Request for Proposal (RFP)

Request for Proposal (RFP)
DSF01-067
APPENDIX A – CUSTOMER SPECIFICATION
This document forms Appendix A to the Request for Proposal (RFP) for Digital Services Framework
Agreement – RM1043, along with Pricing Matrix (Appendix B) and an Award Questionnaire (Appendix C).
CONTENTS
PROJECT START DATE AND TIMEFRAME
CURRENT SITUATION/ BACKGROUND INFORMATION
REQUIRED OUTCOMES
USER NEEDS
CAPABILITIES AND ROLES
PRICING MODEL
CUSTOMER LOCATIONS
TEST & DEVELOPMENT REQUIREMENTS
Digital Services Framework Agreement - RM1043
Document1
Page 1 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
PROJECT START DATE AND TIMEFRAME
The timescales below reflect the urgency in delivering an IDAM solution to the Common Platform Programme.
Due to this being on the critical path we cannot allow slippage in these dates.
Key delivery dates
PROJECT PHASES
START DATE
COMPLETION DATE
RFP
15/08/14
29/09/14
Discovery
06/10/14
17/10/14
Alpha
20/10/14
28/11/14
Beta
We reserve the right to continue
into this phase depending on the
outcome of the Alpha phase
Live
We reserve the right to continue
into this phase depending on the
outcome of the Beta phase
CURRENT SITUATION / BACKGROUND INFORMATION
Introduction and Context
Her Majesty's Courts & Tribunals Service (HMCTS) and the Crown Prosecution Service (CPS) have
established the Criminal Justice System (CJS) Common Platform Programme (CPP) as a joint initiative to
define and implement IT-enabled transformational business change within the CJS spanning the CPS,
Magistrates’ and Crown Courts. The CJS CPP will play a key role in delivering IT-enabled business change
that, in combination with other delivery programmes, will reform the CJS. It will also build a capability within
the business for IT-enabled change so that the business can be more responsive and agile in the future.
The long term strategic approach to provision of an Identity and Access Management (IDAM) solution for the
CJS CPP has identified the Government Digital Service (GDS) Identity Assurance (IDA) Programme and a
future service provided by the Public Service Network (PSN), as good strategic fits with the Common
Platform, covering different aspects of the user base. However until the GDS IDAP and PSN services are fully
available and implemented alternative interim authentication services will need to be found to cover the
immediate needs of services wishing to use the CJS CPP, including specific recommendations for how this
should be achieved. These interim services will be replaced by the PSN and GDS services when they are
available.
Additionally there is a need to for a central core service for the Common Platform that will provide matching,
user and account management and directory services. These services will be longer term strategic solutions
that will not be replaced in the foreseeable future. This Digital Services Framework procurement focuses on
provision of the central core service.
The overall IDAM solution comprises a number of components, including the identification and registration,
and enrolment and authentication capabilities that enable appropriate stakeholders access to the Common
Platform services. The IDAM solution does not include the role-based control required for fine-grained
authorisation, which remain the responsibility of specific applications/services.
Digital Services Framework Agreement - RM1043
Document1
Page 2 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
The IDAM Solution Overview
A high-level overview for the IDAM solution is set out below in Figure 0-1 as a service specification for the
elements to support the immediate activities of the programme. This shows a strategic architecture integrated
with the Government Digital Service (GDS) Identity and Access (IDA) Hub. This strategic architecture is
augmented with interim Authentication Providers (for professional users, including those in organisations, via
Internet access and for Public Service users via secure access) that will need to be put in place pending
implementation of the full IDA and Public Sector Network service capability.
Figure 0-1: Strategic high-level design and Interim IDAM service
The Common Platform Central Service (in the Central zone) is the Service Provider. It consists of the
Common Platform Point of Access and the various applications and components that together provide the
Common Platform capability. Users will connect with this service directly to access Common Platform
functionality. On initial connection, they may be subsequently redirected to the appropriate identity provider for
authentication. The CP service also includes the functionality required for user account management for both
general users and administrators.
The authentication token from the IdP will be passed to the Common Platform, that will consult a master
directory (CP Directory) of authorised Common Platform users and their account details. The consultation will
determine whether the authenticated user is entitled to access the Common Platform. The CP Directory will
also contain the list of CP Applications that the user is entitled to access. When a successful match is found,
the user will be passed through the Point of Access to the corresponding application (not shown on the
diagram) along with a Common Platform Unique Identifier (CPUI). An Account Management service will be
required to support the user account management process. Synchronisation of user profile and account
Digital Services Framework Agreement - RM1043
Document1
Page 3 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
management data will be required with the Common Platform Applications to ensure that there is a single set
of data for each user.
Over time there will be multiple Identity Providers interacting with the Common Platform, including through
both IDA and the future Public Sector Network service. It will be possible for individual users to be registered
with multiple Identity Providers concurrently.
Current artifacts
The ‘IDAM overall context’ diagram illustrates the example user types requiring authentication and access to
the applications.
1) Users can access applications using various devices e.g. trusted and untrusted PCs, tablets and
phones.
2) User authentication is required via one of the recognised IdPs.
3) The user’s credentials are matched in the IDAM’s identity checking component. On successful logon,
IDAM will check its directory store for applications which the user will have access to.
4) The user will be directed to the requested application, which can be located on trusted or untrusted
networks as well as on the internet. The applications can be COTS, bespoke or applications on the
cloud.
Digital Services Framework Agreement - RM1043
Document1
Page 4 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
IDAM Identity Providers (IdPs)
 Interim Internal IdP – this is an interim component which will eventually be replaced by a PSN service.
The internal IdP identifies internal users e.g. users already with access to the Public Sector Network
(PSN).
 Professionals/Organisations IdP - identifies organisations and legal professionals e.g. magistrates.
 GDS IDA – this is a Cabinet Office program which will register and issue credentials to citizens over
the Internet.
Core IDAM Components
 Point of access/interface – this is the single route into IDAM. It forwards unauthenticated users
through to the appropriate IdP. Authenticated users are presented with links to applications in
accordance with their access “policy”.
 Identity matching – this component matches IdP users to CJSCP users and determines whether a
user exists in the IDAM layer.
 Directory – this is the directory store which persists user attributes, applications that the user has
access to and a unique id (CPP Id). A user is granted access to an application by checking whether
they exist in the directory store and are forwarded to the requested application if they have access to
it.
 User access management – this manages the provisioning, editing and decommissioning of user
access.
Applications
Digital Services Framework Agreement - RM1043
Document1
Page 5 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043



MCR – Magistrate’s Court Rota application, this will be one of the initial applications that will interface
with the IDAM to determine access control.
Store – a document store which will hold court papers and documents, this will be one of the initial
applications that will interface with the IDAM to determine access control.
Apps #n – Other applications and services will gradually interface with the IDAM to determine access
control.
Individual applications and services will be responsible for their own RBAC.
Digital Services Framework Agreement - RM1043
Document1
Page 6 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
As a user e.g. member of the general public, magistrate, a delegated personnel from a legal firm, an internal
user (these users may already have access to the PSN or GSI) requiring access to the applications, a process
of enrolment and verification is required.
The user starts this process by accessing a common interface in the IDAM layer which will check using an
identity matching component whether they are already registered with a recognised IDAM Identity Provider
(IdP).
If the user is not registered with an IdP then they must register with one of the recognised IdP before they can
access the applications. Their credentials are captured by IdP and passed onto IDAM which produces a
unique Common Platform Programme (CPP) Id. The CPP Id and other attributes for the user will be required
to configure what application the user has access to at the IDAM layer. This information is then passed onto
the application layer in order to configure the role based access control (RBAC) for each application that the
user has access to.
If the user is already registered with a recognised IdP, then the identity matching component will check the
directory store for the type of applications that the user has access to. Where the user does not have access
to a required application, access to the application will be configured in the IDAM layer using their CPP Id.
The user’s attributes and their CPP Id will then be passed to the application layer for RBAC configuration.
As an IDAM administrator, the adminstrator can change user records held in the directory store. All user
changes from IDAM e.g. user attributes or the applications they are allowed access to will have to be
synchronised with the applications as the directory store is the master directory of CPP users.
Digital Services Framework Agreement - RM1043
Document1
Page 7 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
Users can access the system via the IDAM Point of Access/Landing page or directly via the application’s URL.
If a user is already authenticated (using an IdP), the user will be forwarded to the required application.
If the user is not authenticated and has originated from a trusted network, the user will need to be use the
Interim Internal IdP and on successful logon will be forwarded to the required application or the common
interface.
If the user is not authenticated a wants to access as a professional or a delegate of an organisation, the user
will use the Professional IdP and on successful logon will be forwarded to the required application or common
interface.
If the user is not authenticated a wants to access as a member of the public the user will be directed to the
GDS IDA. On successful logon, they will be allowed access to the required application or common interface.
Access will be denied to users with unsuccessful IdP logins.
Digital Services Framework Agreement - RM1043
Document1
Page 8 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
As an IDAM administrator, a request has come from the business to remove access to applications for a user.
The user will have their access removed from IDAM’s directory store, this needs to be synchronised with the
application RBAC. After an appropriate duration, the user record will be deleted from the IDAM’s directory
store, again this needs to be synchronised with the application RBAC.
Digital Services Framework Agreement - RM1043
Document1
Page 9 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
The ‘Providing the access mechanism to application/services’ wireframe illustrates the provisioning of the
users on the CJSCP. Where labelled with ‘Provided by GDS’, ‘Provided by IdP’ or ‘Provided by app’, this
indicates the mechanisms are already in place and are outside the scope of the procurement requirements.
Digital Services Framework Agreement - RM1043
Document1
Page 10 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
Current Roles and Responsibilities of the Customer
The CJSCP IDAM Project Team is made up of:
Elizabeth King/Chris Grice – Project Manager
Keith Holder – IDAM Subject Matter Expert
James Sadler – Solution Architect
Christine Chan – Business Analyst
Jacques de la Porte – Information Security Architect
TBC – Test Analyst
Current Technologies and Languages
Open source technologies and products are preferred. The first two applications to use IDA will be:
 Magistrates Court Rota: Bespoke web-based application written in HTML, JavaScript and JAVA.
Currently uses OpenAM for Access Management
 Store: A web-based document store based on an Open Source DRMS (Alfresco).
REQUIRED OUTCOMES
Requirements Context and Outcomes
The overall IDAM solution is broken down into 3 sections (Lots). However it should be noted that the current
procurement through the Digital Services Framework (DSF) is only for Central IDAM Services (Lot 3). Lots 1
and 2 (IDPs) are being procured separately through the G Store. Lots 1 and 2 are provided here to set the
context for the current DSF procurement, the outcome of which is to provision a service that will provide all the
functionality of the IDAM Central Service (Lot 3).
Lot 1: Identity Provision and Authentication Solution for external users via the Internet, including:
a) Individuals acting in a professional capacity, initially Magistrates (required within 3 months);
b) organisations, such as legal firms, and individuals (e.g. defence lawyers and solicitors) within them
(within 6 months);
Lot 2: Identity provision and authentication solution for Public Sector Staff (e.g. those within HMCTS and CPS)
(required within 6 months);
Lot 3: IDAM Central Service (required within 3 months), consisting of:
a)
b)
c)
d)
Point of Access to provide a ‘front door’ to the Common Platform applications.
Matching Service to validate identities provided by external identity providers;
Directory Service to provide a master repository of user details;
Enrolment, Access and Account Management Service to enable users and administrators to access
and manage account details.
A full set of requirements is attached in Addendum A.
Approach and methodology
The CJS CPP has adopted an Agile approach to developing the services. The IDAM solution will be
developed in 3 distinct phases (Discovery, Alpha and Beta), with Discovery phase setting the scope for Alpha
testing. Those responding to this specification should follow that approach and provide proposals for each
phase of development. Initially contracts will be awarded for phases 1 and 2 (Discovery and Alpha) with
decisions on Beta and live operation dependent on the result of those phases.
Digital Services Framework Agreement - RM1043
Document1
Page 11 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
It should be noted that while the Central IDAM services (Lot 3) have been divided into four component
services, these component services do not necessarily need to be implemented with separate
products/services; it is possible that more than one component can be implemented with the same product.
Additionally the strategic requirements are not intended to be definitive and complete final specifications, as
further analysis is required with individual CPP service providers to define the full set of business
requirements as plans are clarified. However, they are appropriate to provide direction to the programme and
its component projects.
Assumptions
In drawing up these requirements a number of assumptions have been made, in particular about the
timescales within which services will be required and available. These include that:
a.
Lot 1 a) (registration and authentication for magistrates) and Lot 3 (central IDAM Services) will be
required for services to go live between 3- 6 months from end of July 2014;
b.
Lot 1 b) (organisational access via Internet) and Lot 2 (public sector access) will be required for
services to go live between 6-9 months from end of July 2014;
c.
GDS IDA services for Citizen access are available now and that on-boarding of services (e.g. for “Plea
on-line PoL) can be achieved within 3-4 months of decision to use the GDS service;
d.
GDS are investigating services that may provide for organisational access and delegated authority
management. They have completed an Alpha with HMRC but no firm plans are in place for further
development at this stage. It is assumed that GDS will not be in a position to provide a service before
April 2015, and that an interim service for Common Platform users (e.g. law firms and defence) will
need to be put in place to meet immediate needs.
e.
The architecture for the Common Platform IDAM solution is agnostic about the number and type of
IDPs or federation hubs that may be used for access, providing they adopt a federated approach,
integrate using open standards and are able to integrate with external components using SAML 2.0.
f.
PSN service Hubs have been procured but access to services will depend on all public sector user
organisations (e.g. CPS, MoJ FITS etc.) meeting the PSN service connection standards (or other
appropriate standards for government service federation). While relevant organisations intend to
connect, no specific plans are in place to do that. The assumption is that an interim service for public
sector access will need to be in place for at least 1 year to 18 months.
CAPABILITIES AND ROLES
CAPABILITY
CUSTOMER’S REQUIRED OUTCOME
The technical architect capability is required to work with developers,
customer solution architect, customer information security architect and
front-end designers to:

Provide hands-on technical leadership in the development or
configuration, operation and ongoing improvement of the IDAM
solution components.

Work with the solution architect to identify technical options, design
patterns for the IDAM solution and inform.

Provide a technical solution which meets the requirements of the
IDAM solution.
Software Engineering and
Ongoing Support
Digital Services Framework Agreement - RM1043
Document1
Page 12 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043

Convey technical design effectively to the solution architect and
provide on-going technical support to the development team.

Provide high and low level design for the chosen software to meet
the requirements of the IDAM solution.

Provide guidance to the development team following the GDS
Service Design Manual.
The developer(s) capability is required to work on the software development
or configuration and testing, liaise with the designer, technical architect,
business analysts and subject matter experts to:

Liaise with the technical architect to turn the technical design into a
product solution that fulfills the IDAM requirements.

Provide fully tested, reviewed, production level code.

Follow any design patterns and best practice guides as provided by
the technical architect and those dictated by the requirements.

Deliver that code in the team’s configuration management systems.

Liaise with the supplier delivery manager to co-ordinate delivery of
releases for testing.

Provide an assurance role to validate what is produced and build in
quality from the start.
Estimate ongoing development work to facilitate planning for
upcoming sprints and be involved in the ongoing prioritisation of core
aspects of the service.
Work with the wider delivery teams and stakeholders to break
technical requirements down into appropriate pieces for integration.
Provide integration and provide support for integration testing to the
Identity Provider software and applications such as the Magistrate’s
Court Rota and Document Store.
Be able to deploy the solution using open sourced solutions.




The product manager capability is required to work with the business analyst
and subject matter expert to:
Product Development and
Service Design

Manage ownership of the product being delivered.

Manage guidance to testers for acceptance criteria of the delivered
product.

Manage acceptance that the delivered solution meets the IDAM
functional and non-functional requirements.

Manage acceptance that the delivered solution meets the front-end
and interaction design.

Manage acceptance that a high quality user experience for the end
to end solution of the IDAM solution has been achieved.
The delivery manager capability is required to work with the development
team, customer’s tester(s) and customer’s project manager to:
Agile Delivery Management

Can act as the Scrum master in daily standups.

Plan for sprints and retrospectives.

Remove any impediments that will hinder the development team
from delivering the solution.
Digital Services Framework Agreement - RM1043
Document1
Page 13 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043

Ensure continuous delivery.

Help other product teams and stakeholders to understand the work
being done.

Work with the development team and customer tester(s) to schedule
in releases for testing of the IDAM components.

Work with the development team and customer tester(s) to schedule
in releases for integration testing.

Work with the development team and customer tester(s) to ensure
timely delivery of releases according the project manager’s plan.

Raise any risks to the customer project manager which will impact
delivery of the IDAM solution according to the project plan.
The designer capability is required to work with the solution architect, subject
matter expert, business analyst and developer(s) to:



Front-end Design and
Interaction Design



Deliver high quality user experiences through the IDAM solution’s
common interface.
Design the user experience in line with the GDS style guide (look,
feel, tone, brand etc.).
Challenge assumptions about the right way to do things, and work
effectively with subject matter experts and business analysts to find
the right solution.
Provide a responsive design, and reflect that accordingly in
approaching questions of user interaction.
Be comfortable working in an agile environment with rapidly
changing deadlines, workloads and goals.
Work with information security, technical and solutions architects
where necessary to understand how design choices support security
being built into the service.
PRICING MODEL
Customer’s preferred pricing model or models, for SOWs that may be awarded as a consequence of this
Further Competition, are shown in the following table:
PRICING MODEL
PROJECT PHASES
Time and materials
Discovery
Capped time and materials
Alpha (plus Beta and Live should we proceed to these
phases)
CUSTOMER LOCATIONS
Digital Services Framework Agreement - RM1043
Document1
Page 14 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
UK REGION
CUSTOMER LOCATIONS: CITIES OR TOWNS
London and South East of England
Rose Court, 2 Southwark Bridge, London SE1 9HS or
102 Petty France, London SW1H 9AJ
Digital Services Framework Agreement - RM1043
Document1
Page 15 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
TEST & DEVELOPMENT REQUIREMENTS
The IDAM solution will be hosted on the Common Platform. Environments will be created as required and
remote access will be provided. The IDAM project team and other Ministry of Justice staff will require access
to these environments as development progresses in order to support the applications.
Digital Services Framework Agreement - RM1043
Document1
Page 16 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
ADDENDUM A
CJS Common Platform
Programme IDAM Project Requirements: Lot
3: Central IDAM Services
Digital Services Framework Agreement - RM1043
Document1
Page 17 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
REQUIREMENTS FOR IDAM COMPONENTS
1.1
Requirements context
1.1.1
For each component, functional and non-functional requirements are presented for the strategic
solution and the interim solutions required in the short-to-medium term (next 12-18 months). The
MoSCoW method has been used to prioritise the requirements, with the following interpretation:
1. Must: these requirements must be satisfied for the solution to be successful;
2. Should: these are high-priority or critical requirements that should be included if possible,
but workarounds may be possible;
3. Could: these requirements are nice-to-have and would be worth including but are not
worth significant investment; it should be noted that these requirements may be
strategically very important but rated as “Could” for interim solutions where is as
assumed that they will be covered by other components of the programme;
4. Won’t: these requirements will not be implemented; requirements are only rated as
“Won’t” for interim solutions to emphasise their difference from strategic solutions.
1.1.2
Requirements for the Common Platform Point of Access Solution (Lot 3a)
1.1.2.1
The requirements for the Common Platform Point of Access solution for all user groups are
shown in Table 0-1.
ID
Requirement
Priority
Justification
Functional requirements
CF1
The Point of Access solution will
present an initial page to potential
users, which invites users to supply
credentials via an authorised IdP or
IDAM hub service.
Must
There will need to be a front door that
enables potential users to log on to
the system. Credentials will be
supplied via an external IdP. For GDS
IDA IdPs, communication will be via
the hub.
CF2
The Point of Access solution will
deny access to the Common
Platform to unauthorised users.
Must
Unauthorised users should not have
access to the system.
CF3
The Point of Access solution will
allow users to log in by supplying
appropriate credentials to an
approved Identity Provider (IdP).
Must
This is the primary purpose of the
Point of Access service.
CF4
The Point of Access solution will
provide a list of appropriate and
approved IdPs to users from which
to select.
Must
This functionality is required to ensure
usability of the system. The list will
need to be appropriate to the access
channel being used. It will include all
PSN authentication providers and any
non-IDA internet-facing IdPs.
CF5
The Point of Access solution will
Must
enable other services to provide
users with a list of appropriate and
approved IdPs from which to select.
Digital Services Framework Agreement - RM1043
Document1
For IDA, the list of approved IdPs will
be provided by the IDA hub. This
functionality is required to ensure
usability of the system.
Page 18 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
ID
CF6
Requirement
Priority
The Point of Access solution will
Must
allow users to select which IdP they
wish to use, either directly or via an
authorised hub service.
Justification
The solution must support multiple
IdPs, determined by type of user. The
list of IDA IdPs will be provided by the
IDA hub service. Other IdPs will
interact directly.
Integration and connectivity
CF8
The Point of Access solution will
integrate using open standards.
Must
The Common Platform architecture
involves a federated identification
approach. Open standards are
required in accordance with
Government and MoJ ICT policy.
CF9
The Point of Access solution will
be able to integrate with external
components using SAML 2.0.
Must
SAML 2.0 is the de-facto standard
for federated identity and is used in
nearly all implementations. It has
been adopted by the Cabinet Office
for the IDA and the PSN service
federated identity schemes.
CF10
The Point of Access solution will
be accessible via the Internet
Must
Users will be accessing Common
Platform applications via the internet.
CF11
The Point of Access will be
accessible via the PSN or GSI
Must
Users will be accessing Common
Platform applications via the GSI and
PSN, albeit through different
instances of the Point of Access.
CF12
The Point of Access solution will
be able to integrate with current
and future Common Platform
applications to enable authorised
users to securely log in to
Common Platform services using
their provided identity and
associated credentials.
Must
Allowing authorised users to log in to
applications is the primary purpose
of the solution.
CF13
The Point of Access Solution will
produce logs that can be passed to
an external Protective Monitoring
Service.
Must
This is required to enable Protective
Monitoring across the Common
Platform.
Non-functional requirements
Security
CN1
The Point of Access solution will be
accredited, or accreditable, to
include data that has an impact
level of OFFICIAL - SENSITIVE.
Must
The Common Point of Access solution
should not be handling any data
above OFFICIAL - SENSITIVE.
CN2
The Point of Access solution will
satisfy the PSN connectivity
requirements.
Must
This is required for integration with the
PSN service.
Digital Services Framework Agreement - RM1043
Document1
Page 19 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
ID
Requirement
Priority
Justification
CN3
The Point of Access solution will
satisfy the GDS IDA connectivity
requirements.
Must
This is required for integration with the
GDS IDA.
CN4
The Point of Access solution will
validate the authenticity of SAML
tokens received from external
parties by verifying that they have
been digitally signed by a trusted
source.
Must
The Common Point of Access
Solution will need to validate that
authentication assertions have been
made by trusted and authorised
services.
CN5
The Point of Access solution will be Must
able to receive structured data
(XML or JSON) and validate against
a known schema.
This is required to ensure that the
contents of the SAML tokens are
valid.
CN6
The solution will secure
Must
communications using an Extended
Validation (EV) certificate so that
users can verify that the service can
be trusted.
Users will need to be able to have
strong assurance in the identity of the
service so that they can be confident
in the security of the website.
CN7
The solution will be able to pass
Must
structured data (XML or JSON) from
a SAML token across a bridge.
This is required to meet Pan
Government Accreditor (PGA)
requirements.
CN8
The Point of Access solution will
produce logs that can be passed to
an external Protective Monitoring
Service.
Must
This is required to enable Protective
Monitoring across the Common
Platform.
CN9
The solution will timeout a user’s
session after a configurable period
of inactivity.
Must
This is required to prevent a user
accidentally leaving themselves
logged into the system.
The Point of Access solution will
support 45,000 Internet users
(including 25,000 Magistrates and
20,000 users within defence
organisations) and 15,000 Public
Sector users (mainly from HMCTS
and CPS), accessing the services
via GSI or PSN.
Must
This is based on known requirements
up to 2016. The exact quantification of
this requirement will need to be
determined subsequently, when the
full set of business requirements have
been identified.
Over time this component will need to
support the full set of Common
Platform users.
Capacity
CN12
Performance
Digital Services Framework Agreement - RM1043
Document1
Page 20 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
ID
Requirement
C13
Priority
Justification
The Point of Access solution will be Must
able to pass at least 6,000 matching
requests per minute to the CJS
Common Platform Matching
Service.
With a large number of potential users
it is expected that there will be a
number of concurrent authentication
requests. At peak times of day (based
on 10% of users authenticating at
peak times).
The exact quantification of this
requirement will need to be
determined subsequently, once the
full set of business requirements have
been identified.
The Point of Access solution will
achieve an appropriate level of
availability.
Must
The exact quantification of this
requirement will need to be
determined subsequently, once the
full set of business requirements have
been identified.
This component will have a high
availability as it is required for all
access to the Common Platform.
Please provide options for standard
service levels
Availability
CN14
Disaster recovery
CN15
Should the Point of Access solution
fail, it will be restored within an
acceptable time.
Must
The exact quantification of this
requirement will need to be
determined subsequently, once the
full set of business requirements have
been identified. Please provide
options for standard service levels
CN16
Should the Point of Access solution
fail, no data shall be lost that has
been stored on the system more
than an acceptable time.
Must
The exact quantification of this
requirement will need to be
determined subsequently, once the
full set of business requirements have
been identified. Please provide
options for standard service levels
Table 0-1: Requirements for the Common Point of Access Solution
1.1.3
Requirements for the Common Platform Matching Service
1.1.3.1
The Common Platform will require a Matching Service. The requirements for the Common
Platform Matching Service are shown in Table 0-2.
1.1.3.2
To avoid duplicating requirements it should be noted that in addition to functional requirements
listed below for the matching service, the solution shall provide the appropriate Capacity,
Performance, Availability and Disaster Recovery (DR) service capabilities (CN12-16) indicated
above for Lot 3a: Common Point of Access.
ID
Requirement
Digital Services Framework Agreement - RM1043
Document1
Priority Justification
Page 21 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
ID
Requirement
Priority Justification
Functional requirements
MF1
The CP Matching Service shall
receive incoming access
requests, match against
authorised users and issue an
appropriate token to assert the
Common Platform applications
that they have access to.
Must
This is the primary purpose of the
matching service.
MF2
The CP Matching Service will
identify which applications a
Common Platform user has
access to.
Must
This forms part of the access
control solution for the Common
Platform. Individual applications will
maintain their own RBAC for
application-specific functionality.
MF3
The CP Matching Service will
support multiple identities for
any CP user.
Must
Individual users may have multiple
identities from different identity
providers (e.g. at different
strengths) but will need to access a
common account.
MF4
The CP Matching Service will
support multiple access
channels for any CP user.
Must
Individual users may have multiple
identities from different identity
providers with different access
channels (e.g. via the PSN and via
the Internet).
MF5
The CP Matching Service will
access information from the
Directory Service.
Must
The Directory Service will be the
single master source of CP
account information.
MF6
The CP Matching Service will
define a single Common
Platform Unique Identifier
(CPUI) for each user.
Must
The CPUI will form the global
identifier for users across the
Common Platform applications.
MF7
The CP Matching Service will be Must
able to match using the GDS
IDA profiles.
Exploiting the GDS IDA scheme
will facilitate the delivery of the
Common Platform objectives.
MF8
The CP Matching Service will be Must
able to match using the PSN
service profiles.
Exploiting the PSN service scheme
will facilitate the delivery of the
Common Platform objectives.
MF9
The CP Matching Service will be Must
configurable so that the set of
attributes to be provided by
Identity Providers when
identifying individuals can be
defined.
It will be necessary to ensure that
identified individuals can be
matched to ensure that they are
authorised. There should be some
flexibility in this implementation to
facilitate additional identity
providers.
MF10
The IDA Matching Service
component (of the overall CP
Matching Service) will be
separate from the Point of
Access Service.
This is required for privacy reasons
by the GDS IDA requirements.
Digital Services Framework Agreement - RM1043
Document1
Must
Page 22 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
ID
Requirement
Priority Justification
MF11
The IDA and PSN service
Could
components of the CP Matching
Service will be able to be shared
across multiple services within
Government Departments
including the Ministry of Justice
and the Crown Prosecution
Service.
This is not a specific Common
Platform requirement, but re-use
within the department would
enable greater value-for-money to
be achieved by the Ministry of
Justice and CPS from the
investment.
Integration and connectivity
MF12
The CP Matching Service will
integrate using open standards.
Must
The Common Platform architecture
involves a federated identification
approach. Open standards are
required in accordance with
Government and MoJ ICT policy.
MF13
The CP Matching Service will be Must
able to integrate with external
components using SAML 2.0.
SAML 2.0 is the de-facto standard
for federated identity and is used in
nearly all implementations. It has
been adopted by the Cabinet
Office for both the IDA and PSN
service federated identity schemes.
MF14
The CP Matching Service will be Must
able to receive structured data
(XML or JSON) and validate
against a known schema.
This is required to meet Pan
Government Accreditor (PGA)
requirements
MF15
The CP Matching Service will
Must
produce logs that can be
passed to an external Protective
Monitoring Service.
This is required to enable
Protective Monitoring across the
Common Platform.
Non-functional requirements
Security
MN1
The CP Matching Service will be Must
accredited, or accreditable, to
include data that has an impact
level of OFFICIAL - SENSITIVE.
The CP Matching Service
potentially enables full access to
the Common Platform and will
need to be protected to a high level
to ensure the security of the overall
system.
MN2
The CP Matching Service will
Must
validate requests received to
assure trust between matching
service and the point of access.
The matching service needs to be
protected to a high level to ensure
the security of the overall system.
MN3
The CP Matching Service will
Must
maintain data confidentiality and
integrity.
The matching service should not
be vulnerable to data being
infected or changed by
unauthorised sources.
Digital Services Framework Agreement - RM1043
Document1
Page 23 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
ID
Requirement
Priority Justification
MN4
The CP Matching Service will be Must
protected but accessible from
the internet.
The service must be protected from
unauthorised access from the
internet to preserve integrity of
data but must enable
communication with the IDA Hub.
MN5
The CP Matching Service will
satisfy the PSN connectivity
requirements.
Must
This is required for integration with
the PSN service.
MN6
The CP Matching Service will
Must
satisfy the GDS IDA connectivity
requirements.
This is required for integration with
the GDS IDA.
Capacity, Performance, Availability and DR – see CN 12-16
Table 0-2: Requirements for the Common Platform Matching Service
1.1.4
Requirements for the Common Platform Directory Service
1.1.4.1
The Common Platform will require a Directory Service. The requirements for the Common
Platform Directory Service are shown in Table 0-3.
1.1.4.2
To avoid duplicating requirements it should be noted that in addition to functional requirements
listed below for the Directory service, the solution shall provide the appropriate Capacity,
Performance, Availability and Disaster Recovery (DR) service capabilities (CN12-16) indicated
above for Lots 3a and 3b.
ID
Requirement
Priority Justification
Functional requirements
DF1
All information used by the
Access, Account, Matching and
Enrolment services will be
stored in the Directory Service.
Must
A single repository is required to
ensure cohesion of the overall
programme architecture.
DF2
The Directory Service will
support a single account for
each user, regardless of the
number of access channels /
identities of that user.
Must
This is required both for
accountability and usability
purposes.
DF3
The Directory Service will
Must
produce logs that can be
passed to an external Protective
Monitoring Service.
Digital Services Framework Agreement - RM1043
Document1
This is required to enable
Protective Monitoring across the
Common Platform.
Page 24 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
Integration and connectivity
DF3
The Directory Service will
Must
integrate using open standards.
The Common Platform
architecture involves a
federated identification
approach. Open standards are
required in accordance with
Government and MoJ ICT
policy.
DF4
The Directory Service will
support the synchronisation of
the Directory information with
Common Platform applications,
including the CPUI.
It will necessary to share the
common user account
information with applications to
ensure that they are also able to
access it. Where central
directory information is held by
applications, they shall be readonly copies that are updated
from the master central
directory.
DF5
The Directory Service will
Must
provide a capability to enable
users within Common Platform
applications to request changes
to the directory information and
to mediate any updates.
Should
Applications may need to
initiate changes to central
directory information. This
needs to be mediated by a
central component to ensure
consistency. This could be
achieved by redirecting access
to a central user interface, or by
providing appropriate system
interfaces.
Non-functional requirements
Security
DN1
The CP Directory Service will be Must
accredited, or accreditable, to
include data that has an impact
level of OFFICIAL - SENSITIVE.
The CP Directory potentially
enables full access to the
Common Platform and will need
to be protected to a high level to
ensure the security of the
overall system.
DN2
The CP Directory Service will
validate requests received to
assure trust between matching
service and the Directory.
The Directory needs to be
protected to a high level to
ensure the security of the
overall system.
DN3
The CP Directory Service will
Must
maintain data confidentiality and
integrity.
Digital Services Framework Agreement - RM1043
Document1
Must
The Directory should not be
vulnerable to data being
infected or changed by
unauthorised sources.
Page 25 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
DN4
The CP Directory Service will
not be accessible directly from
the internet,
Must
The Directory must be protected
from unauthorised access from
the internet to preserve integrity
of data. There is no need to
directly access the Directory
from the internet and all access
should be mediated via other
components.
DN5
The CP Directory service will
allow secure management
access only for appropriately
authorised super users.
Must
The Directory must be protected
from unauthorised to preserve
integrity of data.
DN6
The CP Directory service will
provide secure storage with
encryption at rest.
Must
The CP Directory will contain
sensitive personal information
and will need to be protected to
a high level to ensure the
security of the overall system.
Capacity, Performance, availability and Disaster Recovery – see CN 12-16
Table 0-3: Requirements for the Common Platform Directory Service
1.1.5
Requirements for the Common Platform Enrolment and User Account Management
Service
1.1.5.1
The Common Platform will require an Enrolment and User Account Management Service. The
requirements for the Common Platform Enrolment and User Account Management Service are
shown in Table 0-4.
1.1.5.2
To avoid duplicating requirements it should be noted that in addition to functional requirements
listed below for the Directory service, the solution shall the appropriate Capacity, Performance,
Availability and Disaster Recovery (DR) service capabilities (CN12-16) indicated above for Lots
3a, 3b and 3c.
ID
Requirement
Priority Justification
Functional requirements
EF1
The Enrolment and User
Account Management solution
will enable applications and
other technical components to
request account information
relating to individuals (e.g.
through a web services
interface).
EF2
The Enrolment and User
Must
Account Management solution
will only provide information that
an application is authorised to
receive.
Digital Services Framework Agreement - RM1043
Document1
Must
Applications will need access to
information maintained by the
Enrolment and User Account
Management solution.
Applications should only be granted
access to information where there is
a business need – for example
applications should only be given
information regarding Common
Platform users that have been
enrolled with that application.
Page 26 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
EF3
The Enrolment and User
Account Management solution
will enable users to view their
own account attributes.
Must
Users will need to be able to view
account information so that they can
check that it is correct.
EF4
The Enrolment and User
Account Management solution
will enable users to modify
certain account attributes.
Must
The user will need to be able to
change some account information,
such as preference information.
EF5
Users will only be able to view
their own information and not
that of other users.
Must
Users only need to view their own
information and privacy must be
maintained.
EF6
The Enrolment and User
Account Management solution
will enable administrators to
suspend/disable accounts.
Must
It will be necessary to disable
accounts if it is suspected that the
credentials have been compromised.
EF7
The Enrolment and User
Account Management solution
will enable administrators to
unlock/re-enable accounts.
Must
It will be necessary to enable
accounts that have been locked or
suspended once the reason for
suspension has been resolved.
EF8
The Enrolment and User
Must
Account Management solution
will enable administrators to add
accounts.
It will be necessary to add accounts
for new users.
EF9
The Enrolment and User
Account Management solution
will enable administrators to
delete accounts.
Must
It will be necessary to delete
accounts when they are no longer
required.
EF10
The Enrolment and User
Account Management solution
will enable administrators to
modify account information.
Must
Maintenance of account information
will be required.
EF11
The Enrolment and User
Account Management Service
will access and store
information in the Directory
Service.
Must
The Directory Service will be the
single master source of CP account
information.
Integration and connectivity
EF12
The Enrolment and User
Account Management Service
will integrate using open
standards.
Must
The Common Platform architecture
involves a federated identification
approach. Open standards are
required in accordance with
Government and MoJ ICT policy.
EF13
The Enrolment and User
Account Management Service
will be accessible over the
internet for administrative
functions by appropriately
authorised administrators over
enhanced secure access.
Must
Administrative Super Users will need
to securely access the enrolment
and account management service
over the internet for administrative
purposes.
Digital Services Framework Agreement - RM1043
Document1
Page 27 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
EF14
The Enrolment and User
Account Management Service
will be accessible over the GSI.
Must
Administrative super users will be
accessing enrolment and account
management services via the GSI.
EF15
The Enrolment and User
Account Management Service
will be accessible over the PSN
with IPED (IL3).
Must
Administrative super users will be
accessing via the PSN (Previously
IL3).
EF16
The solution shall provide
functionality to support the
enrolment of authorised CP
users.
Must
It will be necessary to enrol further
users for Common Platform
applications. This requirement will
need to be expanded once further
business requirements have been
identified.
EF17
The Enrolment Service shall
Should
support the rapid provisioning of
users.
There are likely business
requirements for new users to gain
access to the Common Platform very
quickly (e.g. minutes rather than
hours/days), such as a duty solicitor
or barrister. While there are a
number of potential technical
solutions to this issue, rapid
provisioning of users will ensure that
accountability is maintained.
EF18
The CP Enrolment Service will Must
produce logs that can be
passed to an external Protective
Monitoring Service.
This is required to enable Protective
Monitoring across the Common
Platform.
Non-functional requirements
Security
EN1
The Enrolment and User
Must
Account Management Service
will be accredited, or
accreditable, to include data that
has an impact level of
OFFICIAL - SENSITIVE.
The Enrolment and User Account
Management potentially enables full
access to the Common Platform and
will need to be protected to a high
level to ensure the security of the
overall system.
EN2
The Enrolment and User
Account Management Service
will support appropriate
authentication measures.
Must
The Common Platform will hold
sensitive personal data and it is
important that it is only provided to
authenticated requestors. The
strength of authentication will
depend on the level of trust in the
environment from which it is being
requested.
EN3
The Enrolment and User
Account Management Service
will support appropriate
confidentiality measures.
Must
The Common Platform will hold
sensitive personal data and it is
important that it is provided securely.
The strength of authentication will
depend on the level of trust in the
environment from which it is being
requested.
Digital Services Framework Agreement - RM1043
Document1
Page 28 of 29
Request for Proposal
Digital Services Framework Agreement – RM1043
Capacity, Performance, Availability and Disaster Recovery – see CN 12-16
Table 0-4: Requirements for the Common Platform Enrolment and User Account Management
Service
Digital Services Framework Agreement - RM1043
Document1
Page 29 of 29