Faster, cheaper, innovative and flexible ICT solutions that enable personalized e-services…

A unique city also wants to be the best in the digital world. That is why Antwerp relies on the people of Digipolis for their ICT services.

Digipolis develops software, implements hardware, networks and telephony infrastructures. In addition, they guide their colleagues at Antwerp City, OCMW, Zorgbedrijf Antwerpen and the police, they realize ICT projects and they provide qualitative and stable support for the operational applications and infrastructure.

The challenge

A flexible and future-proof Identity and Access Management engine

IS4U was tasked with building, implementing and expanding the Identity and Access Management Engine. This ensures that the ICT solutions in the Digipolis IT ecosystem have a flexible and future-proof IAM engine.

Digipolis had a number of specific objectives in mind, such as user registration, authentication levels, delegated role management, authorization for the development platform of the Digipolis IT ecosystem, Single Sign-On (SSO) across all organizations, integration with Apache Kafka and custom login options per organization.

The approach

User Registration

  • Users do not need to register themselves, but are automatically added after federation with existing external identity providers.
  • An authorization system has been set up for developers who collaborate on an application via the development platform of the Digipolis IT ecosystem. A tailor-made API was made available for this.
  • For managing users and groups to simplify integration with other components in the Digipolis IT ecosystem, the implementation of a tailor-made API in Keycloak was realized.

Authentication Levels

  • The integration of the ‘A-profile login system’ has been enabled in Keycloak, so that it can be used as one of the available ‘identity providers’ in the system.
  • Furthermore, a required ‘authentication level’ was set per application, whereby logging in with a username and password gives a lower level than via ItsMe or eID. The authentication level that can be reached with a login method has also been made adjustable per tenant.
  • The extension of Keycloak has the advantage of redirecting users with an authentication level that is too low to the correct authentication mechanism in order to achieve the intended security level. If this cannot be achieved, the user will be refused to login to the desired system. This is known as Step-Up Authentication.

Delegated role management

  • Each organization can determine for itself what the registration options are.
  • Digipolis can delegate the management of the roles/permissions of the applications to the responsible per organization (admins). This allows the organizations, among other things, to determine the roles and rights within their own organization.

Single Sign-On (SSO) across all organizations

  • Although Single Sign-On (SSO) had to be provided across all organizations (cross-tenant Single Sign-On), Digipolis wanted to segment the users (subset of users per organization). Once a user has authenticated with a particular organization, they do not have to authenticate again, even if it is an application from another organization. Example: I register for an application from Antwerp (as an employee of Antwerp, with my M-profile), then I browse to an application from ‘Het stedelijk Onderwijs’: I do not have to reauthenticate (unless the application requires a higher authentication level or my session has expired).

Integration with Apache Kafka

  • Finally, an integration with Apache Kafka has been set up, which was already in use within Digipolis. User events are propagated to various components of the development platform of the Digipolis IT ecosystem, as well as to other applications.

The result

Commissioned by Digipolis, IS4U implemented an Identity and Access Management engine for the Digipolis IT ecosystem.

The analysis and architecture of the engine was based on the above requirements, prepared by Digipolis, whereby the implementation of the access manager was set up via high availability clustering.

A high-availability cluster can be seen as a group of computers that support certain server applications (hosts) that work together as one system and guarantee continuous up-time. These ‘high availability’ clusters are used for traffic distribution, backup and failover.

Share this article

Interested in learning more about our solutions and how they can benefit your business?

Contact us now for personalized insights and solutions.

Related articles

ACEN group achieves ISO 27001:2017 certification

Discover how ACEN, along with its subsidiaries, has expanded its cybersecurity measures by achieving...

ACEN acer – Gustavo Alito

Follow Gustavo's journey from Brazil to Belgium, growing as a Security Consultant and innovating...

5 signs your business needs a cybersecurity assessment

Discover the 5 signs your business needs a cybersecurity assessment. Ensure business continuity and...

Subscribe to our newsletter

We only use your e-mail address to send newsletters.

We do not pass on your address to third parties.

Security as a Service

Experience peace of mind with our Security as a Service – your company’s ultimate shield against threats, featuring reliable 24/7 protection, local support, and a tailored approach to meet all your unique security needs.

We are looking for talent

Check out our careers platform and discover our wide range of cybersecurity opportunities!