Skip to main content
GOV.UK Verify

Technical

STORK: a practical way to access services across borders

Posted by: , Posted on: - Categories: Policy, Research, Technical

European Union member states have been developing electronic identity (eID) schemes for some time now to allow citizens to access services safely and securely online. Many of these schemes are linked to national identity cards or schemes, whereas others involve working …

How the GOV.UK Verify technical architecture protects users' privacy, and why it's appropriate

Posted by: , Posted on: - Categories: How GOV.UK Verify works, Policy, Technical

When we designed the identity assurance architecture we wanted to protect users from identity theft and fraud, to secure their data as it is used online, and to reduce the amount of information needed from the user to a minimum. …

How we use open source code on the identity assurance programme

Posted by: , Posted on: - Categories: Policy, Security, Technical

James Stewart has published a post about how GDS decides when it's ok not to publish source code. The identity assurance programme operates within the approach outlined by James. We do publish information about our design, but we don’t publish code …