SkIDentity allows to extract the personal data stored in your electronic identity card (eID) and to create a derived credential based on this data if required. This cryptographically protected "Cloud Identity" can be created by clicking on the "ID-Symbol" (see right hand side). It can be autonomously managed by you and you may use it for pseudonymous login or a self-determined proof of identity at affiliated online services.
SkIDentity currently supports the following identity management features:
Privacy aspects of the SkIDentity service are subject of the privacy statement.
After clicking on the "ID-Symbol" you will get an overview about the electronic identities available on your system. You can choose an eID from which you may create a derived credential – a so called "Cloud Identity". Here you can control which data will be carried over from the eID to the "Cloud Identity", which in turn is protected with cryptographic measures and stored in your local system.
Like every credential, the "Cloud Identity" is only valid for a limited lifetime, which can be extended by a renewed proof of identity with your primary identification document.
Provided that the "Cloud Identity", which is stored in your local system, should temporarily not be used for pseudonymous login or self-determined proofs of identity, it can be deactivated and later reactivated again.
You can transfer your "Cloud Identity" to another computer system or to your personal smartphone to enable mobile usage. For security reasons the "Cloud Identity" must be protected with a security-PIN before the transfer to the target system can be performed via URL or QR code.
To prevent unauthorized disclosure of personal data or misuse of your "Cloud Identity" you may protect it with a security-PIN.
You may revoke your "Cloud Identity" and delete it in an irrecoverable manner.
You can use an activated "Cloud Identity", which is stored in your local system, for pseudonymous registration for an online service which is connected to the SkIDentity system or for a completely self-determined proof of identity. Here your "Cloud Identity" is transferred in a secure way to the SkIDentity infrastructure, where it is transformed to an identity assertion, which is suitable for the online service.