NARRATIVE:
The [TVA-Identification and Access Enablers [Motivation]] view extends technical view application and provides a comprehensive framework for leveraging various elements related to secure identification, authentication, and access management.
The view consists of three main groupings: [Identification and Access Enablers], [Business Agnostic Identity Management Solutions], and [Business Agnostic Authentication Solutions].
The [Identification and Access Enablers] grouping refers to components that enable the secure identification and authentication of users, systems, and services into a platform. It includes several application services and components such as [Authentication], [Registration], [Identification], [Access Management], [Identity Management], [Authorisation], [Accounting], [Request Validation], [Centralized Identity Management], and [Decentralized Identity Management]. These elements work together to ensure secure access to platforms and services, manage user identities, authorize users, track and record access, validate requests, and manage identities in both centralized and decentralized manners.
The [Business Agnostic Identity Management Solutions] grouping includes application services like [eIDAS-Node], [eIDAS-Proxy-Service], [Keycloak], [EU Login], [WSO2 Identity Server], and [Fraunhofer Omejdn Server]. These services provide various functionalities such as secure user authentication, single sign-on, identity federation, and access to protected resources.
The [Business Agnostic Authentication Solutions] grouping includes application services like [EU Login Identification], [EU Login Authentication], [EU Login Request Validation], and [EU Login Registration]. These services are responsible for user authentication to a wide range of Commission information systems.
The motivation behind these groupings and their elements is to provide a secure, reliable, and comprehensive framework for managing user identities and access rights. This is achieved through a combination of secure identification and authentication processes, access management, identity management, and the use of business-agnostic solutions.