{"id":41262,"date":"2016-01-13T11:30:53","date_gmt":"2016-01-13T10:30:53","guid":{"rendered":"https:\/\/www2.polyas.de\/ct_content_page_2\/secure-authentication"},"modified":"2024-06-17T14:38:00","modified_gmt":"2024-06-17T12:38:00","slug":"secure-authentication","status":"publish","type":"page","link":"https:\/\/www.polyas.com\/security\/secure-authentication","title":{"rendered":"Secure authentication"},"content":{"rendered":"<div  class='flex_column av-2h0g7x4-de4ae1467e542757120a2c90fb2718d7 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1aizrzs-0a52bb243889b35def05e4d62eb9f990\">\n.avia-image-container.av-1aizrzs-0a52bb243889b35def05e4d62eb9f990 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-1aizrzs-0a52bb243889b35def05e4d62eb9f990 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-1aizrzs-0a52bb243889b35def05e4d62eb9f990 av-styling- avia-align-center  avia-builder-el-1  el_before_av_textblock  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image- avia-img-lazy-loading-not- avia_image ' src=\"https:\/\/www.polyas.de\/wp-content\/uploads\/2020\/07\/Sichere-Authentifizierung_1.jpg\" alt='' title=''   itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-ltsofnzg-e00b2b2a0be9be2e3c09c71bd36eb6b0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>Secure authentication<\/h1>\n<p>Digital voting and elections with POLYAS are not only secure; they are also secret. Eligible voters who have logged in are anonymized using cryptographic methods. At the same time, eligible voters are unambiguously identified and authenticated, so multiple votes are prevented.<\/p>\n<p>POLYAS offers various options for secure authentication, so that you as the election organizer can choose the method that suits the requirements of your election system, the underlying security level and the needs of your electorate.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-ltymfqmc-a7e66dfd12d3c3a0f73a2f3629a0358f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Authentication in POLYAS CORE 2.5.0<\/h2>\n<p>In the Online Voting System POLYAS CORE 2.5.0, a successful login generates a\u00a0token (anonymous, non-traceable identifier).<\/p>\n<p>This is generated by the system and is invisible to the voter.\u00a0The token anonymizes the user identity, which permanently preserves voting secrecy for all voters.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-ltymg7xp-b78053bb5458bc6df78350d079a20a72 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Authentication in POLYAS CORE 3<\/h2>\n<p>When an eligible voter uses a voter ID and password to log into the online voting system POLYAS CORE 3, the password is used in the client to generate a private key and a hashed password. The private key is used to sign the ballot paper when the binding vote is cast.\u00a0The hashed password is used to authenticate the voter and to verify their right to vote. Only if there is a match between the hashed password in the electoral roll and the voter\u2019s hashed password will the voter be forwarded to the ballot paper. If a voter then casts a vote, the ballot paper is encrypted and signed in the browser. This means that the ballot paper is already in encrypted form when is is transported to and stored in the POLYAS ballot box.<\/p>\n<h4>POLYAS authentication method<\/h4>\n<p><strong>1) Login with an ID and password\u00a0<\/strong><br \/>\nBy default, POLYAS requires eligible voters to authenticate by entering an ID and the associated password.<\/p>\n<ul>\n<li><strong>The ID<\/strong> is a fixed, unique attribute, such as a personnel number or matriculation number, a date of birth, or the user\u2019s e-mail address. If desired, the ID can be anonymized so that POLYAS does not receive any personal data.<\/li>\n<li><strong>The POLYAS system generates the one-time password<\/strong> by using certain security algorithms.<\/li>\n<\/ul>\n<p>Only if they have the correct combination of both sets of login data can users authenticate themselves and cast a vote. The ID and password are transmitted either by e-mail or letter, and they can be transported separately.<\/p>\n<p><strong>2) SecureLink in your own intranet<\/strong><br \/>\nYour eligible voters login to your intranet or a protected member area using their usual access credentials. After authentication in the intranet, a single click takes your voters to the POLYAS Online Voting System, where they can cast their votes. With SecureLink authentication, all personal data remains with the election organizer and POLYAS receives the electoral roll in pseudonymized form only. <a href=\"https:\/\/www.polyas.com\/premium-features\/securelink\">Learn more about authentication using SecureLink <\/a><u>\u00a0&gt;<\/u><\/p>\n<p><strong>3) Authentication by digital identity card<\/strong><br \/>\nVoters can conveniently and securely authenticate themselves via an interface to the digital authentication mechanisms of the new identity card \u201cnPA\u201d (Germany only). <a href=\"https:\/\/www.polyas.com\/request-demo\">Please contact us if you wish to use this variant for your institution.<\/a><\/p>\n<p>Button: To the Online Voting Manager &gt; <a href=\"https:\/\/configure.polyas.com\">https:\/\/configure.polyas.com<\/a><\/p>\n<h4>Additional features for your authentication method<\/h4>\n<p>Various features can be booked for the Online Voting Manager, which additionally increase the security of your authentication:<\/p>\n<ul>\n<li><strong>Independent voting checkbox:<\/strong> The confirmation of independent voting serves to further secure voting eligibility, similar to a ballot paper for postal voting. Eligible voters can only vote if they have confirmed their identity and authorization with the checkbox.<\/li>\n<li><strong>Two-factor authentication:<\/strong> You can increase the security of your authentication method by transmitting an additional password via an additional channel, e.g. by SMS. This effectively minimizes the likelihood of unauthorized access.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ltzjiloq-ca07d89252e665da6549c35602240f27\">\n.av_promobox.av-ltzjiloq-ca07d89252e665da6549c35602240f27{\ncolor:#000000;\nbackground:#e8f8f8;\nborder-color:#ededed;\n}\n<\/style>\n<div  class='av_promobox av-ltzjiloq-ca07d89252e665da6549c35602240f27 avia-button-no  avia-builder-el-5  el_after_av_textblock  el_before_av_textblock '><div class='avia-promocontent'><p>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-46677 size-thumbnail\" src=\"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png\" alt=\"\" width=\"80\" height=\"80\" srcset=\"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png 80w, https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-36x36.png 36w\" sizes=\"auto, (max-width: 80px) 100vw, 80px\" \/><\/p>\n<p><strong>POLYAS Tip:<\/strong>\u00a0The security of the POLYAS system as well as the secrecy of the ballot is guaranteed at all times and with every authentication procedure.\u00a0<a href=\"\/www.polyas.co.uk\/security\/system-security\">Learn more about system security at POLYAS now.<\/a><\/p>\n<p>\n<\/div><\/div><br \/>\n<section  class='av_textblock_section av-wz0wl4-34aab32a2d0f1ae4906b93362ed1f18e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Maximum security for your online voting<\/h2>\n<p>Regardless of which authentication method and which POLYAS voting system you choose, voting secrecy and data protection are guaranteed at all times with POLYAS. You can be sure that, whether you choose the CORE 2.2.3 or the CORE 3, your election will be conducted in adherence to the highest standards of security and data protection, and that the applicable voting principles are observed.<\/p>\n<p>The voting system and authentication method that you choose depend on the requirements of your election regulations and the needs of your voters.<br \/>\n<a href=\"https:\/\/www.polyas.com\/request-demo\">POLYAS Support, which is subject to a fee, will assist you in finding the right solution for your election.<\/a><\/p>\n<p>* You may be subject to electoral laws or regulations within your institution that stipulate the requirements for sending voter credentials. Please find out whether transmission by e-mail constitutes legally compiant delivery.<\/p>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-1nz9rg8-75c54a224fb808df4d271da46d3d88ea av_one_third  avia-builder-el-7  el_after_av_two_third  avia-builder-el-last  flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lu9i2vcx-f98b442447e01de64a594721f37db094\">\n#top .hr.hr-invisible.av-lu9i2vcx-f98b442447e01de64a594721f37db094{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-lu9i2vcx-f98b442447e01de64a594721f37db094 hr-invisible  avia-builder-el-8  el_before_av_textblock  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-ltym5gx4-4b5d2bf9f8cb84828b4c30d830082a87 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock cnt2_sidemenu1'  itemprop=\"text\" ><h3><strong>Topics<\/strong><\/h3>\n<ul>\n<li><a href=\"\/security\">Secure Online Voting with POLYAS<\/a><\/li>\n<li><a href=\"\/security\/certified-online-voting-software\">Certified online voting software<\/a><\/li>\n<li><a href=\"\/security\/secrecy-of-the-ballot\">Secrecy of the Ballot with POLYAS Online Voting<\/a><\/li>\n<li><a href=\"\/security\/verification-election-results\">Independent verification of the election results<\/a><\/li>\n<li><a href=\"\/security\/data-security\">Data security and data protection at POLYAS<\/a><\/li>\n<\/ul>\n<\/div><\/section><br \/>\n<div  class='hr av-13shxaw-70ecde758ef09bd32c279342ccec690e hr-default  avia-builder-el-10  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lu9idg7z-bf603fd1ba39051b13a329fc88d83331 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock cnt2_sidemenu2'  itemprop=\"text\" ><h3><strong>Further information<\/strong><\/h3>\n<ul>\n<li><a href=\"\/increase-voter-turnout\">How to Increase Voter Turnout in your Election<\/a><\/li>\n<li><a href=\"\/election-administration\">Election Administration<\/a><\/li>\n<li><a href=\"\/election-material\">Election Material<\/a><\/li>\n<li><a href=\"\/election-glossary\">POLYAS Election Glossary<\/a><\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"categories":[9568],"tags":[],"class_list":["post-41262","page","type-page","status-publish","hentry","category-allgemein-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v25.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure authentication with POLYAS<\/title>\n<meta name=\"description\" content=\"With secure authentication procedures, we ensure that only authorized persons have access to the online voting system. Inform now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.polyas.com\/security\/secure-authentication\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure authentication\" \/>\n<meta property=\"og:description\" content=\"With secure authentication procedures, we ensure that only authorized persons have access to the online voting system. Inform now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.polyas.com\/security\/secure-authentication\" \/>\n<meta property=\"og:site_name\" content=\"POLYAS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-17T12:38:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.polyas.com\/security\/secure-authentication\",\"url\":\"https:\/\/www.polyas.com\/security\/secure-authentication\",\"name\":\"Secure authentication with POLYAS\",\"isPartOf\":{\"@id\":\"https:\/\/www.polyas.de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.polyas.com\/security\/secure-authentication#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.polyas.com\/security\/secure-authentication#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png\",\"datePublished\":\"2016-01-13T10:30:53+00:00\",\"dateModified\":\"2024-06-17T12:38:00+00:00\",\"description\":\"With secure authentication procedures, we ensure that only authorized persons have access to the online voting system. Inform now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.polyas.com\/security\/secure-authentication#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.polyas.com\/security\/secure-authentication\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.polyas.com\/security\/secure-authentication#primaryimage\",\"url\":\"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04.png\",\"contentUrl\":\"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04.png\",\"width\":198,\"height\":174},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.polyas.com\/security\/secure-authentication#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.polyas.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure authentication\",\"item\":\"https:\/\/www.polyas.com\/security\/secure-authentication\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.polyas.de\/#website\",\"url\":\"https:\/\/www.polyas.de\/\",\"name\":\"POLYAS\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.polyas.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure authentication with POLYAS","description":"With secure authentication procedures, we ensure that only authorized persons have access to the online voting system. Inform now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.polyas.com\/security\/secure-authentication","og_locale":"de_DE","og_type":"article","og_title":"Secure authentication","og_description":"With secure authentication procedures, we ensure that only authorized persons have access to the online voting system. Inform now!","og_url":"https:\/\/www.polyas.com\/security\/secure-authentication","og_site_name":"POLYAS","article_modified_time":"2024-06-17T12:38:00+00:00","og_image":[{"url":"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.polyas.com\/security\/secure-authentication","url":"https:\/\/www.polyas.com\/security\/secure-authentication","name":"Secure authentication with POLYAS","isPartOf":{"@id":"https:\/\/www.polyas.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.polyas.com\/security\/secure-authentication#primaryimage"},"image":{"@id":"https:\/\/www.polyas.com\/security\/secure-authentication#primaryimage"},"thumbnailUrl":"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png","datePublished":"2016-01-13T10:30:53+00:00","dateModified":"2024-06-17T12:38:00+00:00","description":"With secure authentication procedures, we ensure that only authorized persons have access to the online voting system. Inform now!","breadcrumb":{"@id":"https:\/\/www.polyas.com\/security\/secure-authentication#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.polyas.com\/security\/secure-authentication"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.polyas.com\/security\/secure-authentication#primaryimage","url":"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04.png","contentUrl":"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04.png","width":198,"height":174},{"@type":"BreadcrumbList","@id":"https:\/\/www.polyas.com\/security\/secure-authentication#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.polyas.de\/"},{"@type":"ListItem","position":2,"name":"Secure authentication","item":"https:\/\/www.polyas.com\/security\/secure-authentication"},{"@type":"ListItem","position":3,"name":"Secure authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.polyas.de\/#website","url":"https:\/\/www.polyas.de\/","name":"POLYAS","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.polyas.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages\/41262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/comments?post=41262"}],"version-history":[{"count":0,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages\/41262\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/media?parent=41262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/categories?post=41262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/tags?post=41262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}