Page tree
Skip to end of metadata
Go to start of metadata
This chapter describes the requirements that apply to the information security measures that are implemented.

  • Digital signature
  • Encryption
    • SAML encryptionEncryption in combination with SAML is achieved via XML-encryption. This paragraph provides an explanation of encrypted elements as well as elements encrypted to multiple recipients.
  • End-to-end encryptionEnd-to-end encryption is applied in Elektronische Toegangsdiensten to protect privacy of anyone (acting users) or organisations (especially "single person businesses" or "eenmanszaak"). The BSN is one of the main privacy concerns, following from Dutch law, but other personally identifiable information must also be protected. Using end-to-end encryption as described on this page avoids an Herkenningsmakelaar (HM) becoming an unintended hotspot for information on service usage.
  • PKIoverheid
  • Secure connection
  • Secure cookies
  • Synchronize system clocks

  • No labels