eID Lifecycle Management

The domain of issuing identifications is a fundamental government task. Electronic Identity Lifecycle Management involves several complex processes that ensure the trustworthiness of the issued digital identification.


A given person might have dozens of different electronic identities online. But only one that corresponds to the real person behind the computer screen.

In order to boost innovation and create trust-based digital services that will support end-to-end business processes, it’s important to implement effective and efficient eID lifecycle management that covers the entire lifespan of that eID. The lifecycle of an electronic identity is in constant motion. We must create the eID, store it, use it online, delete, change, re-use again and again in a long cycle.

Identity management helps address the risks associated with human interactions and increases confidence between the interacting parties.

Building an effective identity management system is a complex task of balancing availability with security and privacy. Corresponding trust services will provide a secure infrastructure to exchange information related to digital identity or validate claimed identity in real-time.


How can Nortal help?

Electronic Identity management is a constantly developing process – it changes with the surrounding environment because the demands within such solution are in constant change.

Therefore, every project requires a unique approach. Nortal helps customers with tailor-made solutions based on their specific needs and local environment. Therefore, we understand the need for a redesigned process that policy-makers can sustain with local legal alignment.


The pillars of eID Lifecycle Management

Successful implementation of electronic identity does not end with issuance and technology. In fact, eID success lies on the balanced development of four pillars: legal infrastructure, technology, services, human behavior and inclusion.

With over ten years of experience building e-Government solutions, Nortal has brought world class e-Government and eID specific knowledge, experience, and capability as a quality delivery partner to several government institutions.

Pillar 1

Legal Infrastructure

Implementation of digital identification leads to re-engineering organizational processes. The corresponding legal framework is a crucial element in order to ensure acceptance and trust of the digital identification.
It is important to increase public awareness of possibilities and potential risks involved, as well as understanding of the legal consequences of digital identifications.

Understanding the possibilities that digital identification creates encourages people to use them.

The legal framework of eID can be divided into a number of steps. Furthermore, the number of steps might increase over time as the system grows and becomes more complex. But initially there are four main steps:

  • Regulation of physical identity management on what eID will be based on;
  • Defining eID issuance, revocation process, roles and responsibilities;
  • Framework that ensures virtual proceedings shall be equal to physical;
  • Setting eID as vital part of the state ecosystem.

Technical Infrastructure

There are many different technological approaches for digital identification. But it all comes down to the trustworthiness of the issuer, the security level of the carrier and the infrastructure behind it.

Finding a suitable technological solution is a task of balancing security measures and the ease of use. Nonsecure eIDs will lead to identity theft. Then again, a too secure eID will not be widely implemented.

Government issued and nationally accepted digital identities are usually issued on national ID-cards (smartcards with contact or contactless chip) or in mobile form (i.e. mobile IDs). These eIDs usually rely on a secure token which carries the eID holders’ personal information.

The amount of information stored on the carrier varies and typically relies on the integration stage of Population Registry and overall e-Government solutions.

It’s important that issued digital identities can be verified online and are secure from possible forgers. Public Key Infrastructure will provide necessary confirmation and authenticity.

Pillar 3


Successful adoption of eID relies on the amount of relevant services that individuals, authorities or institutions have access to.

In a well-functioning digital society, most of private and business transactions should be conducted seamlessly through digital channels. That creates significant benefits for the users and increases effectiveness and efficiency of their resources.

Digital identification has to support the development of higher value services that carry higher levels of risk. Moreover, high levels of assurance services often require government issued, or so called “certified information”, included in an identity document like an ID-card. If there is no such mechanism online then the delivery of high level assurance services will continue to run as offline manual process.

Nortals solution includes all the necessary components to make eID usage in online services accessible for all service providers.

Pillar 4

Human behavior and inclusion

Human behavior is in a state of constant development. Our awareness and trust for digital solutions is ever growing and we constantly create new incentives to increase eID usage.

In a digital society, personal data is becoming a new form of currency. Accordingly, consumer concern has grown along with the increased use of personal data. However, most concerns and fears related to digital identification are due to a lack of knowledge.

Building up human awareness is a long-term process that includes many stakeholders. Proper understanding of eID possibilities and corresponding responsibilities will encourage people to recognise and use eID.


Get in touch

Peeter Smitt

Peeter Smitt

Business Area Director

Peeter Smitt has developed a unique perspective on business through his work in multiple countries in Europe and the Middle East. Most of his experience is related to defining, selling and building eGovernment and eGovernance programs. He understands business challenges as well as the opportunities...