About Otentik Role as a VDS Scheme Operator
This FAQ aims to clarify our role and responsibilities as an accredited Scheme Operator (SO), also known as a Trust Service Operator (TSO), within the Visible Digital Seal (VDS) ecosystem, in accordance with the requirements of the VDS International Council (VDSIC).
1. What is a VDS Scheme Operator?
A VDS Scheme Operator, like Otentik, is an organization accredited by the VDS International Council (VDSIC). Our primary role is to manage and operate a specific VDS scheme (e.g., for a particular industry or geographical region). We define the specific policies for our scheme (consistent with VDSIC standards), oversee the associated Trust Service Providers (TSPs) and Certificate Authorities (CAs), and ensure the proper functioning, security, and interoperability of VDS instances issued under our responsibility.
2. What is your relationship with the VDS International Council (VDSIC)?
We operate under the authority and accreditation of the VDSIC. This means we must strictly adhere to their directives, standards, and policies. We maintain regular communication, provide required reports, and fully cooperate with compliance reviews and audits conducted or mandated by the VDSIC to ensure our ongoing adherence to ecosystem standards.
3. How do you ensure the reliability and security of your VDS scheme?
Security and reliability are central to our operations. We implement:
- An Information Security Management System (ISMS) aligned with international standards (like ISO/IEC 27001/27002).
- Formal risk management processes (based on ISO/IEC 27005) to identify and address potential threats.
- Strict procedures for managing the lifecycle of critical cryptographic keys (used, for example, to sign our trust lists), including the mandatory use of certified Hardware Security Modules (HSMs) (e.g., FIPS 140-2 Level 3 or CC EAL4+).
- Robust technical security controls for our infrastructure (firewalls, intrusion detection, access management, security patching, etc.).
- A documented and regularly tested Business Continuity and Disaster Recovery Plan (BCDRP).
- Clear procedures for security incident management and response.
4. What is a Trust List (LoTL / TSL) and how do you manage it?
Trust Lists are essential for verifying the validity of a VDS. We publish and maintain a “Scheme List of Trusted Lists” (Scheme LoTL) specific to our scheme. This LoTL references the “Trust Service Lists” (TSLs) of the authorized Trust Service Providers (TSPs) within our scheme. We ensure our LoTL is:
- Compliant with technical standards (ETSI TS 119 612 and VDSIC extensions).
- Digitally signed to guarantee its integrity and authenticity.
- Updated promptly for critical trust-impacting events (e.g., TSP compromise, urgent revocation) and within reasonable timeframes for routine updates.
- Publicly and freely available via secure endpoints (HTTPS).
5. How are VDS Issuers authorized for specific use cases (Manifest UUIDs)?
Each type of VDS (e.g., a vaccination certificate, an electronic invoice) is associated with a unique identifier called a “Manifest UUID”. As the Scheme Operator, we oversee the assignment of these UUIDs within our domain. We have established a clear, documented process for accredited VDS Issuers to request and obtain authorization to generate VDS instances for specific Manifest UUIDs. We maintain an authoritative record (the “Authoritative Authorization Source”) that links each authorized issuer to the specific UUIDs they are permitted to use, and we provide a secure mechanism for TSPs/CAs to verify this authorization before issuing the necessary certificates.
6. Where can I find more information about your operational and security practices?
Transparency is key to trust. We publish and maintain a comprehensive “Practice Statement” detailing our policies, operational procedures, security controls (including key management and ISMS alignment), incident response, and compliance measures related to our VDS scheme. This document is freely available on our website.
7. How is your compliance verified?
Our compliance with VDSIC requirements and our own policies is verified through several means:
- Periodic compliance reviews conducted or mandated by the VDSIC.
- Independent third-party audits performed by qualified auditors (at least annually or as required by VDSIC), covering the security, availability, and integrity of our VDS operations (e.g., ISO/IEC 27001 certification, SOC 2 Type II reports, or equivalent VDSIC-approved assessments). We provide attestations or summaries of these audits to the VDSIC upon request.
8. What assurances do you provide regarding resources and sustainability?
We must demonstrate to the VDSIC that we possess sufficient financial stability and adequate resources (skilled personnel, technical infrastructure) to operate our VDS scheme reliably and continuously. We also maintain appropriate professional liability insurance covering risks related to our operations, and we have a termination plan to ensure an orderly cessation of services and preservation of essential trust information if ever necessary.
Becoming a Certificate Authority (CA) for Otentik’s VDS Scheme
This FAQ aims to clarify your role and responsibilities as an accredited Certificate Auhtority (CA), also known as a Trust Service Provider (TSP), within the Visible Digital Seal (VDS) ecosystem, in accordance with the requirements of the VDS International Council (VDSIC).
1. What is the role of a Certificate Authority (CA) in Otentik’s VDS scheme?
As a CA within Otentik’s VDS scheme, you are a specialized Trust Service Provider (TSP). Your core function is to issue the X.509 digital signing certificates that VDS Issuers use to create Visible Digital Seals. You play a critical role in the chain of trust by validating certificate requests and ensuring certificates comply with Otentik’s scheme policies and VDSIC standards.
2. What are the key requirements to become an accredited CA under Otentik?
You must meet stringent technical, security, and policy requirements, including:
- Adhering to VDSIC’s TSP Requirements.
- Maintaining a compliant Certificate Policy (CP) and Certification Practice Statement (CPS) aligned with Otentik’s scheme rules and VDSIC standards (e.g., ETSI EN 319 411).
- Operating highly available and secure infrastructure (incl. certified HSMs, ISO 27001 aligned ISMS).
- Implementing robust processes for certificate lifecycle management (issuance, revocation via CRL/OCSP).
- Crucially, implementing technical validation of a VDS Issuer’s authorization for requested Manifest UUIDs (for the UsageList extension) against Otentik’s authoritative source before certificate issuance.
- Undergoing regular independent audits (e.g., WebTrust for CAs).
3. How does the UsageList validation work with Otentik?
This is a critical function. When a VDS Issuer requests a certificate containing specific Manifest UUIDs in the vdsic.security.usageList extension, your CA systems must technically verify the Issuer’s authorization for each requested UUID. This verification uses the mechanism defined by Otentik (e.g., querying an Otentik-managed registry API, processing a secure list). You must not issue a certificate including any UUID for which the Issuer is not authorized according to Otentik’s authoritative source. This process must be documented in your CPS.
4. What level of availability and performance is expected for CRL/OCSP services?
High availability is mandatory. You must define and meet strict Service Level Objectives (SLOs) for your revocation information services (e.g., >= 99.9% uptime) and ensure timely updates according to your CPS and Otentik’s requirements (e.g., prompt OCSP updates post-revocation, CRL publication before the previous one expires).
5. What audits do we need to pass?
You typically need annual independent third-party audits, such as WebTrust for CAs or ETSI EN 319 411 audits. Compliance with relevant security standards like ISO/IEC 27001 may also be required or audited. Attestations must be provided to Otentik and/or VDSIC.
6. How do we start the accreditation process with Otentik?
Contact Otentik directly at [email protected] to express interest. We will provide details on our specific scheme requirements and guide you through the application and assessment process, which includes reviewing your technical capabilities, CP/CPS, and audit status.
For VDS Issuers in Otentik’s VDS Scheme
This FAQ aims to clarify your role and responsibilities as an accredited VDS Issuer within the Visible Digital Seal (VDS) ecosystem, operating under the scheme managed by Otentik and in accordance with the requirements of the VDS International Council (VDSIC).
1. What does it mean to be a VDS Issuer in Otentik’s scheme?
As a VDS Issuer, your organization is responsible for creating the actual Visible Digital Seals for specific documents or products (e.g., certificates, invoices, product labels) according to the rules of Otentik’s VDS scheme. You use a digital signing certificate, obtained from an accredited Certificate Authority (CA) within our scheme, to generate the VDS.
2. How do we get authorized to issue specific types of VDS?
Each type of VDS corresponds to a “Manifest UUID”. To issue a specific type of VDS, you must first be formally authorized by Otentik (the Scheme Operator) for that specific Manifest UUID. The process involves:
- Applying to Otentik for authorization for the specific Manifest UUID(s) relevant to your use case.
- Meeting Otentik’s criteria for authorization (which may involve vetting your organization and use case).
- Once authorized by Otentik, you can request a signing certificate from an accredited CA, specifying the authorized UUID(s).
3. What do we need to provide to the Certificate Authority (CA)?
When requesting your VDS signing certificate from a CA accredited under Otentik’s scheme, you will need to:
- Complete the CA’s identity verification and certificate request process.
- Specify the exact Manifest UUID(s) that Otentik has authorized you to use. These will be included in the certificate’s vdsic.security.usageList extension. The CA is required to verify your authorization for these UUIDs with Otentik before issuing the certificate.
4. What are our responsibilities as a VDS Issuer?
Your primary responsibilities include:
- Obtaining proper authorization from Otentik for the Manifest UUIDs you intend to issue.
- Accurately representing your identity and authorization status to the CA.
- Securely managing the private key associated with your VDS signing certificate.
- Generating VDS instances that comply with the VDSIC technical specification (KD036) and Otentik’s scheme rules.
- Ensuring the data included in the VDS is accurate and appropriate for the authorized Manifest UUID.
5. Do we need specific software or hardware to issue VDS?
You will need software capable of generating the VDS structure according to the VDSIC specification and signing it using your private key. Depending on your security requirements and volume, you might manage your signing key within a Hardware Security Module (HSM) or other secure environment. Otentik or the VDSIC may provide guidance or lists of compatible software/service providers.
6. Who should we contact to get started?
To begin the process of becoming an authorized VDS Issuer within Otentik’s scheme, please contact Otentik directly at [email protected] to discuss your use case and the authorization requirements.
For VDS Verifiers (Relying Parties) in Otentik’s Scheme
This FAQ explains how to verify Visible Digital Seals (VDS) issued under the scheme managed by Otentik. It outlines the key concepts for Relying Parties (Verifiers) who need to check the authenticity and integrity of these seals.
1. What is a Visible Digital Seal (VDS) and what does it confirm?
A VDS is a secure, often visually represented (like a QR code), digital seal on a document or product. When successfully verified, it confirms:
- Authenticity: Who issued the VDS (the VDS Issuer).
- Integrity: That the core data associated with the VDS has not been tampered with since it was issued.
- Compliance: That it was issued under the rules of a specific VDS scheme, like Otentik’s ([mention Otentik’s specific scheme name]).
2. How do I verify a VDS issued under Otentik’s scheme?
Verification typically involves using a VDS verification application (e.g., a smartphone app or integrated software). The process generally includes:
- Scanning or inputting the VDS.
- The app checks the digital signature on the VDS.
- It retrieves the VDS Issuer’s certificate used for signing.
- It checks the validity of the certificate (if it’s expired or revoked using CRL or OCSP).
- It verifies that the certificate chains up to a trusted root certificate via the Trust Lists (TSLs) published under Otentik’s Scheme List of Trusted Lists (LoTL).
3. What are Trust Lists (LoTL/TSL) and why are they important for verification?
Trust Lists are crucial for verification. Otentik, as the Scheme Operator, publishes a “Scheme List of Trusted Lists” (LoTL). This LoTL points to the specific “Trust Service Lists” (TSLs) of the accredited Certificate Authorities (CAs) operating within our scheme. These TSLs contain information about the CAs, their active certificates, and pointers to where revocation information (CRL/OCSP) can be found. Your verification software uses Otentik’s LoTL and the referenced TSLs to establish trust in the VDS Issuer’s certificate.
4. Where can I find Otentik’s Scheme LoTL?
Otentik’s Scheme LoTL URI is typically listed within the VDSIC Governance List (Root LoTL) or made available directly by Otentik on its website at [Link to Otentik’s website/LoTL location]. Verification applications are often configured to automatically retrieve and update these lists.
5. What does a “valid” VDS verification result mean?
A successful verification (“valid” VDS) indicates that:
- The digital signature is mathematically correct.
- The signing certificate was valid (not expired, not revoked) at the time of checking (or time of signing, depending on verification policy).
- The signing certificate was issued by a CA trusted under Otentik’s scheme, as confirmed via the LoTL/TSLs.
- The data integrity is intact.
6. Do I need special software to verify a VDS?
Yes, you need a verification application or software capable of performing the VDS verification steps according to VDSIC standards. Various providers offer such applications, and Otentik may recommend or provide specific tools for verifying VDS within its scheme. Check [Otentik’s website or relevant resource page] for recommendations.
7. What should I do if VDS verification fails?
A failed verification means the authenticity or integrity of the VDS cannot be confirmed. The data or issuer should not be trusted based on the VDS alone. The reason for failure (e.g., expired certificate, revoked certificate, invalid signature, untrusted issuer) may be indicated by the verification app. You should follow your organization’s procedures for handling untrusted documents or data.
Provide a VDS compliant solution
This FAQ is tailored for solution providers aiming to comply with VDS ecosystem. Please review these points carefully to ensure your solution aligns correctly with the VDS environment.
1. What does “providing a VDS solution” typically involve?
Providing a VDS solution means creating software, platforms, integration services, or consulting offerings that enable organizations to either issue, verify, or manage Visible Digital Seals. This could include:
- Issuance Platforms: Software or services allowing authorized organizations (VDS Issuers) to generate VDS instances for documents or products.
- Verification Tools: Applications (mobile, web, SDKs) or services that allow users or systems (Relying Parties) to check the authenticity and integrity of a VDS.
- Integration Services: Helping organizations integrate VDS issuance or verification capabilities into their existing workflows and systems (e.g., ERP, document management, credentialing platforms).
- Consulting: Advising organizations on implementing VDS strategies, choosing use cases, and navigating the VDS ecosystem.
2. What are the key components and roles in the VDS ecosystem we need to understand?
You should be familiar with:
- VDS International Council (VDSIC): The governing body setting standards.
- Scheme Operators (SOs / TSOs): Entities managing specific VDS schemes (like Otentik), defining rules, accrediting participants within their scheme, and publishing Scheme Lists of Trusted Lists (LoTLs).
- Trust Service Providers (TSPs) / Certificate Authorities (CAs): Entities accredited by SOs to issue the signing certificates used by VDS Issuers and provide revocation services (CRL/OCSP).
- VDS Issuers: Organizations authorized by an SO to create specific types of VDS using certificates from an accredited CA.
- Relying Parties / Verifiers: Individuals or systems checking the validity of a VDS.
- Trust Lists (LoTL/TSL): The machine-readable lists that link trusted CAs to the Scheme Operator and ultimately to the VDSIC root, enabling verification.
3. What core technical standards are relevant for building VDS solutions?
Key standards include:
- VDS Specification and Usage: Defines the VDS data structure, processing rules, certificate profiles, and TSL extensions. This is essential reading.
- ETSI TS 119 612: The base standard for Trust Service Lists (TSLs).
- X.509 Standards: For understanding digital certificates.
- CRL/OCSP Standards: For certificate revocation checking.
- Relevant Cryptographic Standards (for signature algorithms, hashing, etc.)
4. Do we need to become an accredited CA or Scheme Operator ourselves?
Generally, no. Most VDS solution providers build tools and services that interact with the existing ecosystem. Your customers would typically be VDS Issuers (using your issuance platform) or Relying Parties (using your verification app). These customers would need to engage with an accredited CA (for certificates) and operate under the rules of a Scheme Operator. Your role is to provide the technology that facilitates these interactions correctly and securely.
5. How should our VDS verification solution handle Trust Lists?
Your verification software MUST be designed to:
- Securely fetch the relevant Scheme LoTL(s) and the TSLs they reference.
- Process these lists according to VDSIC specifications.
- Use the information (trusted CA certificates, service pointers) to validate the certificate chain of a presented VDS back to a trusted anchor defined by the Scheme Operator / VDSIC.
- Perform revocation checks (CRL/OCSP) using endpoints listed in the TSLs.
6. How should our VDS issuance solution handle certificates and authorization?
Your issuance platform should:
- Securely manage the VDS Issuer’s signing credentials (private key).
- Generate VDS structures compliant with KD036.
- Correctly encode the data provided by the Issuer.
- Apply the digital signature using the Issuer’s key.
- Crucially, if your solution helps Issuers request certificates from CAs, it must support the mechanisms needed for the CA to verify the Issuer’s authorization for specific Manifest UUIDs (often via the UsageList extension), as mandated by the relevant Scheme Operator. Your software facilitates this; the CA performs the check against the SO’s authoritative source.
7. How do we ensure our solution is compliant and interoperable?
Strictly adhere to the VDSIC KD036 specification for VDS structure and processing. Ensure correct cryptographic operations, proper handling of certificates, trust lists, and revocation checking. Participate in interoperability testing events if offered by VDSIC or Scheme Operators.
8. What are the first steps to developing a VDS solution?
- Thoroughly study the VDSIC specification.
- Identify your target market and the specific type of solution (issuance, verification, integration) you want to offer.
- Understand the roles and requirements within the VDS ecosystem.
- Consider potential partnerships with Scheme Operators or CAs.
- Start developing based on the technical specifications.
Integrating Your VDS Solution with the Otentik Scheme
This FAQ is tailored for solution providers aiming to integrate successfully within our framework. Please review these points carefully to ensure your solution aligns correctly with the Otentik VDS environment.
1. What is an “Otentik VDS Solution”?
An Otentik VDS Solution is a software application, platform, or service designed specifically to operate within the VDS scheme managed by Otentik (acting as the accredited Scheme Operator). This means your solution must not only comply with global VDSIC standards but also adhere to the specific rules, policies, and trust framework defined by Otentik.
2. What makes developing for Otentik’s scheme different from a general VDS solution?
Key differences include:
- Scheme-Specific Rules: Your solution must respect any additional policies or technical requirements set by Otentik beyond the base VDSIC standards.
- Accredited Participants: Your solution must interact correctly with CAs specifically accredited by Otentik for its scheme.
- Otentik’s Trust Anchor: Verification solutions must be configured to use Otentik’s Scheme List of Trusted Lists (LoTL) as the entry point for establishing trust within the scheme.
- Manifest Authorization: Issuance solutions must support the process where CAs validate an Issuer’s authorization for specific Manifest UUIDs against the authoritative source managed by Otentik.
3. How do we interact with Otentik as the Scheme Operator?
Otentik manages the overall health and rules of its scheme. This includes accrediting CAs, publishing and maintaining the authoritative Scheme LoTL, and managing the authorization process for VDS Issuers and their specific Manifest UUIDs. Depending on your solution (especially if it involves issuance or specific integrations), you may need to coordinate with Otentik, potentially through partnership programs or compatibility testing.
4. If building an issuance solution for Otentik’s scheme, what’s critical regarding Manifest UUIDs?
Your issuance platform must enable your VDS Issuer clients to specify the Manifest UUIDs they are authorized by Otentik to use. Furthermore, your system should facilitate the process where the CA (chosen by the Issuer from Otentik’s accredited list) can perform the mandatory check of these UUIDs against Otentik’s authoritative authorization source before issuing the certificate containing the UsageList extension. Your software must not interfere with or bypass this crucial validation step performed by the CA.
5. If building a verification solution for Otentik’s scheme, what do we need to configure?
Your verification tool MUST be configured to:
- Retrieve and trust Otentik’s specific Scheme LoTL URI.
- Correctly process Otentik’s LoTL and the TSLs it references to validate VDS instances originating from within Otentik’s scheme.
- Perform revocation checks using the CRL/OCSP endpoints specified by the CAs listed in Otentik’s TSLs.
6. Do we need direct accreditation or approval from Otentik to offer a solution?
Typically, solution providers (who are not acting as CAs or VDS Issuers themselves) may not require formal accreditation from Otentik. However, Otentik may have:
- Partnership programs for solution providers.
- Compatibility testing or certification for verification/issuance tools to ensure they work correctly within the scheme.
- Specific requirements for solutions integrating deeply with their infrastructure.
- It’s essential to contact Otentik directly to understand their policies regarding third-party solution providers.
7. Where can we find Otentik’s specific scheme rules, LoTL URI, and technical details?
You should contact Otentik directly at [email protected] or visit developer/partner portal (if available). We can provide access to our scheme-specific documentation, policies, the LoTL URI, and details about our Manifest UUID authorization mechanism.
8. How do we get started building a solution for Otentik’s scheme?
- Contact Otentik to express your interest and understand our partnership model.
- Obtain and thoroughly review Otentik’s scheme-specific documentation alongside VDSIC standards.
- Clearly define the type of solution you intend to build (issuance, verification, integration).
- Design your solution architecture to explicitly accommodate Otentik’s LoTL, accredited CAs, and the Manifest UUID authorization process.
- Engage with Otentik for any required testing or validation.