Mapping security services to authentication levels

This report reviews the authentication levels and their mapping to public electronic services in the eGovernment programme framework, which require an authentication of the user (security services). It gives a general overview of European efforts and particularly the activities of STORK (Secure idenTity acrOss boRders linKed) in relation to the levels and the mapping. Essential concepts in IT security are explained and the mappings are illustrated by everyday life examples.


Sławomir Górniak - ENISA
Stephan Körting - HJP Consulting
Diana Ombelli – HJP Consulting
Rodica Tirtea - ENISA
Demosthenes Ikonomou - ENISA


PDF document icon mapping.pdf — PDF document, 1.33 MB (1395620 bytes)