GLOBAL AUTHORIZATION STANDARD AND UKRAINIAN STATE INFRASTRUCTURE: REVIEW, CHALLENGES, AND OPPORTUNITIES

Authors

DOI:

https://doi.org/10.32782/2312-1815/2025-21-22

Keywords:

e-government, legal and regulatory framework, information and communication technologies (ICT), transparency, open data, open data publishers (data controllers), data types, standardization, API interfaces (APIs)

Abstract

The article explores the Diia OAuth component of Ukraine’s Integrated Electronic Identification System (ID.GOV.UA) as one of the key elements necessary for the practical implementation of the «Government as a Platform» concept (Tim O’Reilly) [5]. This concept envisions the state focusing on the creation of core digital infrastructure – open registries, standardized APIs, and electronic identification services – while an ecosystem of private and civic developers builds end-user applications for citizens. Special attention is given to Diia OAuth, which functions as a state API gateway for secure user authentication and authorization, enabling developers to integrate verified identification data into their own digital services. The findings confirm that Diia OAuth, while maintaining compatibility with the core logic of the OAuth 2.0 authorization code flow, also reflects local legal and architectural requirements. At the same time, the absence of the scope parameter in the national implementation raises concerns, as this parameter is essential for flexible permission granularity and gives the authorization process depth beyond simple authentication. The use of international standards fosters an open environment where the private sector can develop innovative digital services that enhance the effectiveness of public services and contribute to technological progress, particularly in areas such as electronic voting. The practical value of the study lies in formulating recommendations for further standardization of government APIs and for supporting the developer ecosystem. Particular attention is paid to the three-level trust model, which combines the technical robustness of the protocol with the legal significance of identification data.

References

Chae C.-J., Kim K.-B., Cho H.-J. A study on secure user authentication and authorization in OAuth protocol. Cluster Computing. 2017. DOI: 10.1007/s10586-017-1119-6.

Hammer-Lahav E. The OAuth 1.0 Protocol. IETF RFC 5849. 2010. URL: https://datatracker.ietf.org/doc/html/rfc5849

Hardt D. The OAuth 2.0 Authorization Framework. IETF RFC 6749. 2012. URL: https://datatracker.ietf.org/doc/html/rfc6749

Закон України «Про електронну ідентифікацію та електронні довірчі послуги» № 2155-VIII від 05.10.2017. Відомості Верховної Ради України. 2017. № 45. Ст. 403. URL: https://zakon.rada.gov.ua/laws/show/2155-19#Text

О’Райлі Т. Government as a Platform. Open Government: Collaboration, Transparency, and Participation in Practice / за ред. D. Lathrop, L. Ruma. O’Reilly Media, 2011. С. 11–40.

Технічна документація. Інтегрована система електронної ідентифікації ID.GOV.UA: Обробка інформації про електронну ідентифікацію користувачів. 2023. URL: https://id.gov.ua/downloads/IDInfoProcessingD.pdf

Published

2025-10-30