IDnomic for users – PKI and CMS solutions

Protect the digital identities of your users

IDnomic for users: employees, customers, citizens

IDnomic for users provides physical person authentication for access to information technology systems and e-Services as well as for exchanging information in complete security.

With IDnomic for users:

► Reinforce the overall security of your information system by protecting users’ identities and securing their digital journey

Combine security and ease of use, facilitate your organization’s mobility and build a secure BYOD (Bring Your Own Device)

Enjoy the benefits of using physical smart cards, highly accessible virtual smart cards and tokens to provide a higher level of user authentication.

To follow or contact us:
Linkedin | Twitter

IDnomic for users: use cases

IDnomic-acces_poste

Workstation access

Overall information system security, protection against data theft, quick and easy access.

Securely access your workstation using strong authentication, a combination of at least two of the following independent factors:
Physical factor: smart card, USB token…
Memorized factor: password, PIN…
Biometric factor: vein pattern…

E-Service access

Mobility facilitator, automatic access without password, protection of applications and sensitive resources.

Securely access an IT resource via VPN or Wi-Fi (strong authentication possible) or an app /e-Service with no login or password.

Exchange a symmetric key to encrypt and protect communications.

IDnomic-protection_emails

E-mail protection

Security of critical e-mails, protection against phishing and spoofing, ease of use.

Authenticate the sender and guarantee message integrity.

Encrypt data in an email to ensure that only intended recipient can read.

IDnomic PKI components optimize operations and achieve a high level of performance, each component playing an important role in the delivery and management of digital identities.

Modular, interoperable and scalable

 A modular, upgradeable multi-tier architecture that facilitates deployment and integration while providing a customer-oriented web interface.
 Web services that simplify integration into your company’s current or future environment.
 Scalable solution for mission-critical environments of all sizes.

Efficient and flexible

 Produces and administrates millions of certificates to better serve large-scale IoT deployments.
 Components are installed on premise or deployed from the Cloud.

Compatible and compliant

 Manages cryptographic devices (HSMs, smart cards, tokens).
 Compatible with certificate management and online data transfer security protocols (SCEP, SSL/TLS, EST etc.).
 Complies with eIDAS and French RGS.



Credential management system

The CMS enables complete management of user certificate lifecycles and facilitates the global administration of cryptographic media, providing administrators with a single and secure system to manage all user identities.

 Certificate enrollment, creation of specific containers for each application.
 Pre and post-issuance of smart cards and the associated secrets: PIN, PUK and activation codes.
 Batch enrollment of certificates and per request in self-care service mode: unlocking of card, change of PIN code.
 Comprehensive graphical and electric smart card personalization.
 Device enrollment management procedures: self-enrollment, badge office, pre-personalization, distribution and assignment to holders.
 Device management procedures: generation of temporary replacement cards, declaration of device loss or theft, automatic migration or renewal of cryptographic content, device recycling and remote unlocking.
 Cross-cutting services: logging, notification, publication, audit and rights management.
► Thin client to assist users in their everyday operations (card initialization, assignment, change of PIN code, remote unlocking of locked card, secret recovery, etc.) both online and offline.

Automation modules

IDnomic PKI delivers digital identities to machines and objects thanks to a broader set of modules and features. The solution supports the protocols that help simplify certificate management.

 Simple Certificate Enrollment Protocol (SCEP) support for certificate-based authentication of network components (routers, VPN concentrators).
 Enrollment over Secure Transport (EST) protocol support for easy certificate management.
 Automatic Certificate Management Environment (ACME) protocol support allows web servers to simply and automatically retrieve certificates.
► Certificate Management Protocol (CMP) support for obtaining certificates (available soon).
► WCCE / CMC protocol support to enable automatic certification of devices in a Microsoft Windows environment. ID RA implements this protocol through IDnomic’s Auto-Enrollment Proxy (AEP).

IDnomic offers the deployment method that best suits your needs

With our on-premise offer, our solutions are installed in your infrastructure. You benefit from increased autonomy in terms of configuration while managing security at the local level.

Organizations must deliver security services such as digital signature, user authentication and confidentiality of data exchanges quickly and cost-efficiently. Discover our Trust Infrastructure Appliances >>

Both our cloud offerings help you save on the induced costs of operating a local infrastructure while ensuring the highest standards in terms of security, performance and availability coupled with an ongoing upgrade that guarantees covering updates and maintenance.

► Cloud in “configuration” mode means you stay in control of the configuration and parameters of your security services.

 Cloud in “use” mode allows you to focus on securing your digital practices while we take care of everything else.

Type of deployment

On-premiseCloud “Setup” modeCloud “user” mode
Easy
Implementation
✔✔✔✔✔
IDnomic’s
guarantee
✔✔✔✔✔
Configuration
Autonomy
✔✔✔✔✔
Savings on
IT & Staff costs
✔✔✔✔✔

Consulting division

Our consulting team of highly experienced professionals helps you to design and implement secure digital identities in complex environments to achieve a successful digital transformation, in line with your cybersecurity strategy. Benefit from our experience and technology to protect your users, objects, machines, documents and transactions.

Migrate your PKI to the cloud
Secure mobility for your business
Use biometrics to enhance security
Extend security to your new use cases
Optimize the way you use your PKI
► 
Comply with eIDAS for e-signature
► 
Secure your IoT infrastructures
Protect your data, comply with GDPR.

Cloud services

To offer a high-level, trusted service aligned with clients’ needs, IDnomic provides a secure, high-performing cloud infrastructure, based on audited, certified and labelled software, hardware, policies and operational procedures.

Tier 4 security: Atos’s datacenter offers best-in-class guarantee and compliance with the most stringent standards
French RGS regulation and eIDAS certified datacenter
Datacenter security and disaster recovery plan
IDnomic solutions is in the process of getting SecNumCloud certified
Atos’s datacenters offers high-quality, reliable, efficient and fully secure services.

Project management

You’ll benefit from sound advice and know-how acquired through our extensive experience in wide-scale project rollout for international key accounts. A single point of contact centralizes actions and synchronizes all IDnomic services. To ensure we fulfill our commitments, we conduct risk analysis at the beginning of your project to evaluate any points requiring special attention, and schedule regular check-ups for rigorous milestone monitoring.

Risk analysis and management
Technical and functional expertise
Sound knowledge of standards (eIDAS, RGS, etc.)
Collaborative workshops to build your skills and ensure close collaboration
► Anticipation of integration issues in customer environment
 Proven key ceremony procedures…

Secrets management

Establishing a trust environment that is closely aligned with use cases requires to secure the infrastructure and software used to generate and store digital identities. Atos guarantees a maximum level of security by performing key ceremonies in a highly secure environment.
The conditions for generating and storing cryptographic keys are defined during the key ceremony. These keys are generated and stored directly in a cryptographic hardware security module (HSM).

Key custodians ensure the secrecy and are requested to be physically present during the  key ceremony. The procedure is led by a master of ceremonies in a secure, fully isolated room located at IDnomic’s premises. Based on stringent, clearly defined and established procedures, the key ceremony makes it possible to:

► Create and renew certification authorities
► Create a certification authority revocation list
► Migrate HSMs when equipment reaches the end of its life
► Move from an on-premise PKI to IDnomic’s SaaS PKI.

Once the ceremony has been completed, a session is held to archive the cryptographic keys in a secure space or vault.

The key ceremony and vault deposit are crucial procedures for ensuring that certification authorities are held securely, they also provide an assurance  to clients that their secrets are generated and stored in accordance with the industry best practices and that they can have real confidence and trust in the environment created by IDnomic for their needs.

Room security

IDnomic’s facilities are compliant with the strictest security requirements. These are dedicated rooms designed specifically for storing secrets.

Effective access identity control

► Strong authentication access control for authorized people (badge and biometrics)
► Double-control for room access.

24-7 video surveillance and intrusion detection

► Video surveillance and recording of access
► Alerts for entries at unauthorized times.

Access traceability management

► Video recording
► Entry and exit logs for this room.

Client support

IDnomic’s team is committed to offering you the best possible experience, with services aligned with your needs and the best software support. You will be able to quickly and efficiently benefit from our experts and their capacity to innovate.

Service guaranteed at all times

Our hotline service offers three levels of support to assist you throughout working hours without interruption. You also have access to the support portal for reporting incidents, discussing with our technical teams and tracking bugs’ resolution. We apply escalation procedures to ensure critical issues are addressed as quickly as possible.

Times: 9am-6pm Monday to Friday
Email and hotline
Support services management platform
24-7 Cloud support.

24/7 Cloud support with IDnomic’s team

Our teams guarantee a continuous service, optimized over time. They provide a full lifecycle management for applications and services (software updates, operating systems, servers, cryptographic equipment etc.).

A Service Delivery Manager team is responsible of ensuring a quality of service and providing visibility on the performance of the solution deployed. This team also organizes steering committees to look at potential optimizations and identify new requirements.

Centralized support for optimum service

A support services management platform enables you to centralize the management of your requests and requirements:

► Management of incident tickets, monitoring of progress and resolution
► Documentation
► New versions and updates
► Announcement of new features
► Access to the knowledge base
► Service level reports and statistics (exclusively on the Cloud).

You also have a log collection tool for quick and comprehensive analysis of any event. This helps us to quickly identify issues and resolve incidents efficiently.

Lifecycle guarantee for our software

IDnomic’s software are constantly evolving and offering new features and new compatibilities with the ecosystem. You benefit from the most recent software releases and updates thanks to our support services management platform. IDnomic ensures that you have the most secure and stable software at all times.

To extend your software use or deploy your service on more digital identities, please contact our sales team.

 TimeStamp token solution: Demonstrate when transactions took place or documents were archived with a timestamp solution  >>

► Certificate validation: Access certificate’s status in real time  >>

► Blockchain: What are the security solutions for Blockchain? >>

Training

Professional training is a key success factor for businesses today. It enables them to develop their employees’ skills and support the structural and organizational changes needed to meet their business’ challenges.
IDnomic is a certified training organization (accreditation number: 11 92 19072 92), registered with the Paris Region’s Regional Directorate for Business, Competition, Consumer Affairs and Employment (DIRECCTE).

IDnomic’s training program is designed to develop your own skills and is for Security Officers, PKI solution operators, IT company staff, project managers, systems and network architects / administrators…

>> Training program

Related resources

Atos cybersecurity IDnomic solutions brochure

Brochure

IDnomic – Digital identity solutions

With IDnomic solutions, discover four digital identity solutions based on our PKI technologies are available to secure all your digital practices.

Brochure

IDnomic ID PKI Suite – Digital identity platform

ID PKI suite, the digital identity platform by IDnomic, helps you protect digital data transfers and manage credentials stored in any type of cryptographic device, while meeting the highest criteria when it comes to security, quality and robustness.

Atos cybersecurity IDnomic Services brochure

Brochure

IDnomic – Services for your digital trust

To help you place digital trust at the very heart of your business, IDnomic teams are at your service at each stage of your project to fulfi ll your strategic choices and ambitions and to help you place digital trust at the very heart of your business.

 

Discover PKI and HSM solutions

IDnomic for documents

Protect the digital identities to a physical or electronic document.
Visit solution page >

IDnomic for objects

Protect the digital identities of your machine and connected object.
Visit solution page >

IDnomic for transactions

Provide the information needed to verify the digital identity.
Visit solution page >

Trustway HSM

Ensure to your company a total sensitive data protection
Visit product page >

Interested in our IDnomic for users and PKI solutions?