Government

Providing citizens with joined up digital services from central and local government.

Citizens are increasingly demanding and digitally literate. Government organisations at a central and local level increasingly need to support digital transactions for their citizens and integrate a number of services to share information and provide efficient one-stop services.

Unlocking digital citizen identities is key to cost-effective digital government

Decentralized Identity Trust in Self-Sovereign Identity (SSI) Blog In this blog, we discuss Trust in Self-Sovereign Identity, a more privacy-preserving model from centrally-held identities. Continue Reading
Self sovereign identity for external identities Unlocking the potential of Self-Sovereign Identity Blog Dr Elias Ekonomou, Architect at Condatis uncovers how Self-Sovereign Identity has the potential to solve everyday problems for finance, guest services, autotomive, and pharmaceuticals. Continue Reading
crowd walking What is Self-Sovereign Identity (SSI) and why is it important? Blog It is hard to find people who love passwords, as they happen to be one of the greatest examples of opposing requirements: secure passwords cannot be remembered and cannot be written down. But there is good news: in 10 years, there will no longer be any passwords. How? Via other means of authentication, and sometimes… Continue Reading
authentication image OAuth 2.0 and OpenID Connect Explained (in Plain English) Blog Businesses typically rely on a best-of-breed collection of systems and applications hosted on premise and in the cloud. Although this allows them to better control and streamline operations, managing access and control can be a serious administrative burden. OAuth 2.0 and OpenID Connect technologies have been developed to help simplify secure authentication and authorisation between systems.… Continue Reading
What are Multi-Factor Authentication (MFA) and Single Sign On (SSO)? Blog … and how do you get the best of both worlds? Traditional passwords are a serious threat to IT security. People may reuse or share their logon details, and cyber criminals are busy trying to steal them. As your IT systems become more complex, authentication mechanisms become even more important. Multi-Factor Authentication (MFA) and Single… Continue Reading
Jim Lound Financial Action Task Force (FATF) Guidance on Digital Identity Blog, News Clearly, we are all currently experiencing difficult times. When it is all over, we will have learnt some important lessons. We will reflect on how we could have been better prepared. One area that will stand out is the lack of a ‘ubiquitous UK digital identity marketplace’ – expectant words spoken by Oliver Dowden in… Continue Reading
User experience design Balancing Security and User Experience Blog With so much of modern business taking place online, IT security is a strategic priority. When it comes to customer-facing systems, balancing security and experience can be a challenge. By factoring user experience into early designs, you will avoid future problems that annoy – and potentially deter – your customers. Identity and authentication mechanisms can… Continue Reading
Photo of Elias Ekonomou - Architect Buying a house with Self-Sovereign Identity Blog Our family is moving to a new house: exciting times ahead! Buying a house involves a lot of paperwork, of which a substantial chunk is about identification and authentication. The new trend in Digital Identity is Self-Sovereign Identity (SSI): a solution for authentication that improves privacy whilst giving people control of their personal information and… Continue Reading
Digital Outcomes and Specialists 4 Condatis goes live on DOS4 Company, News Condatis’ services are now available to procure via Digital Outcomes and Specialists 4 (DOS4), a framework that encourages lightweight, consistent and open procurement and is available to all public sector organisations. Having successfully met the framework’s criteria, Condatis’ services will go live on DOS4 under two categories: Digital Outcomes: Condatis’ specialist services, from user research… Continue Reading
Condatis Scottish Government Case Study Scottish Government – Identity Alpha Case Studies, Uncategorised Condatis has completed work for the Scottish Government using Azure AD B2C. Read our case study where we break down our solutions. Continue Reading

Delivering value for government

Our solutions provide:

  • Support for standardised identity proofing standards
  • A consistent identity related user experience across services
  • Alternative access routes for citizens who do not want to use digital services
  • Bring Your Own Identity (BYOID) or create a local account at a higher level of assurance
  • Portable credentials – useable anywhere a Trust Relationship has been established between local and central government entities
  • Manual vouching for citizens without a digital footprint
  • Automatic verification by matching to external data sources

Customer success stories

waves UK Hydrographic Office (UKHO) MGIA Customer Identity Condatis developed a Customer Identity and Access management solution that demonstrates how Microsoft Azure AD B2C can be used to provide a single identity across internal and third-party systems. Se how we made the difference
Condatis Scottish Government Case Study Scottish Government – Identity Alpha Condatis has completed work for the Scottish Government using Azure AD B2C. Read our case study where we break down our solutions. Se how we made the difference
Condatis DWP Case Study Department for Work and Pensions (DWP) EAS-R The Department for Work and Pensions (DWP) is responsible for welfare, pensions and child maintenance policy. Read on our DWP EAS-R solution. Se how we made the difference

Getting digital identity right provides a strong front door to your services

Getting identity right can help protect your services from fraudulent use and start to reduce the risk of an expensive and embarrassing customer data breach. We can help you get started.

What are the next steps?

Get in touch with our team to discuss the next steps in improving the efficiency and security of your organisation. After you contact us, one of our experts will get back to you to learn more and understand your requirements.