Efficient, Continuous Identity Verification with 1Kosmos’s Enterprise Identity Wallet

In the age of digital technology, digital identity wallets offer users a transportable, secure way of verifying their identity and certifications. Having a reliable, up-to-date method of verifying identity enables enterprises to swiftly and securely manage procedures.

Switching to Digital Wallets 

Digital wallets provide a flexible, streamlined experience for enterprises, employees, third-party contractors and business-to-business transactions. In spaces where transactions are high-risk, having a secure, verifiable identity to cross-reference is vital to security. Digital wallets can verify end users for active attorney license statuses, active medical licenses or to prove cybersecurity certifications, such as Certified Information Systems Security Professional (CISSP). These can follow employees throughout their employment. 

Utilizing digital wallets in decision-making spaces can help verify end users in addition to their every-day authenticators, similar to step-up authentication. Digital wallets verify identities, eliminating the need for social engineering. If credentials are needed to gain privileged user access, digital wallets help enterprises verify that the end user is who they say they are. For example, during emergencies, such as natural disasters, wallets can help verify that volunteers have active licenses in a timely manner. 

1Kosmos’s Enterprise Identity Wallets 

1Kosmos Identity Blog image

1Kosmos enterprise identity wallets deliver centralized, scalable identity management that enable organizations to securely provision and govern employee digital identities, credentials and access privileges across their entire technology ecosystem.

First, 1Kosmos verifies the end user by validating and verifying their provided documentation. Once verified, 1Kosmos creates a digital wallet by collecting, encrypting and storing an end user’s identification information in a private and permissioned ledger, allowing only the end user to access and share their personal data on their own initiative. This information cannot be accessed by 1Kosmos, as it goes through several layers of encryption. 

These wallets are built with World Wide Web Consortium (W3C) standards, providing an interoperable experience and enables users to reuse wallets and access their identification as often as needed.

1Kosmos’s Digital enterprise identity wallets are classified through a decentralized management system. 1Kosmos’s private, distributed ledger breaks up end users’ identification wallets, updating new certifications and licenses in its own personalized block, utilizing blockchain in the back end to provide a layer of security to encrypt information. Permissions are access based, providing a layer of security through segmentation. 1Kosmos’s wallets utilize attribute-based access control (ABAC) security, granting permissions based on matching data tags. With the proper credentials, end users can access files instantly.  

Protection for High-Risk Transactions

1Kosmos’s enterprise identity wallets have an array of features that make them perfect for high-risk transactions. The wallets have a private and permissioned ledger, offering a distributed identity experience over a centralized one. With Presentation Attack Detection (PAD) Level 1 and Level 2 certifications, 1Kosmos offers protection against deep fake attacks. 1Kosmos offers continuous vulnerability management, FedRAMP high authorization, Kantara certification and Federal Information Processing Standards (FIPS)-140-3 encryption. Perfect for enterprise use and a diverse set of end users, 1Kosmos’s wallets can verify identity, ensuring that all processes are efficient and secure.  

Visit 1Kosmos’s page to learn more about their full service, privacy preserving enterprise identity wallets.

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including 1Kosmos we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

Improving Government CX Services to Build Trust Amongst Customers

In the Private Sector, customer experience (CX) is characterized by applications that serve as a single-stop service for customers. These expectations have trickled from the commercial digital world into the Public Sector, with the exception that co-designing services that keep up with the public’s needs and priorities is non-negotiable to rebuilding trust. High Impact Service Providers (HISPs), Federal agencies that the Government has deemed as having critical value due to their public-facing services, aim to mimic the single-stop layout by creating an all-encompassing CX in the Public Sector. This way, the public sees the Government as seamless and unified, and different Government agencies as parallel to each other.

Customer Experience Built on Trust

Unifying services can reduce challenges the public faces when accessing them. Time is lost due to slow modernization that would otherwise improve interactions with customers. In the past, to access services, individuals may need to take off work, which may lose them income. They may need to travel to a far location, may forget vital documents at home or may have to account for child care. These considerations which come at the expense of the public can be attributed to a “time tax” that burdens Government customers. However, with the shift to online services, customers can update their information quickly and easily on their own time. It is important to note that HISPs are moving to a digital-first, but not digital-only strategy. This means that although all services will be provided online, there will still be in-person options for those who do not have access to a dependable connection or for services that can require in-person help. By providing a variety of reliable, time and cost-effective services, Government agencies can ease usability and build trust with customers.

Okta HISP Customer Experience Series Blog Embedded Image 2024

Agencies with new, modernized websites can build trust in the Government. Conversely, a rushed website with too much downtime can lead to a user’s inability to access essential capabilities. Not every agency has a Customer Experience Officer to help roll out improved CX strategies. Various agencies may be set up differently regarding reporting structure, which complicates counsel. A driver of HISP and other government-wide CX initiatives, the Office of Management Budget (OMB), has released digital experience guidance related to Memorandum M-23-22. With this initiative, the OMB will help agencies choose which public-facing items to invest in and which digital services to optimize for prime CX.  

A fundamental part of CX is the people who provide services. To truly improve customer service, agencies must first improve their employee experience. This means providing secure access to a variety of work models: virtual or in-person, temporary, seasonal or full-time, contractor or agency related. Once agencies understand how to provide a uniform experience across a diverse portfolio of workforces, agencies can train employees to provide uniform CX across a diverse array of customers. 

Technology also plays a key role in the Government’s hope of a trust-filled relationship with those they serve. Consistent branding is one powerful way to unite HISPs across the Government. This can look like each agency placing its logo in the same area of its website. Another way is one authentication mechanism for members of the public to access both their Government account and servicer website. 

A Unified Login

A cornerstone of the Federal Government’s idea around modernizing CX is that there is a simple way for people to access Government services across multiple devices. Login.gov is putting that idea into practice. To shift online, the Government must provide a secure access method for every customer with a goal to move past the need for passwords. The modern generation of customers expect technological services to be available on multiple devices. They also prefer the ability to take a break and pick up where they left off, which requires behavioral analytics to protect users. Each agency will also be required to offer phishing resistant multi factor authentication (MFA) as an option for public users. With proper Identity and Access Management (IAM), whether in the form of single sign on (SSO) or biometric methods to log in, an app can verify that the user accessing sensitive information is the desired recipient. This way, users can gain easy, secure access to their services and information and agencies gain relevant context at the application level that follows Zero Trust principles. 

Empowering CX with IAM

Okta, the leading independent Identity partner, understands that IAM is an integral part of ensuring services are simple, seamless and secure. Furthermore, IAM services can still center CX. Okta has created human-centered design challenge cards to help agencies redesign experiences based on user needs and CX metrics. By synthesizing CX, secure and proper IAM and modern capabilities, the Federal Government can help build trust with the new era of customers. 

To learn more about how Okta’s IAM capabilities aid CX in the Federal Government, watch my interview with Federal News Network to gain insight on building trust with customers. To learn more about how Government agencies can build trust with their customers and improve customer services, view content from Carahsoft’s Government Customer Experience & Engagement Summit.

Okta Cloud Identity Now Available on NJ NASPO Contract

Okta Cloud Identity solutions are now available to all New Jersey public and executive agencies on Carahsoft’s statewide NASPO ValuePoint contract. Carahsoft makes it easy for all agencies within the State of New Jersey to utilize this contract vehicle to procure cloud solutions via a state contract. Okta delivers the essential, modern identity and access management (IAM) capabilities that can assist the state’s modernization efforts for their workforce and constituents.

Okta’s Cloud Identity Solutions include:

  • Single sign on
  • Advanced Server Access
  • API Access Management
  • Multi-factor authentication
  • Access gateway
  • User management

Advantages of Software as a Service

New Jersey state agencies can reduce costs, accelerate services, and modernize their cybersecurity initiatives in several ways with the addition of an Identity as a Service (IDaaS) solution.

Okta’s standard SaaS product can offer:

  • Data transparency through data collection tools that can help explain analytics to users
  • Easy access to the cloud for employees that are working remotely
  • Enhanced security via the ability to update and oversee software to respond to threats
  • Service resources for citizens
  • Simplified cloud usage that will save money by removing the need to outsource IT

With this new addition to Carahsoft’s NASPO Contract, Okta is able to provide the state with modern and secure identity and access management solutions that are easy to maintain through the cloud.

Identity Access Management on StateRAMP

In September of 2021, Okta became one of the first organizations to be included on the StateRAMP authorized vendor list. StateRAMP aims to standardize and promote cybersecurity through education, advocacy, and policy development for state and local governments. Through their partnership, the two aim to improve cybersecurity on government websites to better serve the public.

As one of the first companies included in the StateRAMP authorized vendor list, Okta has illustrated its data security capabilities. Okta’s security solutions can abide by government regulations such as FedRAMP and HIPAA. Okta can also help companies become CJIS compliant. Targeted toward government and procurement officials, the StateRAMP list recognizes companies with established data security, as well as accomplished IaaS, SaaS, and/or PaaS solutions. With the rise in remote work, IT security has become more important than ever.

Identity Standardization in Kansas and Iowa

Okta has aided the Kansas and Iowa state government’s objectives in combating fraud and providing citizens secure access to critical online services. With the hurdles caused by the COVID-19 pandemic, work had changed dramatically. More citizens needed to file for unemployment benefits, and others had their work moved remotely. Okta was there to help agencies transition to modern technology platforms while maintaining the same level of security.

For government agencies, Okta’s identity security solution is vital to protection from cyber threats. Due to Okta’s efforts of employing Identity Access Management solutions on Kansas and Iowa websites, access security has improved for both the government workforce and public citizens. This pursuit has led to faster implementation, better time value, enhanced security, digital transformation, and a simplified experience for users.

With the implementation of Okta Identity Cloud, the Kansas Department of Labor and/or Iowa were able to:

  • Stop over 7 million bots and fraudulent login attempts to their unemployment benefit site
  • Utilize Okta’s customer identity products to connect citizens to new online services as they helped affected citizens with rental and utility assistance
  • Connect all its citizens with easy online access to agency services
  • Strengthen their government services to better serve their constituents

With Okta’s cybersecurity protection from bad actors and bots, and their endeavor to provide secure, simplified, and centralized identity access management, this dream approaches reality.

Visit our website to learn more about solutions for State and Local Government agencies.