Portable Identity Orchestration - Cenda by Condatis
Decentralised identity platform, Cenda© simplifies the orchestration of decentralised identity user journeys. The platform provides Verifiable Credential and Trust Framework capabilities using industry standards, supporting integration with existing data sources, verifiable credential and identity verification service providers, eliminating vendor lock-in and future proofing deployed solutions.
Features
- Decentralized Identity Service
- Allows customers to easily issue and verify credentials
- Enables passwordless sign-in journeys
- Integrates with existing systems
- Custom credentials and proof/presentation requests
- Integrates with other services, such as identity verification services
Benefits
- Simplifies credential issuance and verification
- System-neutral solution
- Supports easy integration with verifiable credential services
- Trusted data exchange use a Trust Framework
- Supports multiple user journeys via the same architecture
- Privacy preserving (minimum data is required)
- Providing identity technology future proofing, extensibility and reusability
- Extends identity across organisational boundaries
- Easily integrates Verifiable Credentials with IAM systems
Pricing
£500 to £10,000 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 9 3 9 8 7 1 5 0 8 7 3 7 7 5
Contact
CONDATIS GROUP LIMITED
Chris Tate
Telephone: 0800 538 5533
Email: sales@condatis.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
-
Verifiable Credential providers: such as Microsoft Verified ID and Others
Identification Verification Service providers: such as Yoti - Onfido - Others - Cloud deployment model
- Public cloud
- Service constraints
- No - Cenda is delivered via public cloud services, with constraints per that cloud and cloud service(s).
- System requirements
-
- Access to cloud services (at an organisational and procurement level)
- Appropriate connectivity (internet access)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Dependent on customer requirements, notification, logging and responses can be immediate.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Condatis provides SLA-backed break-fix support 24/7 as part of the SaaS version of Cenda. For deployed systems, Technical account managers and cloud support engineers can be available for all 3rd line support levels depending on the specific agreement.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Combination of online training, user documentation and workshops.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
Configuration, Audit and Billing data stored in the system can be extracted for the purposes of migration / deletion. This work could be undertaken by the authority with required support from Condatis.
No PII data is persisted within the service. - End-of-contract process
- All data is extracted and deleted. The customer's instance of Cenda is deactivated and access removed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The service supports mobile device deeplinking and QR code display for both mobile and desktop devices.
Web experience is via adaptive templates. Experience is ultimately dependant on user's device, operating system and browser of choice. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- QR code display screen.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Baseline accessibility testing has been performed.
- API
- Yes
- What users can and can't do using the API
-
Users can perform the following:
- Onboarding
- Create new credentials
- Verify credentials
- Configure identity journeys
- Configuration of trust framework
- Credential management, including revocation - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users can add custom credentials and create custom verification requests - this can be done via the API.
Users can use the API to configure when an issuance, verification or Identity verification check happens within a custom flow.
Nominated users can be given access to the API (secured access).
Users can customise the look and feel of the product.
Scaling
- Independence of resources
- System autoscales according to load through the public cloud architecture.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Metrics include: Number of credential issuances - Number of credential verifications - Number of identity verification checks - Service uptime (or downtime) - User traffic over a specific period - Any failed requests
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data stored in the system can be extracted for the purposes of migration / deletion. This work could be undertaken by the authority with required support from Condatis.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- JSON
- Data import formats
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Encryption (AES 256) of data at rest.
Message level security through signing and verifying requests.
Availability and resilience
- Guaranteed availability
- Condatis SLA(s) indicate service availability. This is backed by cloud provider's own SLA(s). Condatis and cloud provider offer service credits where SLA availability is not met.
- Approach to resilience
-
Azure resilience from a cloud provisioning perspective can be enhanced by configuring some elements to be georedundant or manually configuring failover duplicates in other regions or datacenters.
Customisation based on client needs is possible. - Outage reporting
- Outage reporting is per SLA and can include: - dashboard - email alerting - telephone alerting
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Other
- Other user authentication
- Application client ID and secrets
- Access restrictions in management interfaces and support channels
- Access to system interfaces is restricted by username and password, and additional factors as required. Also, the authority's own access technology (e.g., if access is federated).
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Centre for Assessment (CfA)
- ISO/IEC 27001 accreditation date
- 27/05/2022
- What the ISO/IEC 27001 doesn’t cover
- Condatis' ISO 27001 statement of applicability covers all the controls defined by ISO 27001 with the exception of 14.2.7 Outsourced development and 11.1.6 Delivery and Loading Areas because they do not apply to Condatis.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Information Security Manager reports to CEO.
Regular internal and external audit and management review meetings ensure the following are followed:
Information Security Objectives Information Classification policy, Information Handling policy, Document Control policy, Clear Desk and Clear Screen policy, Secure Development policy, Mobile Computing and Remote Working policy, Access Control policy, Acceptable Use policy, Cryptographic policy, Anti-virus and anti-malware policy, Software Installation policy, Supplier Security & Quality policy, Business Continuity Management policy, Network Security policy, Secure Systems Engineering policy, Media Destruction policy, Communications policy, Password policy, Security Updates policy, Capacity Management policy, Hardware Disposal policy, Data Retention policy, Privileged Utility Programs policy, IPR Management policy, Guest Control policy, Condatis Backup policy, Sustainability policy, Security incident management procedure, Employees departure and arrival processes, Change Management procedure, Risk Assessment methodology
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Condatis operates an agile development lifecycle where feature changes are defined by PBIs (product backlog items). Developed code is version controlled as it passes through a gated release process that is an intrinsic part of the develop, build & deploy DevOps process. Release builds (software components deployed to Azure assets) are strictly controlled within the Azure DevOps platform, and cascade from development to test and pre-production environments before final deployment to production. Changes at organisational level undergo an ITIL change management process, where the CAB (change authority board) evaluates impact and implications for proposed changes before they are authorised.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Computer endpoints are regularly scanned for vulnerable software, Windows updates are regularly applied, malware protection software is installed. Security advisories are regularly monitored and actioned accordingly. The solution deployment within the build pipeline will typically include processes for checking for vulnerabilities in code (Secure Code Scan) and in external software components used (Dependency Checker). Once the solution is deployed within the Azure cloud infrastructure, the use of Defender For Cloud will continually assess the security posture and be monitored for any relevant risk mitigation actions.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Alert monitoring based on transactional volumes processed by Cenda.
Add-on monitoring possible using 3rd party partner services, such as ITC Secure. - Incident management type
- Supplier-defined controls
- Incident management approach
- We operate an ITIL-aligned support desk ticketing solution that is able to track the incident lifecycle stages of logging, triage, categorisation, prioritisation, analysis, resolution and post-incident review. Incidents are reported via alerts or by users through email, phone or portal channels. Incidents can transition to problem tickets where root cause and subsequent full resolution can be established. An incident playbook is maintained for common incident types with respective responses, along with a knowledge base accessible via customer portal. Incident reports with timelines, impact and root cause analysis will be provided as part of post-incident engagement with customer.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We are committed to continuous action that helps flight climate change and works towards ‘net zero’ status. Our current initiatives to support environmental sustainability are as follow:
• Our engagements, workshops and on-boarding are standardised around Teams or Zoom calls including demos, white boarding and retrospectives.
• Whilst we encourage colleagues in the Edinburgh area to visit the office once a week, we work flexibly, thereby enabling colleagues to travel in quieter times and make use of public transport where possible. We have taken this approach since Covid rules were removed resulting in a reduction of travel, company-wide, by 95% and thereby reducing our carbon footprint.
• Our serviced office uses energy efficient lighting and appliances. We reduce waste through our recycling system and near paperless operations.
• We will also use any G-Cloud contracts to assist us in achieving ISO 14001 the environmental standard which will in turn involve us vetting our suppliers and partners over their environmental impact.
• We can leverage distributed ledger technology to support environmental initiatives and drive influence with a positive impact on suppliers, partners and customers.Covid-19 recovery
During COVID-19, we moved to a fully remote office, allowing all colleagues to continue in employment from their own home while still being able to fulfil all the obligations to our customers and complete contracts on time and to standard.
We now work with a hybrid model where colleagues living locally are encouraged to work from the office once a week. Colleagues further away visit the office once a fortnight or once a quarter (location dependant), to support social connections and collaboration between and across teams.
Condatis is able to support those shielding or impacted by Covid by continuing to provide full time remote working for those that want/require it. We also continue to provide a home office set up for all colleagues. This allows Condatis to provide valuable employment for those affected or shielding from Covid while still being able to deliver services as per the contract and customer requirements.
During and post-Covid Condatis offered physical and mental health training to colleagues, including Mental Health First Aid, Mental Health Awareness for Managers, Resilience Training and First Aid at Work. As we develop our wellbeing approach we will continue to provide wellbeing training and awareness sessions to all colleagues and through these initiatives our intention is that this will help to reduce the demand on the health and care services.Tackling economic inequality
Through the following initiatives, Condatis is committed to playing a role in helping to tackle economic inequality in our society:
• We advocate and educate other employers to support apprentice programmes. We have presented to over 100 companies about the benefits of having apprentices as part of the Scottish Apprenticeship week.
• Partnerships: this year we will be developing our CSR approach through partnerships with organisations who exist to support those who are marginalised and/or face barriers to employment.
• We are currently supporting the Saltire Scholar Programme run by Entrepreneurial Scotland by offering a summer internship to an undergraduate. The internship provides experience on live commercial projects and the opportunity to work with new technologies and expert technologists in their field, thereby creating a training opportunity that supports a high growth area of the market.
• Colleagues are remunerated in line with external benchmarking data and we commit to an annual salary review.
• We are a Real Living Wage Employer and committed to paying our colleagues according to the cost of living.Equal opportunity
One of Condatis’ core values is 'Inclusive' which means we strive to create an environment where everyone feels respected and heard and has a sense of belonging. Our values and behaviours as well as business policies and operations promote equity and fairness to avoid bias, prejudice or discrimination. We are committed to ensuring that recruitment, training, development and promotion procedures result in no candidate or colleague receiving less favourable treatment because of a protected characteristic. Our aim is to ensure that our processes are equitable and inclusive and that skills, knowledge and behaviours are assessed as objectively as possible and that everyone has equity of opportunity.
We will continue to provide training for all colleagues based on personal development plans and promotion opportunities based on transparent and objective criteria.
This year we are committed to developing our approach to diversity, equity and inclusion through:
• A review of key processes and follow-up action to further improve accessibility and inclusivity in our behaviours and our operations.
• Developing our partnerships with organisations who exist to support those who are marginalised and/or face barriers to employment.
• Working with a local partner to champion women in technology
• Providing inclusion training for all colleagues involved in recruitment and selection.
• Becoming a Real Living Wage EmployerWellbeing
We believe that good mental and physical wellbeing is key to thriving at work and performing well. As an employer, we take our duty of care seriously and seek to empower colleagues with knowledge and resources to help them look after their health, and offer support to colleagues who may be struggling. Our key wellbeing initiatives are:
• We have a team of trained Mental Health First Aiders, who provide confidential support to colleagues in need.
• We have a Wellbeing Hub that offers practical ways to sustain and improve wellbeing as well as guidance on staying active and helping others.
• Our managers have weekly 1:1 meetings with each team member in which wellbeing is discussed and any issues are supported with confidentiality and sensitivity.
• Volunteering Days – we recognise that giving back and helping others is not only good for our communities but also for our own wellbeing, so every colleague is encouraged to take a volunteering day each year to support a cause important to them.
• This year we will be launching Able Futures, a government mental health initiative, to offer all colleagues access to a mental health professional should they need it.
• As part of our own supplier assessments, we ensure that any third party supplier needs to meet our own ethical standard, which includes their treatment of their workforce. We do the same for prospective customers.
Pricing
- Price
- £500 to £10,000 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Prospective clients can be provided with time limited access to a fully functional trial environment. The trial version should not be used with live PII data and is intended for test and evaluation purposes only.