eIAM Support
- eIAM Support
Support
Instructions for self-help
We have created various self-help instructions for end users. You can find these under the following links, separated by login method.Instructions for the CH-LOGI
Instructions for the FED-LOGI
Links to all instructions
CH-LOGIN
Account management
- MyAccount Home page - Set favorite
s - CH-LOGIN - Password forgotte
n - Change User Profile Dat
a - CH-LOGIN - Change of e-mail addres
s - CH-LOGIN - Changing the passwor
d - CH-LOGIN - Entering or changing the security question
s - CH-LOGIN - Restoring the two-factor login in self-servic
e
Two-factor authentication management
- CH-LOGIN - Adding mTAN as Second Facto
r - CH-LOGIN - Adding the Authenticator App as Second Facto
r - CH-LOGIN - Adding a FIDO security key as Second Facto
r - CH-LOGIN - Adding the Mobile ID as Second Facto
r - CH-LOGIN - Order Vasco Digipass Authenticato
r
Management of external identities (BYOI)
- CH-LOGIN - Link AGOV identity (BYOI) with eIA
M - CH-LOGIN - Adding login factors to CH-LOGI
N - CH-LOGIN - Log in with Bring Your Own Identity (BYOI
) - CH-LOGIN - Delete existing link with external (BYOI) identit
y - Transition from CH-LOGIN to AGOV Case study: «Disconnection of BYOI IDP Canton of Bern»
Further instructions
- Step-UP of a CH-LOGIN identit
y - VLV visual login verificatio
n - Testing without autologo
n - Testing in Canary mod
e - Solving cookie problem
s - Instruction to creating a SAML trac
e - Using or cancelling IE7 compatibility mode in Edg
e - Using SharePoint with MS Office application
s
FED-LOGIN
- Use FED-LOGIN without smartcard (for smartcard holders
) - FED-LOGIN - Access App registratio
n - FED-LOGIN - Registering a Security Key (FIDO2
) - FED-LOGIN totally smartcardless (External employees e.g. Mobile-VDI users without smartcard equipment
) - FED-LOGIN IM Instructions for FED-LOGIN totally smartcardles
s - MyAccount Home page - Set favorite
s - FED-LOGIN - Password forgotte
n - FED-LOGIN Access App remov
e - FED-LOGIN – Remove security key (FIDO2
) - Help button in the FED-LOGIN Access Ap
p - List of operating systems supported by the FED-LOGIN Access ap
p - Using SharePoint with MS Office application
s
AGOV help
Important: Please do not create your own instructions for CH-LOGIN and FED-LOGIN - you are welcome to refer to the multilingual help pages we have created. This will save you effort and your documents will always be up to date with the eIAM.
Support Forms
The principle of self-help applies to both CH-LOGIN and FED-LOGIN. The end users should always first try to solve their difficulties on their own via self-help. If this is not successful, we have created the following forms for the corresponding support requests regarding a login problem, an account mutation or reset.- Support request for LOGIN problems
- Support request for CH-LOGIN mutations
- Support request for FED-LOGIN reset for users without smartcard
Managed Techuser Forms
eIAM offers the use and setup of "Managed Techusers". The Techusers are provided and managed by the eIAM Operations team according to the customer's order specifications.The following three techuser categories are available:
1. Techusers to use the APIs provided by eIAM ▼This category of tech users is mainly used in automatic user management. eIAM offers 2 APIs for this purpose a SOAP interface for direct access to the user management in NevisIDM (see details on eIAM-AMW), as well as a REST interface via which the functionalities of the delegated management can be used as a service (see details on eIAM-RDM).
Please note the following necessary preparations before ordering:
- For accounts with a soft certificate, authentication is done by means of an X.509 certificate of class C (classes D and E are not supported).
- The certificate must first be procured by you as the customer, in accordance with the specifications of the Admin PKI, via a Remedy MAC (enter order by order type, search for "certificates class C", -> order certificate).
- The certificate is in the name of the technical user who is used to establish the connection.
- The certificate must contain at least the following key usages:
- X509v3 Key Usage: Digital Signature
- X509v3 Extended Key Usage: TLS Web Client Authentication
- The public key must be included in the order as a PEM file.
- The CISO of the office (see list of CIS
O ) must approve the use of the Techuser via mail. - For the lifecycle management of the "Managed Techuser", a responsible, central office must be defined (not a dedicated person), which knows the technical contexts and can carry out certificate exchanges, e.g. an application management team.
Order form for setting up a Techuser for eIAM-RDM
This category of tech user is primarily used in SOAP-based server (consumer) to server (provider) communication via a web service gateway. eIAM offers the eIAM Web Service Gateway (eIAM-WSG) for authentication. Details on this service can be found at eIAM-WSG.
Please note the following necessary preparations before ordering:
- The accounts used must be ordered in advance from ICD - CIS & Directories via Remedy. The team creates an account in the data reference point, which is provisioned to eIAM and is subject to a regulated lifecycle. The following naming conventions apply:
- SN= SVC-<stage>-<department>-<office>-<APPL>
- Stage: DEV, TST, REF, ABN, PRD
- Department: FDHA, FDFA, FDF, FDJP, EAER, DETEC, DDPS
- Office (abbreviation): e.g. FOITT, FSO, etc.
- Appl (abbreviation): e.g. IDM, LVS, AWISA
- Stage: DEV, TST, REF, ABN, PRD
- givenName = TU
- displayName analogue SN
- SN= SVC-<stage>-<department>-<office>-<APPL>
- Accounts with a soft certificate are authenticated using an X.509 certificate of class C (classes D and E are not supported).
- The certificate must be procured in advance by you as the customer, in accordance with the Admin PKI specifications, via a Remedy MAC (enter order by order type, search for "Class C certificates", -> order certificate).
- The certificate is in the name of the technical user who is used to establish the connection.
- The certificate must contain at least the following key usages:
- X509v3 Key Usage: Digital Signature
- X509v3 Extended Key Usage: TLS Web Client Authentication
- X509v3 Key Usage: Digital Signature
- In the order, the public key must be supplied as a PEM file.
- The certificate must be procured in advance by you as the customer, in accordance with the Admin PKI specifications, via a Remedy MAC (enter order by order type, search for "Class C certificates", -> order certificate).
- The CISO of the office (see list of CIS
O ) must authorise the use of the tech user via e-mail. - For the lifecycle management of the "Managed Techuser", a responsible, central office must be defined (not a dedicated person), which knows the technical context and can carry out certificate exchanges, e.g. an application management team.
This category is used in automated testing, monitoring and data processing. eIAM offers 4 account types of managed "techusers" for the interactive use of eIAM service via web UI, especially for the login to office applications:
- CH-LOGIN with fixed mTAN and ReCaptcha Whitelisting
suitable for applications with QoA30 and lower. - Accounts with soft certificate class C for authentication via FED-LOGIN by means of certificate suitable by default for Appl with QoA30 and lower.
- Account from Active Directory (AD) with Trust AD Resource Forrest ADR.ADMIN.CH, e.g. F-Account for authentication via FED-LOGIN over Kerberos suitable for Appl with QoA40 and lower.
- T-Account (personal test identity with dedicated SG-PKI smartcard and AD reference) for authentication via FED-LOGIN (smartcard or AD authentication via Kerberos) suitable for applications with QoA60 and lower.
Please note the following necessary preparations before ordering:
- The following accounts must already exist;
- CH-LOGIN must be created by the orderer in advance (see instructions CH-LOGIN - Registratio
n ). Important: SMS (mTan) as a second factor must also be set up in advance, otherwise no fixed mTan can be stored. - F-Account must be ordered via Remedy MAC (Link Remed
y ). - T-Account must be ordered via Remedy MAC (Link Remed
y ).
- CH-LOGIN must be created by the orderer in advance (see instructions CH-LOGIN - Registratio
- The accounts with a soft certificate must be procured by you as the customer, in accordance with the specifications of the Admin PKI, via a Remedy MAC (enter order by order type, search for "certificates class C", -> order certificate).
- The certificate must be an X.509 class C certificate.
- The certificate is in the name of the technical user used to establish the connection.
- The certificate must contain at least the following key usages:
- X509v3 Key Usage: Digital Signature
- The public key must be included in the order as a PEM file.
- The CISO of the office (see list of CIS
O ) must approve the use of the techuser via mail. - For the lifecycle management of the "Managed Techuser", a responsible central office must be defined (not a dedicated person), which knows the technical interrelationships and can carry out certificate exchanges, e.g. an application management team. The exception here are T-accounts, which are personal.
Please note that eIAM Operations only ensures that the tech users including the identity reference (account in the client's access client) are correctly created. It's the responsibility of the GKA/BVA to grant these Techuser accounts the necessary permissions in the Access Client for the intended use. Order form for setting up a Techuser CH-LOGIN with fixed mTAN
Order form for setting up a Techuser account with soft certificate
Order form for setting up a Techuser account with AD-Trust (e.g. F-Account)
Order form for setting up a Techuser T-account