Most frequently asked questions based on citizens’ queries
What is an electronic signature?
The electronic signature has the same legal validity as a handwritten one in accordance with the laws of the Republic of Azerbaijan. According to the law on “Electronic Signature and Electronic Document", any citizen should apply to the state authority only with a document signed with an enhanced electronic signature.
At any post office of Azerpost LLC (for regions only)
What documents are required for obtaining an e-signature card?
Any citizen wishing to obtain an e-signature card can apply to registration centers with ID card. To obtain a certificate, he/she is required to submit an ID card. Individuals, legal entities and government officials are required to provide the documents listed in the link below:http://2018.e-imza.az/az/pricing
What is authentication?
Authentication is the process of verifying the authenticity of a piece of data submitted by a person.
What should I do if the e-signature card is lost?
You must immediately inform Call Center 157, and ask for suspension, renewal or termination of the certificate.
I know e-signature card PUK code, but have forgotten PIN, or PIN is blocked what should I do?
To recover PIN code, you have to follow the steps in the opened window by accessing Start > All programs > Charismatics > Smart Security Interface
Can I give another person the right to use my e-signature card?
As e-signature card belongs to a specific person, this electronic signature belongs only to that individual and the signing process can be performed only by him. It is not advisable to give the card to someone else and notify the identification code (PIN code) to him.
On what operating systems does e-signature card reader work?
It has been tested on Windows operating system.
Why does certificate have validity period?
The validity of each public key is determined by the certificate in terms of security. Therefore, the Certification Center issues certificates with a validity period.
Why are two keys required?
Unlike the symmetric key encryption, two different keys are used for encryption and decryption of data in asymmetric systems that cannot be separated from each other. One of the keys is used for encryption and the other for decryption. The principle of operation of the system with a public key is based on the application of one-way functions in a secret way.