Updated for Version 4.15
Submission Certification Overview
nFORM is an electronic document receiving system that can be used by a regulatory agency to accept various types of applications and reports submitted by regulated entities and other external stakeholders. The system allows customers to register a single account that can be used to submit electronic documents to the agency.
Each type of document that may be submitted will require one of a number of levels of certification authority on the part of the submitting entity, ranging from simple registration to formal signature authority. Regardless of the required level of authority, nFORM will electronically certify and retain the submission. Additionally, where a formal signature authority is required, nFORM uses an electronic signature device to certify an electronic document submitted to the agency. The use of this electronic signature device establishes proof of identity and intent on the part of the submitting user and is designed to be equivalent to a “wet ink” signature.
Registering a User Account
nFORM allows users to create a user account via a registration process. During the registration process, the user provides information about themselves such as their name, phone number, physical address, and a unique identifier, in the form of the user’s email address, to be used as the account login. No two users can have the identical user account logins, and account logins cannot be re-used if the original account login is no longer needed or used by a user.
When registering an account, the user will enter their desired system password. Passwords that do not meet the password format/strength requirements will be rejected, and the user will be prompted to re-enter a valid password. The minimum requirements within nFORM for password strength are:
Must be at least 8 alpha-numeric characters
Must include at least one upper case letter
Must include at least one lower case letter
Must include at least one numeric digit
Must include at least one special character
Must not have been used by the user previously
During the registration process, users will have the ability to be enable electronic signatory capability. If enabled, users will have the ability to be identity proofed using the CROMERR Shared Services/Lexus Nexus identity proofing service. Alternatively, users will have the ability to download an Electronic Signature Agreement (ESA), and then populate, sign and submit this ESA document to the agency.
If the entered password adheres to the password requirements, the user’s password will be stored in encrypted format in the database and the user will be prompted to sign into the system. The system will also send a Password Reset email confirmation to the user.
nFORM will send an automated email to the user with a hyperlink used to confirm their email address. The user will need to click on the link to confirm their account in order to enable their user account. Until the user account is confirmed, the user will not be able to login to the account.
Understanding Authorization Types
nFORM allows external users to have one of three types or levels of authorization:
Guest Users are those users who would like to submit a form in the NFORM system, without registering an account. This authorization level is enabled on a form-by-form basis, when appropriate.
Self-Registered Users are those for whom a user account and a profile exist in the nFORM system but who have not been further verified by sub-organization staff. For example, no confirmation has been conducted to determine if the account belongs to a “real” person.
This is a global security role and applies to all organizations. The user with this role can complete and submit any form (across all organizations) marked with self-registered user authorization, unless the form is marked as Internal Only.
Authorized Submitters are those whose user accounts are approved for submission of forms to a particular sub-organization. These users are typically verified by the sub-organization staff and are approved to submit information to this sub-organization.
Verified Users are those whose user accounts have been verified by sub-organization staff by some means. Note: Users with the electronic signature authority are also assumed to be verified users.
This is a scoped security role (by organization implicit or cascading) and applies to only the organizations to which the user has this role. The user with this role can complete and submit only those forms within their designated organizations for forms marked with verified user authorization, unless the form is marked as Internal Only.
Electronic Signatory Users are those users who have been further confirmed as having sufficient standing to have their electronic signatures considered as equivalent to paper signatures. This is usually done through a separate manual process involving confirming the user’s identity through a secondary means (this method should be used for those forms that fall under CROMERR).
This is a scoped security role (by organization implicit or cascading) and applies to only the organizations to which the user has this role. The user with this role can complete, sign and submit only those forms within their designated organizations for forms marked with electronic signatory user authorization, unless the form is marked as Internal Only.
Each form in the nFORM system is configured to require one of the above levels of authority before submissions will be allowed from the user in question. The level of authorization required for each form will be determined at the discretion of the agency programs, including the following scenarios:
Forms that do not require a user account to allow submissions from users without a user account.
Forms that require only the self-registered level of authorization to allow for submission by any registered user. Typically, security/user identity verification is not required in this situation.
Forms that require at least a verified user level of authorization are used where a basic user identity verification will suffice for the form submission.
Forms that require an electronic signatory authority typically have signature requirements based on regulatory requirements for the data collection or if the data will be shared with the federal government. Forms that fall under the requirements of the EPA CROMERR rule will require this level of authority.
Establishing User Authorization
Self-Registered Users
Upon initial user account creation in nFORM, all external users are given the self-registered level of authorization. This grants basic permissions to submit applications and reports that require no further verification of the user’s identity.
Authorized Submitter
Before granting the Authorized Submitter level of authorization, agency staff will determine if the user is authorized to submit forms on behalf of the organization. This process is essentially intended to limit user access to submit organization forms to a select group of users.
This role is applied at the organization level and can be implicit (only the selected organization) or cascading (role applies to selected organization and all child organizations).
Diagram 1: Example of assigning the Authorized Submitter to an Organization and its children (cascading)
Verified Users
Before granting the Verified User level of authorization, agency staff will undertake steps to confirm that the user is an individual with a legitimate need to use the nFORM system to make electronic submissions to the agency in lieu of paper submissions. This process is essentially intended to eliminate user accounts that are automatically generated by Web tools, or by individuals with no valid reason to make submissions.
Steps that may be taken could include sending an email to the registered user to determine if the email account is monitored or contacting the user by phone to inquire on the reason for their registration.
This role is applied at the organization level and can be implicit (only the selected organization) or cascading (role applies to selected organization and all child organizations).
Diagram 1: Example of assigning the Verified User to an Organization and its children (cascading)
Electronic Signatory Users
Agency staff are able to grant the electronic signatory level of authorization to a user once that user has completed a further series of steps. These steps should allow the agency to positively confirm the user identity and meet the legal requirements to qualify the user’s future electronic submissions as equivalent to paper submissions.
In order to be further granted electronic signature permissions in nFORM, a user must first complete and submit an Electronic Signatory/Subscriber Agreement (ESA) to the agency. The ESA is a hardcopy electronic signature agreement signed by the individual with a handwritten signature which is mailed to the agency and manually reviewed. The form of the ESA may vary according to the specific needs of the agency but should require the information needed to provide sufficient proof of a user’s identity. The ESA should contain language requiring the user to protect their signing credentials, not to share signing credentials with anyone else, and immediately report any compromise of the credentials to the agency.
The agency will review the information provided in the ESA and perform additional identity proofing as needed. If needed, the agency has any questions about the persons identified, the individual is contacted, and the information is verified. Once the ESA has been verified by the agency, the user will be granted electronic signatory authority within the nFORM system. This role is applied at the organization level and can be implicit (only the selected organization) or cascading (role applies to selected organization and all child organizations). This will allow the user to submit applications and reports that require electronic signature authority for their organization(s).
Processed ESAs are typically retained in a secure location by the agency subject to the appropriate state or federal document retention policies.
Following a successful login to the system, if the agency has accepted and approved their ESA and the user has been granted electronic signatory authority, nFORM prompts the user to define their challenge questions and answers. The user is not forced to perform this step immediately; however, the system will not allow the user to submit a form which requires an electronic signature until this step is performed.
If the user does choose to setup their challenge questions and answers after their login, they will access their user profile, available as a hyperlink from within the application. The user is presented with 22 possible challenge questions, of which they are required to provide answers to 5 questions. Answers must be at least 5 characters in length and must be unique. A history of all challenge questions and answers used by the user account, along with their effective dates, is retained in the database. Once the challenge questions have been selected, answered, and successfully saved, the user is unable to view or change the questions and answers. They may contact the agency to have their challenge questions reset, which will “expire” all the current challenge questions and answers.
The user’s account identifier, challenge questions, and answers together are used to establish the user’s electronic signature within the nFORM system.
Certifying a Submission
Self-Registered User, Authorized Submitter, and Verified User Forms
Forms that require the Self-Registered user level of authority may be submitted by any system users. Forms that require the Authorized Submitter level of authority may only be submitted by users with the Authorized Submitter level of authority for their organization(s). Forms that require the Verified User level of authority may only be submitted by users with either the Verified User or Electronic Signatory level of authority for their organization(s).
Once the user has completed the information required by the online form, nFORM will generate a read-only representation of the form submission and present it on the screen for the submitter to review before signing. The submitter must acknowledge that they have reviewed the form submission prior to completing the form submission process.
nFORM will then provide the user with a page displaying the agency-defined submission certification criteria that each submitter must agree to before they can proceed with the form submission process. By submitting the form, the user is acknowledging the certification agreements on the screen. The act of submitting the form therefore serves to certify the submission.
The unique user account login is then encrypted and is then bound to the submission which is also encrypted. The submission content and user account cannot be separated once accepted by the system and the combined artifact represents the formal “copy of record” for the submission.
Electronic Signatory Forms
If a user has been granted Electronic Signatory authority and has established their challenge questions and answers, they may submit an application or report that requires an electronic signature.
However, if signatures are required and the CROMERR option is not selected in form design, then simple signing will be initiated. Simple signing allows the user to get through the signing process without verifying their identity through CROMERR.
Once the user has completed the information required by the online form, nFORM will generate a read-only representation of the form submission and present it on the screen for the submitter to review before signing. The submitter must acknowledge that they have reviewed the form submission prior to completing the form submission process. The PDF generated, and the files attached then are hashed to become immutable copies of record for the submission.
nFORM will then provide the user with a page displaying the agency-defined submission certification criteria that each submitter must agree to before they can proceed with the form submission process. By submitting the form, the user is acknowledging the certification agreements on the screen.
nFORM will also randomly choose one of the 5 challenge questions previously selected and answered by the user. The user must correctly enter the answer to the presented question. If a challenge question is incorrectly answered, nFORM will automatically cycle to the next challenge question. The act of providing the correct challenge question response and submitting the form therefore serves to certify the submission.
The unique user account login, challenge question, and challenge question response are then encrypted and used as the user’s electronic signature to certify the submissions authenticity. This electronic signature is then bound to the submission which is also encrypted. The submission content and electronic signature cannot be separated once accepted by the system and the combined artifact represents the formal “copy of record” for the submission.
Storing a Submission (Copy of Record)
As detailed above, nFORM will create a “copy of record” for each submitted form which will contain encrypted versions of the reported data, related attachments (if applicable), and identifying metadata, as well as either the encrypted user account or the encrypted electronic signature depending on the level of authorization required for the form.
nFORM will use a private certificate key provided by the agency to digitally sign the resulting copy of record and seal the document with the signatures intact. The copy of record will be in the form of a ZIP or PDF file, depending on whether attachments are included in the submission. If no attachments are included in the submission, the submitted form will include one PDF file representing the reported data. This PDF file will include the certificate. If attachments are included in the submission, the submitted form will include one ZIP file which will include one PDF file representing the reported data and all attachments included in the submission. This ZIP file will include the certificate.
Submitters are notified about the creation and storage of the copy of record in an automated email sent by nFORM. The user may access the electronically signed document at any time within nFORM. If the submitter needs to modify a submission, they must provide the revisions using an entirely new submission which can first be copied from the prior submission. The most recent form submission then becomes the user’s official copy of record but does not replace or delete any existing submission.
The user may also request that a submission be rescinded, for example, if submitted accidentally. Agency staff will review such requests and nFORM will notify the user accordingly.
The digitally signed, encrypted copy of record is stored in the relevant file storage system. There is no way within nFORM to modify a copy of record.
The integrity of the electronic certification and submission contents may be verified at any time by recalculating the signature and submission contents using the original encryption key. If any part of the copy of record was altered, including the electronic signature information, result would differ from the original, allowing the system to detect the change.
CROMERR Related Security Features
It should be noted that a system alone cannot be deemed CROMERR compliant. Compliance is based on the systems specific implementation, both technical features and business process for each client’s specific usage. For example, if Arkansas DEQ submitted a CROMERR application for nFORM, and it was accepted by the EPA, then Arkansas DEQ’s nFORM implementation can be considered CROMERR compliant. If New York DEC wished to obtain CROMERR compliance, New York DEC would need to submit an application for their implementation of nFORM.
Below is a list of features in nFORM that are often included as necessary functionality in a CROMERR compliant system:
Requirement | Category | Subcategory |
Allow users to create/register a new user account. This includes information such as name, phone number, physical address and unique login in the form of an email address. | User Management | Profile |
The user login must be unique. | User Management | Login |
The user login cannot be reused. | User Management | Login |
The system must enforce a password strength with the following minimum parameters: | User Management | Password |
The system must provide the ability to automatically expire passwords. | User Management | Password |
The system must maintain a history of all passwords used by the unique user account login in the database, including the date/time the password was created and expired. | User Management | Password |
The system can only allow one active password for a unique user account login, at a given time. | User Management | Password |
All user passwords must be stored in an encrypted format in the database. The format will be a one way, "salted", hash, using the SHA-512 bit algorithm. If needed, the algorithm can utilize the Bcrypt or SHA-3 algorithm, via configuration setting. | User Management | Password |
After a user changes their password, the system will require that the user sign into the system utilizing the new password. | User Management | Password |
To overcome forgotten passwords, allow a user to enter their email address to request a change of their password. In order to initiate the password change process, one of their entered challenge questions will be randomly selected and will be presented. The user must answer the challenge question correctly to initiate the password change. If a challenge question is correctly answered, a new password is randomly generated by the system and emailed to the user's email address. | User Management | Password |
After a user attempts to change their password, the system will send a Password Reset confirmation email to the user. | User Management | Password |
The system must allow an Administrator or Organization Manager to reset a user's password, as required. When an Administrator or Organization Manager initiates the password reset, a new password is randomly generated by the system and emailed to the user's email address. | User Management | Password |
The system must allow a user to change their password, if logged in. When attempting to change the password, the user will be required to enter their current password as well as their new compliant password. | User Management | Password |
Upon registration of a new user, the system must send an email to the user with a hyperlink used to confirm their email address. | User Management | Confirmation |
Allow a user to be assigned to the Electronic Signature role. | User Management | Role Assignment |
Following a successful login to the system, if the user has Electronic Signature rights, the user must be prompted to define their challenge questions and answers. The user is not forced to perform this step immediately; however, the system will not allow the user to certify and submit a form (which requires an electronic signature) until this step is performed. | User Management | Challenge Questions |
Once challenge questions are provided, the user will not have the ability to change the answers through their profile, unless their challenge questions have expired. | User Management | Challenge Questions |
Allow electronic signatory users to establish challenge questions, if not established. | User Management | Challenge Questions |
The system must enforce that challenge questions meet the following parameters: | User Management | Challenge Questions |
They system will allow users to select from a list of 22 challenge questions. | User Management | Challenge Questions |
The date/time a challenge question answer was provided must be tracked. | User Management | Challenge Questions |
A history of challenge questions and answers must be maintained in the database, including question, answer, effective dates, and expiration date. | User Management | Challenge Questions |
Challenge questions asked and the respective answers should be encrypted, per EPA recommendation. | User Management | Challenge Questions |
The system must allow an administrator to expire a user’s challenge questions. | User Management | Challenge Questions |
Challenge question answers must be stored in an encrypted format in the database. The format will be a one way, "salted", hash, using the SHA-512 bit algorithm. If needed, the algorithm can utilize the Bcrypt or SHA-3 algorithm, via configuration setting. | User Management | Challenge Questions |
The system will automatically lock an account if the user attempts to change their password and incorrectly answers the challenge question on five (configurable) consecutive attempts. | User Management | Challenge Questions |
All user session communication must be protected through SSL. | General | Communication |
The Signing page consists of agency-defined electronic signature agreement criteria that each submitter must agree to before they can proceed with the form submission process. The user must individually acknowledge each agreement on the screen before they are allowed to continue. | Submission | Certification |
Each agency must have the ability to customize their electronic signature agreement criteria to meet their requirements. | Submission | Certification |
If all conditions (agreements) are accepted, the user must have the ability to electronically sign the submission, by a randomly selecting one of the five answered challenge question and entering their account password. If a user does not answer the selected challenge question correctly, the system will select the next challenge question, requiring the user to answer the challenge question presented and reentering their password. | Submission | Certification |
The system must provide an automatic lockout mechanism based on a configurable maximum number of electronic signature (challenge question + password) attempts, with 5 being the minimum setting. | Submission | Certification |
At a minimum, the system must present the following agreements to the user signing the submission: | Submission | Certification |
The system must allow a custom certification statement to presented to the user for CROMERR certifications. | Submission | Certification |
The system must support a digital signature process utilizing X509-compatible certificates. At a minimum, it must support a PKCS#12 (PFK) type. | Submission | Signature |
The system must support SSL communication (i.e., strong 256-bit encryption 2048-bit root) for the electronic signature process. Note that the electronic signature certificate is different from that used by the solution to secure its communication (which uses the SSL certificate). | Submission | Signature |
During the form submission process, the system will generate a read-only representation of the form submission and present it on the screen for the Submitter can view the form submission before signing. The read-only representation of the form submission includes all data contained within the form submission as well as the ability to download and/or open any related attachments that the Submitter included in their submission. The Submitter must acknowledge that they have reviewed the form submission prior to completing the form submission process. | Submission | Submission |
The certification statement presented to the signer, including warning of penalties for false certification, must be incorporated into the copy of record for the signed submission. | Submission | Submission |
The system must protect the integrity of the form submission by, not allowing alterations of the form submission content during transmission or after it is received. | Submission | Submission |
The system must protect the integrity of the form submission by, utilizing SSL for the entire form submission process, protecting the system and submission against man-in-the-middle attacks. | Submission | Submission |
The system must protect the integrity of the form submission by sending an email notification after each form submission. This email contains a unique submission number as well as a link to the submission record where the electronically signed CoR can be downloaded. | Submission | Submission |
The information used to populate the read-only representation of the form submission, reviewed by the Submitter during a form submission, must be the exact information used to complete the form submission. No updates to that data previewed can be made after the submission process begins. | Submission | Submission |
The CoR must contain the exact data used to populate the read-only view of the form submission, reviewed by the Submitter during a form submission. | Submission | Submission |
The system must allow the unique user account login, password, challenge question and challenge question response to be used as the electronic signature device. The application must use its private certificate key to digitally sign the hash of the signature device and the CoR to bind the electronic signature to the submitted form. | Submission | Signature |
The electronically signed CoR file created for each submitted form must contain the reported data, header page, related attachments (if applicable), and bound electronic signature. The electronically signed CoR file created for each submitted form will be in the form of a ZIP or PDF file, depending on whether attachments are included in the submission. If no attachments are included in the submission, the submitted form will include one PDF file representing the reported data. This PDF file will include the certificate. If attachments are included in the submission, the submitted form will include one ZIP file which will include one PDF file representing the reported data and all attachments included in the submission. This ZIP file will include the certificate. | Submission | Submission |
The CoR must contain a header page with meta-data from the submission process, including date and time of submission, submission number and submitter name. A watermark indicating the certificate authority used and fingerprint (a unique certificate number) for the electronic signature is also displayed. No passwords, challenge questions/answers, or any other sensitive information is displayed on this header page. The header page is included in the CoR strictly as a clear way of visibly indicating to any viewer of the CoR that the CoR has been successfully electronically signed. The meta-data recorded on the header page is retrieved from the database, so it's not the sole source of this information. | Submission | Submission |
Upon submission of an electronic signature level form, a copy of record of the submission at submission time must be retained. | Submission | Submission |
Following the submission/signature, the system must present the submitter with a confirmation page including a unique Submission Number. | Submission | Submission |
The system must send an acknowledgement email to the email address of the Submitter after every submission. The email will contain the Submitter's name, date and time of submission, subject of email, as well as a unique Submission Number so that the Submitter can further identify the form submission in question. This email contains the unique confirmation number and a description of where to download the CoR within the system, if desired. | Submission | Submission |
Following the submission/signature, the system must provide the ability for the Submitters to view or download the electronically signed copy of the CoR at any time for any form submission (where they are assigned as a contributor to the form submission) from the Submission View page of the nFORM system. | Submission | Submission |
The electronically signed version of the CoR must also be able to be used for verification of signature authenticity, and that no modification to the CoR has been made since initial creation. The system must provide the ability to Verify Authenticity of a COR. | Submission | Submission |
The system must store the CoR (i.e., PDF and associated attachments) as a two-way hash, using the SHA-2 512 bit algorithm. If needed, the algorithm can utilize the Bcrypt or SHA-3 algorithms, via confirmation setting. COR's are protected from deletion or alternation through hashing. | Submission | Submission |
The unique user account login, password, challenge question and challenge question response are used as the electronic signature device. Forms application will use its private certificate key to digitally sign the hash of the signature device and the CoR to bind the electronic signature to the submitted form. The electronic signature device hash for each signer must be added to the Signature Page Properties. | Submission | Submission |
When providing the human readable CoR to a user for download and access, the CoR must first decrypted, using the decryption key. The decryption key must be stored in the application configuration file. | Submission | Submission |
The system must provide the ability to "Rescind" a submission. | Submission | Submission |
The system can provide no function to modify or delete a COR. CORs must be retained indefinitely. | Submission | Submission Management |
The system must provide the ability to view all submissions and their status, including any form submissions that were rescinded. | Submission | Submission Management |
The system must provide the ability to lock a user account. | User Management | Locking |
The system must provide notification to a user, if their account status is changed (e.g., locked and unlocked). | User Management | Locking |
The system must provide the ability to print the COR. | Submission | Submission |
The CoR must be stored in the database in the Binary Large Objects (BLOB) format or on a relevant file system in an encrypted format. | Submission | Submission |
The system must assign each CoR a unique document identifier that is related to the submission. | Submission | Submission |
The system must provide the ability to log items in a database audit table as well as the application event logs. The individual entries in these two logs must be identical in information and format to allow comparison. | User Management | Audit Logging |
The system must log password change attempt to the audit logs, with a pass/fail indicator. | User Management | Audit Logging |
The system must log challenge question change attempt to the audit logs, with a pass/fail indicator. | User Management | Audit Logging |
The system must log electronic signature attempts to the audit logs, including success or fail indicator, and source of issue (challenge question response attempt) if failed attempt. This log will include the challenge question selected as well as the acknowledgements agreed upon. | User Management | Audit Logging |
The system must log submission status changed (rescinded, revised, issued, etc.) to the audit logs. | Submission | Audit Logging |
The system must log email notifications that are sent to the applicant to the audit logs. | Submission | Audit Logging |
The system must log submission processing step status changed to the audit logs. | Submission | Audit Logging |
The system must log when a submission is created to the audit logs. | Submission | Audit Logging |
The system must log when a user changes their login name to the audit logs. | Submission | Audit Logging |
The system must log when a user changes their first/last name to the audit logs. | Submission | Audit Logging |
The system must log when a user changes their phone number to the audit logs. | Submission | Audit Logging |
The system must log when each step of the submission wizard is visited to the audit logs. | Submission | Audit Logging |
The system must log when a user account is locked, and the reason for the lock, to the audit logs. | Submission | Audit Logging |
The system must log when a user account is unlocked to the audit logs. | Submission | Audit Logging |
The system must log when a user account status is changed to the audit logs. | Submission | Audit Logging |
The system must log when a CoR is downloaded to the audit logs. | Submission | Audit Logging |