I DATI PARZIALI DELLO SCIOPERO

Remote Signature Solution
Powered by PkBox
22 July 2014
Remote Signature Solution powered by PkBox
CONFIDENTIAL
Le
informazioni
contenute
in
questo
documento
sono
da
considerarsi CONFIDENZIALI e non possono essere utilizzate o
riprodotte - sia in parte che interamente - senza un permesso
scritto rilasciato da Intesi Group S.p.A.
All the information in this document is CONFIDENTIAL and can’t
be used entirely or in part without a written permission from Intesi
Group S.p.A.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 2 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
Index
1. PkBox ................................................................................................................. 4
2. Remote signature................................................................................................. 5
3. Strong authentication ........................................................................................... 6
4. Configurations ..................................................................................................... 8
4.1. Configuring remote signature in house............................................................. 10
4.2. Configuring remote signature in service ........................................................... 10
4.3. Configuring remote signature locally................................................................ 11
5. Registration Authority and Certificates Enrollment ................................................... 12
5.1. Certificate enrollment steps ............................................................................ 12
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 3 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
1. PkBox
PkBox is the ideal product to create centralized signature solutions. Designed for companies of
any size meets all the requirements of functionality, performance, capacity, reliability,
scalability and price.
PkBox complies with all Italian and European regulatory requirements, and has been designed
to offer programming interfaces absolutely simple and easy to integrate into existing
applications to be configured and sized according to user needs without any operation on
source code.
PkBox is currently adopted by the biggest banks and the Italian service centers as main
platform for the provision of all the signature verification services required and offered to
users.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 4 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
2. Remote signature
The Italian legislation on digital signature allows the use of a qualified signature solution with
legal value requiring the use of cryptographic keys generated and on board an HSM device
(certified for Common Criteria EAL4 +). The HSM can be installed remotely and replaces in its
own right, as permitted, the personal device operated directly by the user (smartcard or
token).
For the purposes of the legal value of the remote signature, the exclusive possession of the
credential and the expressed will of the signature must be guaranteed by means of strong
authentication tools that allow to verify with certainty the identity of the person and the
controlled release of the transaction.
The demand for strong authentication, during the signature operation, diversify the qualified
remote signature from the automatic signature (also massive). In the second case, user
authentication must take place only when you activate or suspend the service. Once activated,
the signature service may proceed independently without the involvement of the user who
owns the credential.
PkBox can manage the credentials indicating individually for each of them, the authentication
mode and if necessary, the Authentication Provider to be used.
Then properly configuring the credentials you can make, on the same server, both remote
signature operations and automatic signature.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 5 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
3. Strong authentication
The Italian legislation does not exactly indicate what are the proper authentication technologies
to be adopted for a remote signature solution. It should therefore adopt a solution that would
be sufficiently safe and reliable, possibly considering the authoritative opinion of the qualified
entities entitled to validate and "self-certify" the grip of the signature infrastructure to
regulatory requirements, the Certification Authority (CA).
If we take into account the essential aspects of security and of protection of the copy of
cryptographic algorithms and security of the keys, you can certainly consider valid approaches
based on dynamic generation of valid codes for a single authentication (OTP codes, One Time
Password). Alternatively, it is possible to adopt biometric technologies but these are not yet
openly liked by control Italian bodies and should therefore be treated with caution.
The possible solutions are distinguishable on the basis of the specific device and / or channel
used for code generation and the subsequent notice to user.
PkBox offers maximum flexibility of configuration allowing to freely set, for each of the
credentials, the authentication mechanism to use and the associated provider.
Authentication mechanisms provided
Authentication Provider available in the basic
version
OTP for remote signature
(must indicate which provider to use)
Intesi PassID SMS
OTP to unlock automatic signature
(must indicate which provider to use)
Intesi PassID Mobile
Double PIN
RSA Authentication Manager
Single PIN
RSA SecurID Authentication Engine (SAE)
No authentication
Vasco Identikey Authentication Server
Vasco Vacman Controller
Currently is under evaluation authentication based on cell. phone trough voice call for
communication of authentication code.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 6 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
For companies that have already implemented an authentication system, it’s possible to create
a Custom Authentication Provider integrated with PkBox that is able to call external service
without requiring the managing of a further system to be attached to the one already in use.
Similarly, the integration of strong authentication systems other than those already supported
is possible without difficulty. The commitment to be planned is fully equivalent to the
integration of the considered system with any other application server developed in Java and
running under Tomcat.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 7 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
4. Configurations
PkBox is highly flexible and can be configured to fully meet the requirements of the customer,
both in terms of load capacity and credentials, both as regards the overall architecture of the
system.
In the definition of a PkBox configuration, the degrees of freedom are:

guest OS (Windows and Linux are supported)

cryptographic device (Pkcs # 11 sw, Smartcard / Token in the pool, HSM,
netHSM)

Set of signature functions enabled (Cades, Pades, XAdES, Full Options)

No. of Servers in production (Fault Tolerance and Load Balancing)

Possible COD architecture with credentials on the database (Oracle, MySQL)

No. of Servers for other environments (DR, Testing, Testing, Development)

Strong Authentication System

No. of Intermediate Servers for processing documents (configurations at three
levels)
Depending on the device chosen cryptographic vary the resulting values of:

Number credentials can be installed on a PkBox server

Number of signature operations per unit of time
With a smartcard or USB token is possible to achieve a rate of about 3/4 thousand signatures
per hour. With an HSM can also treat hundreds / thousands of signatures per second. Clearly
the size of the documents to be signed greatly influence the time necessary to the operation of
signature since the calculation of the hash is requested.
By installing multiple servers in parallel, it’s possible to distribute requests of signature on the
available machines increasing in proportion to the overall capacity of the system.
The module PkBox Client, to be used as library of interface of applications with PkBox Servers,
it’s able to address servers distributing requests without requiring additional components such
as hardware or software balancers.
The balancing equipment can still be used both in situations in which the user wants to adopt
them, or he doesn’t use PkBox Client and he prefers the Web Services interfaces.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 8 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
Adopting the configuration COD, PkBox is able to manage the signature credentials on an a
database external to HSM. The key pair is generated within the cryptographic device, is then
encrypted with a master key and the result can be brought out of the safety data sheet without
running the risk of using it fraudulently.
Thanks to the structure COD, you exceed the limits imposed by HSM on the total number of
credentials manageable by a single security system. Intesi Group developed configurations that
can handle millions of remote and automatic signature certificates.
Hooking more PkBox to a common database it’s possible to optimize the number of certificates
to be issued, avoiding certificates duplication for each HSM, and minimizing the recovery time
of a signature server as a result of a hardware failure. The only information to transfer on the
new HSM is indeed the master key (which can be securely transferred using a set of
smartcard).
The COD configuration requires the use of a specific HSM device: Thales nCipher nShield as to
ensure the necessary security, cryptographic operations and export credentials are performed
through calls to the API specifications of this product.
If there is a logical or geographical separation between the signature servers and the
applications that manage the documents to be signed, it’s possible to create a three-tier
configuration where the PkBox server is divided into two specialized machines:

PkBox HSM (which manages the cryptographic device)

PkBox Remote (which manages the handling of documents, applications side)
The mechanisms of dialogue between the PkBox Client, HSM and Remote enable the load
balancing at all levels. It’s possible to have for example three PkBox HSM and two Remotes.
The application will, through PkBox Client the two PkBox Remote and each Remote will see in
pool the three PkBox HSM.
The number of PkBox Remote can be decided both by the size and the number of documents to
be treated, both considering the number of applications and different geographic locations to
support.
The number of PkBox HSM depends solely on the load of signature transactions that you want
to support.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 9 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
The sizing of a solution without Remote should consider that all the processing job of document
and signature on the device should be done by the same machine.
4.1. Configuring remote signature in house
Combining the options shown, the standard configuration of reference for the management of
remote signatures is the following:

One
or
more
servers
PkBox
COD
(production
and
disaster
recovery
environments)

A Thales HSM for each PkBox

A Database for host encrypted credentials

One or more systems Strong Authentication
Clearly it is possible to use PkBox Remote configurations at multiple levels.
If it is necessary the creation of environments for development, test and validation, can be
defined configurations less complex because the APIs and services of interface remain
unchanged under varying configurations.
Products should be selected among those supported, as indicated above.
4.2. Configuring remote signature in service
The three-tier architecture can be profitably exploited to develop solutions for remote signature
which offers a service of custody of credentials and remote signature to companies that want
to use applications with signature functionalities without having the burden to acquire and
manage complex HSM.
The planned configuration for the in-house solution can be transferred to the service provider,
leaving the company using the service simply one or more PkBox Remote
In this case, the provider must provide a redundant configuration of PkBox HSM and possibly
replicated at production sites (Primary and Disaster Recovery).
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 10 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
It must also make available the Data Base that will host the users’ signing credentials and
make it accessible through appropriate communication lines - redundant and replicated - in
order to maximize service levels and the availability of the solution.
The feature of Strong Authentication can be made available either by the provider either by the
customer. It’s desirable that a basic feature of authentication is however proposed by the
provider in order not to impose the customer having to equip even if he doesn’t feel the need.
4.3. Configuring remote signature locally
For the completion of a remote signature configuration in service, the customer simply need to
install one or more PkBox Remote who are responsible for receiving requests from applications,
to treat the data to be signed and sent to the PkBox HSM hashes and authentication data for
the execution of signature operations.
All operations are carried out locally by Remote PkBox and only when it is strictly necessary to
operate on private keys, are involved PkBox HSMs installed at the service provider.
Since data to be signed are never sent to the provider but only hashes locally computed, the
solution ensures the necessary confidentiality of information processed by the client
applications.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 11 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
5. Registration Authority and Certificates Enrollment
Regardless of the cryptographic device adopted, in case you want the signatures have legal
value, it is necessary that the process of certificates issuing respects the law and follows the
rules established by the Certification Authority to which certificates are required.
5.1. Certificate enrollment steps
The steps for issuing a certificate are:
1. Creating an RSA key pair on the HSM device
2. Recognition of a user by a RAO (Registration Authority Officer)
3. Preparing a certificate request with all the required data
4. Sending the request to the Certification Authority
5. Registration of the user by the RA
6. Issue of Certificate by the CA
7. Sending the certificate to the client
8. Uploading of the certificate on the cryptographic device
Should also be considered the mode of generation that could be in line for a single user, or
batch, for the generation of massive credentials.
The operations listed are carried out in part by the Certification Authority, with tools made
available by this body, and partly on the PkBox.
In particular PkBox public Web Services interfaces to perform the steps 1, 3 and 8.
The Certification Authority must ensure the steps 5, 6 and 7.
The operations 2 and 4 are typically carried out by the RAO or by his agent.
Both in the interactive case, both for batch jobs, it is necessary to prepare an application that
integrates PkBox interfaces and those of the CA in order to achieve the overall procedure.
If you adopt the in service solution, the certificates enrollment procedure of certificates is
typically offered by the Service Provider as a complement to the basic services of remote and
massive signature.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 12 di 13
Remote Signature Solution powered by PkBox
CONFIDENTIAL
As for the certificates, the difference between qualified signature and remote automatic
signature is only given by the restrictions of use defined on the certificate at the time of its
issue.
www.intesigroup.com
Via Torino, 48 - 20123 Milano
|
Tel: +39 02 6760641 - Fax: +39 02 67382279
Pag. 13 di 13