Security and Privacy

Who is allowed to read out data?

Your data is secure! Only someone in possession of your ID card and with knowledge of your PIN is able to allow information to be transmitted. Your personal data is thus protected against abuse on the Internet.

Who is allowed to read out data? A service provider requires authorization (authorization certificate) from the Federal Office of Administration to request your data. This authorization is checked by your ID card each time any data is requested, so you always know to whom you are transmitting your data.

Which data is read out? Before each data transmission, the data to be transmitted is shown. You can then accept the transmission or cancel the process.When is the data read out? Your data will only be transmitted after you have confirmed your acceptance by entering your PIN.Are third parties able to read the data? The transmission is always encrypted, so that third parties are unable to read any data.

2 factor authentication

Principle of possession and knowledge

The two-factor authentication serves to prove the identity of a user by means of the combination of two different and in particular independent components (factors).
The principle of possession and knowledge is used for German National ID cards and electronic residence permits. The online ID with an activated online ID function alone is not sufficient for an authentication. This requires the second factor knowledge of the assigned six-digit PIN.

Mutual Authentication detection

Providers and users mutually assure each other their identity

Most authentication procedures determine only the identity of the user. The online identification function is based on the principle of mutual authentication: The user's identity is confirmed by both the use of the ID card and the PIN entry to transfer / release the requested data. The service provider is also obliged to identify itself. This is done by means of an authorization certificate which is to be obtained from the Vergabestelle für Berechtigungszertifikate at the Federal Office of Administration prior to offering said services. Only service providers granted such authorization certificates, are allowed to offer services based on the online identification function.

Encypted data exchange via eID server

The eID server consists of hardware and software components run by the service provider to integrate the eID function into its IT systems. The eID server fulfils the following tasks:

  • It ensures the secure communication with the client software and the ID card's chip and transmits the data retrieved to the relevant service.
  • It verifies the authenticity and validity of the ID card, examines whether it has been blocked by the ID card holder and transmits the results of the eID function to the other systems of the service provider.
  • It regularly receives new authorization certificates from the authorization certificates provider and updated revocation lists.

As a service provider you can develop your own eID server as long as the hardware and software modules comply with the requirements of the relevant Technical Guidelines of the Federal Office for Information Security. This is necessary to execute cryptographic protocols with the new ID card's chip and regularly receive the required authorization certificates and revocation lists.

More information on www.personalausweisportal.de.

Technical guidelines and protection profiles regarding electronic ID documents

There are various technical guidelines and protection profiles for the different electronic ID documents. These refer to both the documents and the readers, ranging from application via issue through to readout.

A list of all of the technical guidelines, sorted according to the TR-number is provided on the website of the Federal Office for Information Security.