Illinois unifying PKI program

Illinois Technology Office

Illinois has decided to standardize its electronic transaction authentication

system, but questions remain about how it will work.

The state's public-key infrastructure program, which uses digital certificates

to authenticate users for electronic transactions, will be standardized

on Entrust Technologies Inc.'s system, said Brent Crossland, deputy technology

officer for Illinois, speaking Monday at the Entrust SecureSummit 2001 conference

in San Diego.

Illinois has been using Entrust's technology for almost a year. But

in order for citizens with just one certificate to interact with the state,

Illinois officials will require every agency to use the central certificate

authority, which issues and manages the digital certificates.

"We want to be able to bring together all the efforts across the state,"

Crossland said. "It's enterprisewide, no exceptions."

The state has decided that the certificates will be for identification

and authentication only; each agency will have to manage authorization levels

for each user.

But officials must deal with several other policy issues before their

PKI will be fully functional, Crossland said.

These include:

* Registration. The state is doing face-to-face registration of citizens

receiving digital certificates, but officials want a Web-based system that

can be trusted by agencies and still be easy enough for anyone to use.

* Revocation. Should each agency be responsible for revoking certificates

over authorization issues? Or will the state have to revoke certificates

over problems such as fraud?

* Cross-certification. The state must make technology and policy decisions

that will allow Illinois' certificates to be accepted by other states and

federal agencies and, in turn, allow the state to accept other jurisdictions'


* Private sector. Will companies be able to use the Illinois certificates

to identify citizens for business transactions the way they now use state-issued

driver's licenses?

The state is approaching each of the issues from a new viewpoint, so

as not to simply transfer paper-bound processes to the Internet, Crossland


"We're trying to approach [our PKI] as a way to fundamentally change

the way government interacts," he said.


  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.