Public Administration and IAM Systems: Security and Access Control
Digital Security in Public Administration: IAM systems for effective access control
Identity and Access Management (IAM) represents a fundamental element of cybersecurity for public administration, where the protection of sensitive data and effective access management play a crucial role.
In this context, within public administration, IAM enables:
- Managing the digital identities of employees and citizens, ensuring that only authorized users can access certain resources.
- Ensuring compliance with data protection regulations, such as the NIS2 Directive or GDPR, through strict access controls.
- Improving operational efficiency by optimizing user provisioning and deprovisioning processes.
Thanks to the automation of identity management, IAM solutions can enhance regulatory compliance, reduce the risks of unauthorized access, and optimize operational processes.
Which sectors can benefit the most from IAM systems
The adoption of Identity and Access Management (IAM) systems can potentially offer significant benefits across various sectors, particularly those that manage critical data and infrastructures.
Some of the sectors that most benefit from these solutions include:
- Public Health
- Protection of healthcare data (electronic medical records, electronic health records).
- Access control for doctors, nurses, and patients in hospital and telemedicine systems.
- Finance and the Revenue Agency
- Managing access to citizens’ and businesses’ tax data.
- Protection of electronic payment systems and government transactions.
- Secure authentication for financial operators and taxpayers via SPID, CIE, and CNS
- Justice and Law Enforcement
- Strict control of access to database.
- Protection of confidential information in courts and law enforcement agencies.
- Secure authentication for all users.
Not only these, but many other sectors also benefit from IAM services, which leverage advanced and more secure methods of authentication and user identification.
Public Administration and NIS2: How IAM Ensures Security and Compliance
One of the main challenges of IAM systems is ensuring services fully comply with evolving regulations in the field of cybersecurity. In this context, IAM systems play a crucial role in enabling public entities to fully adhere to regulations such as the NIS2 Directive.
This support for regulatory compliance is realized through a series of initiatives aimed at ensuring full compliance, including:
- Strong Authentication and Zero Trust Security:
NIS2 requires the adoption of robust authentication measures, such as multi-factor authentication (MFA). In response to this need, IAM systems promote the implementation of the Zero Trust model, which involves continuous verification before every access, ensuring perimeter security and accurate identity management. - Continuous Monitoring and Auditing:
NIS2 compliance requires the management of detailed access logs and the ability to monitor suspicious activities. IAM systems address this need by adopting advanced tools for activity logging and tracking, ensuring continuous surveillance and proactive security management. - Centralized Identity and Access Management:
IAM systems enable centralized control of users, reducing the risk of unauthorized access, and ensuring that public entities comply with NIS requirements, which impose strict access management measures.
Secure Access in Public Administration: Yookey with SPID and CIE Authentication
The NIS2 Directive (Network and Information Security Directive 2) imposes stricter cybersecurity requirements for critical infrastructures and essential services, including the management of digital identities and authentication systems.
Authentication via SPID (Public Digital Identity System) and CIE (Electronic Identity Card) is part of the strategies to meet these requirements, as it ensures strong authentication, thereby reducing the risk of unauthorized access.
Yookey ID, the Keycloak service in SaaS mode, is already configured for authentication through SPID and the Electronic Identity Card, making it easy to implement SPID and CIE authentication on any web service, thus ensuring a quick and secure process.
for Identity and Access Management
Passkey is added to the MFA methods supported by Yookey
Passkey is the alternative to passwords and marks a definitive transition to a new chapter in cybersecurity, this time, Passwordless.
Despite authentication systems having relied on passwords until now, it has become clear over time that while they serve as a security key, they also represent the weak link in account security due to their susceptibility to Phishing attacks.
Passkey is a secure authentication method based on a recognition system (fingerprint, face, PIN, sequence), generated and stored locally on users’ devices.
During the registration process, two keys are created: a public key and a private key, which is encrypted and securely stored on the user’s device. Both keys are required for accessing the account. This mechanism is known as Asymmetric or Public Key Authentication.
Passkey adopts the WebAuthn Standard, or rather, adheres to and implements the technical specifications provided by FIDO2, which include WebAuthn and CTAP (Client to Authenticator Protocol).
WebAuthn Standard
WebAuthn or Web Authentication is the open standard (FIDO2 framework) established by the FIDO Alliance and the World Wide Web Consortium (W3C) with participation from Google, Mozilla, Microsoft, and other major players, upon which Passkey is based.
The WebAuthn API allows servers to register and authenticate users using public key cryptography instead of a password, ensuring that authentication works regardless of the device’s operating system, whether it be Android, iOS, Mac, or Windows.
In most cases, the WebAuthn client that implements the authentication API is a compatible browser (currently supported by all major browsers and Android and Apple devices).
Why is Passkey an effective measure against Phishing?
Passkey is effective against phishing attacks because the unique password is stored locally on the user’s device and is never transmitted over the network.
This means that even if a user is tricked into providing their passkey to a phishing site, cybercriminals will not be able to use it to access their accounts, as the passkey is not valid on other devices. This makes it much more difficult for hackers to compromise user access, thus protecting their personal and financial information.
Passkey and FIDO
The birth of Passkey is closely tied to FIDO (Fast Identity Online), an organization that promotes open standards for strong authentication. The FIDO Alliance comprises key players in the web industry such as Google, Microsoft, and Apple.
FIDO’s main objective is to enhance online security by using more advanced authentication methods, such as biometrics and asymmetric cryptography, aiming to reduce reliance on traditional (static) passwords, which are too vulnerable to theft regardless of their complexity.
The other MFA methods supported by Yookey | Keycloak SaaS
In addition to Passkey, the other MFA methods supported by our Yookey- Keycloak as A Service are:
- Sms and email
- Virtual Authenticator (Microsoft and Google authenticator)
- Physical tokens.
Keycloak: Identity and Access Management solution
Keycloak, an open source solution for IAM Management
Keycloak is an open source software platform for unified identity and access management. It enables companies and organizations to centrally and securely manage the authentication and authorization of their users.
Keycloak is designed to work with modern applications and services. It provides a variety of authentication mechanisms by supporting several protocols, including social login, OAuth 2.0, SAML, and OpenID Connect.
A modern interface and high level of scalability make it the ideal product for those who want to opt for a secure yet highly customizable solution. Now let’s look at its features in more detail.

Single Sign On (SSO) & Multi-Factor Authentication (MFA)
Keycloak supports Single Sign-On (SSO) allowing users to log in to multiple applications and services using a single set of credentials. This greatly simplifies the login process for users and results in increased security from reducing the number of passwords that must be remembered and managed.
The platform also supports multi-factor authentication (MFA) thus providing an additional layer of security by asking users to provide additional authentication information, (e.g. code sent to their phone) before accessing resources.
Function and installation
It functions as a central authentication server that delegates authentication to external sources and provides access tokens for requesting applications. Regarding the users, the platform provides a division into 3 macro categories that can be managed through a customizable admin dashboard:
- Users: those who can access resources.
- Roles: used to define the access levels of individual users.
- Groups: allow for quick management of the different roles present, creating aggregations between roles and users.
Keycloak supports multiple user stores including LDAP and Active Directory. In this way existing directories can be used for user authentication. Deployment can be on-premise, in the cloud or as a hybrid solution and it provides a flexible architecture with a high degree of scalability.
Features and Benefits
- Single Sign-On (SSO): allows users to access multiple applications and services using a single set of credentials.
- Identity brokering: identity validation using OpenID Connect or SAML 2.0 IdPs.
- Centralized management: customizable interface for managing users, roles and permissions.
- Multi-factor authentication: requires users to provide additional authentication information before accessing resources.
- Directory integration: Integration with LDAP and Active directory for authentication through existing directories.
- Scalability: Easily extendable according to different needs.
Keycloak: integrations
Keycloak has a number of APIs that allow the platform to be integrated with third-party services and systems thus making it an extremely versatile solution created to be integrated into the IT infrastructure of companies of any size.
Keycloak in SaaS
It is possible to have Keycloak as a SaaS solution, with a fully managed service.
Yookey is our product/service that allows you to take full advantage of Keycloak without worrying about the burden of installation and updates, and with the added benefit of a customizable Support.
Yookey ensures maximum security for access and authentication processes with Single Sign-On, and once integrated into your IT environment, no additional effort is required for software operation and maintenance.
For more information about Yookey, visit our dedicated website at this link: Yookey – Keycloak SaaS.