ConsentID Identity Provider

Digital Signature, Authentication and Digital Consent on your mobileConsentId-how-it-works

More and more (personal) information is online available that needs to be protected against unwanted disclosure. Users wish to protect their online identity and information. They are conscience about their rights and privacy. Users want to give consent and stay in control of their information and decide for themselves who will get what information.

Watch the Brazilian version of our ConsentID commercial on YouTube.

ConsentID provides trust and credibility

To make it possible for a user to give his consent and the business owner to ask for consent AET created the ConsentID service. ConsentID is based on digital certificates technology, providing trust and credibility to digital transactions. It performs transactions with absolute security in an easy way. You can digitally sign documents without paper or pen, saving time and money. Assuring users identity by providing authentication and secure access to customers, employees and citizens. It does not require plug-ins or complex passwords. You can use ConsentID on any device: mobile, tablet or desktop and different operating systems.

eIDAS proof

ConsentID operates in the area of digital signatures and identity management within the parameters of eIDAS. By following these European standards, digital signatures have a legal value, protecting both parties of a contract. It is a unique solution that works with digital certificates on your mobile device.

Security by PKI technology

Based on PKI technology and more than 15 years of expertise, the ConsentID authentication and signing service offers a flexible, easily adaptable and integrated solution for any business application. The ConsentID service offers a unique solution that works without any web browser plugins, username/password combinations you need to remember or complicated text messages you need to copy into your browser. The only thing you need to know as a user is your username and your PIN code.

How does ConsentID work?

A user connects with his browser to a Business Application. He enters his user name in the required field of the application which send a verification request to the ConsentID server. The ConsentID server will push a message (Asking for consent) to the users mobile phone and then the user can enter his PIN on the phone to get access to the application on the PC. The Business Application gives access to the users’ requested information.

Click here to find more information about our Apps

Nominated for the category:
Dutch Risk, Intelligence & Security



Brochure ConsentID

Digital Signature, Authentication and Digital Consent on your mobile.

ConsentID, AET’s solution, is based on digital certificates technology, providing trust and credibility to digital transactions. It performs transactions with absolute security in an easy way.

Download PDF Download PDF

White paper ConsentID

Mobile multifactor security
A revolution in authentication and digital signing

This paper describes mobile multifactor security as the new, user-friendly and secure way for authentication and digital signing.

Download white paper (PDF)

Datasheet ConsentID

With ConsentID a person can authenticate himself to a Business Application on any device, anytime and anywhere

ConsentID issues a trustworthy electronic identity to persons and organizations that need to be identified by Business Applications.

Download datasheet (PDF)

Use Case Dataplaza

Easy access and control of your sensitive information

Dataplaza is a platform for notaries where everyone can access his digital files through a secure portal where notary and client can exchange information. Furthermore, it is possible for anyone to store data in a digital vault free of charge such as logins, PINs and documents.

Download use case (PDF)

Use Case Medische Gegevens

Mobility in Healthcare

The portal (My Medical Data in English), gathers information of the electronic medical records of the Dutch citizens To facilitate its use in mobility, the desired solution would have to meet the requirements…

Download use case (PDF)