.

Last updated 3 months ago

Was this helpful?

🔍
âš–ī¸