{
    "componentChunkName": "component---src-templates-blog-article-js",
    "path": "/blog/rgs-guide-levels-stars-electronic-signature-eidas",
    "result": {"data":{"page":{"edges":[{"node":{"seo":{"title":"Tecalis Blog | Identity, Digital Transformation, RegTech","meta_description":"Tecalis Blog. Access insights, trends and valuable content on Identity, Digital Transformation and RegTech."},"title":"Blog","search_title":"What topic are you looking for?","search_placeholder":"For example, electronic signature","search_button":"Search","search_show_all":"Show all topics"}}]},"categories":{"edges":[{"node":{"id":"Blog-categories_11","name":"Economy","url":"economy"}},{"node":{"id":"Blog-categories_12","name":"User experience","url":"user-experience"}},{"node":{"id":"Blog-categories_13","name":"Electronic Signature","url":"electronic-signature"}},{"node":{"id":"Blog-categories_14","name":"Risk Management","url":"risk-management"}},{"node":{"id":"Blog-categories_15","name":"Legal Framework ","url":"regulatory-legal-framework"}},{"node":{"id":"Blog-categories_21","name":"Digital Onboarding ","url":"digital-onboarding"}},{"node":{"id":"Blog-categories_22","name":"RPA - Automation","url":"rpa-automation"}},{"node":{"id":"Blog-categories_23","name":"Digital Transformation","url":"digital-transformation"}},{"node":{"id":"Blog-categories_24","name":"Identity Verification","url":"identity-verification"}},{"node":{"id":"Blog-categories_27","name":"X Tech","url":"x-tech"}},{"node":{"id":"Blog-categories_29","name":"Fraud Prevention","url":"fraud-prevention"}},{"node":{"id":"Blog-categories_31","name":"Electronic Invoice","url":"electronic-invoice-e-invoicing-digital"}},{"node":{"id":"Blog-categories_38","name":"Customer Hub for sales","url":"commercial-hub"}},{"node":{"id":"Blog-categories_41","name":"Sales Processes","url":"sales-processes"}}]},"blog":{"frontmatter":{"url":"/blog","subscribe":"Subscribe","see_more":"See more themes","see_less":"See less themes","view_more":"View more","recommended":"Recommendations","explore":"Explore by category","newsletter":{"title":"Get the latest news right in your inbox","description":"By clicking submit below, you consent to allow Tecalis to store and process the personal information submitted above to provide you the content requested."}}},"post":{"seo":{"title":"RGS: What It Is, Levels, Stars, and Its Impact on Electronic Signatures","meta_description":"Do you need to bid on contracts in France? A guide to the RGS certificate, ANSSI star levels, and their eIDAS equivalence to operate securely in Europe.","image_2":{"localFile":{"publicURL":"/static/3b0c43b12bf516d39a9aabfb9f56fd1b/Blog_RGS_EN_c8c6b41abe.png"}}},"id":"Blog-posts_425","name":"RGS: What It Is, Levels, Stars, and Its Impact on Electronic Signatures","url":"rgs-guide-levels-stars-electronic-signature-eidas","creation_datetime":"06 May 2026","published_at":"11 May 2026","creation_date":null,"modification_date":null,"photo_2":{"name":"Blog-RGS-EN.png","alternativeText":"","localFile":{"childImageSharp":{"gatsbyImageData":{"layout":"constrained","images":{"fallback":{"src":"/static/3b0c43b12bf516d39a9aabfb9f56fd1b/80ad6/Blog_RGS_EN_c8c6b41abe.webp","srcSet":"/static/3b0c43b12bf516d39a9aabfb9f56fd1b/dab6e/Blog_RGS_EN_c8c6b41abe.webp 350w,\n/static/3b0c43b12bf516d39a9aabfb9f56fd1b/d2e75/Blog_RGS_EN_c8c6b41abe.webp 512w,\n/static/3b0c43b12bf516d39a9aabfb9f56fd1b/19831/Blog_RGS_EN_c8c6b41abe.webp 520w,\n/static/3b0c43b12bf516d39a9aabfb9f56fd1b/5ad9c/Blog_RGS_EN_c8c6b41abe.webp 636w,\n/static/3b0c43b12bf516d39a9aabfb9f56fd1b/f0e0f/Blog_RGS_EN_c8c6b41abe.webp 704w,\n/static/3b0c43b12bf516d39a9aabfb9f56fd1b/29688/Blog_RGS_EN_c8c6b41abe.webp 928w,\n/static/3b0c43b12bf516d39a9aabfb9f56fd1b/c8ce3/Blog_RGS_EN_c8c6b41abe.webp 972w,\n/static/3b0c43b12bf516d39a9aabfb9f56fd1b/80ad6/Blog_RGS_EN_c8c6b41abe.webp 1136w","sizes":"(max-width: 768px) 50vw, 972px"},"sources":[]},"width":1136,"height":590}}}},"content":[{"id":4551,"text":"<p><span style=\"font-weight: 400;\">The </span><strong>RGS (R&eacute;f&eacute;rentiel G&eacute;n&eacute;ral de S&eacute;curit&eacute;) </strong><span style=\"font-weight: 400;\">is the French regulatory and technical framework created by </span><strong>ANSSI</strong><span style=\"font-weight: 400;\"> (the National Agency for the Security of Information Systems) that establishes security rules for the information systems of public administrations and their suppliers. It is based on a trust rating system structured around 1-, 2-, and 3-star </span><strong>RGS certificates</strong><span style=\"font-weight: 400;\">, which determine the level of cryptographic strength and the support (software or hardware) required to perform procedures such as electronic signatures, authentication, and encryption.</span></p>\n<p><span style=\"font-weight: 400;\">For Spanish companies, obtaining an RGS** certificate (2 stars) or its equivalent qualified under eIDAS is essential for participating in cross-border public tenders in France and operating in the European market with full legal guarantees. </span></p>","strapi_component":"blog.content-rich-text"},{"id":1104,"name":null,"description":"<p><strong>Don&rsquo;t let the lack of an RGS certificate hold your business back in Europe </strong></p>","button":"Adapt your compliance","url":"https://www.tecalis.com/request-demo","blank":true,"image":null,"strapi_component":"blog.cta"},{"id":4552,"text":"<h2><strong>What is the RGS (R&eacute;f&eacute;rentiel G&eacute;n&eacute;ral de S&eacute;curit&eacute;)?</strong></h2>\n<p><span style=\"font-weight: 400;\">The </span><strong>RGS </strong><span style=\"font-weight: 400;\">(General Security Framework) is a </span><strong>regulatory framework and a set of technical cybersecurity standards </strong><span style=\"font-weight: 400;\">established in France, overseen and constantly updated by </span><strong>ANSSI </strong><span style=\"font-weight: 400;\">(Agence Nationale de la S&eacute;curit&eacute; des Syst&egrave;mes d'Information).&nbsp;</span></p>\n<p><span style=\"font-weight: 400;\">This legal framework was created under </span><a href=\"https://www.legifrance.gouv.fr/loda/id/LEGISCTA000029720580\" target=\"_blank\" rel=\"noopener\"><strong>Ordinance No. 2005-1516</strong></a><span style=\"font-weight: 400;\"> and the subsequent Decree 2010-112, with the fundamental objective of </span><strong>safeguarding the security of electronic exchanges between citizens, businesses, and the various entities of the French Public Administration.&nbsp;</strong></p>\n<p><span style=\"font-weight: 400;\">The RGS is not merely a recommendation for best practices; it is a binding </span><strong>legal obligation</strong><span style=\"font-weight: 400;\">. It defines in exhaustive and meticulous detail the rules, audit procedures, cryptographic specifications, and infrastructure requirements that </span><strong>Certification Authorities</strong><span style=\"font-weight: 400;\"> must meet to issue so-called </span><strong>RGS certificates</strong><span style=\"font-weight: 400;\">. These digital certificates are the only valid instruments for </span><a href=\"https://www.tecalis.com/products/authentication\" target=\"_blank\" rel=\"noopener\"><strong>authenticating identities</strong></a><span style=\"font-weight: 400;\">, signing documents electronically, and encrypting data in critical interactions with the French government.&nbsp;</span></p>\n<p><span style=\"font-weight: 400;\">From a technical perspective, </span><strong>the RGS establishes strict policies </strong><span style=\"font-weight: 400;\">regarding:</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Accepted cryptographic algorithms: </strong><span style=\"font-weight: 400;\">RSA or ECC (Elliptic Curve) key lengths, and permitted hash functions (such as the SHA-2 or SHA-3 family).</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Storage support: </strong><span style=\"font-weight: 400;\">Requirements regarding whether private keys may reside in local software, in the cloud, or whether they must be stored on a Secure Signature Creation Device (QSCD or hardware devices such as tokens and HSMs).</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong><a href=\"https://www.tecalis.com/blog/identity-verification-kyc-aml\" target=\"_blank\" rel=\"noopener\">Identity verification</a> processes: <span style=\"font-weight: 400;\">In-person or advanced remote requirements (digital onboarding) to identify the natural or legal person before issuing the certificate.</span></strong></li>\n</ul>","strapi_component":"blog.content-rich-text"},{"id":4553,"text":"<h3><strong>Who it is aimed at and why it is relevant for companies in Spain</strong></h3>\n<p><strong><span style=\"font-weight: 400;\">At first glance, it might seem that a French national regulation such as the RGS only affects French entities. However, in the context of the European Single Market, the reality is quite different. The </span>RGS <span style=\"font-weight: 400;\">is of vital importance to </span>companies in Spain due to the high level of economic interconnection and the existence of cross-border tenders<span style=\"font-weight: 400;\">.</span></strong></p>\n<h4><strong>Participation in French Public Tenders</strong></h4>\n<p><strong><span style=\"font-weight: 400;\">France is one of Spain&rsquo;s main trading partners. Any Spanish company in the </span>construction, engineering, consulting, or technology <span style=\"font-weight: 400;\">sector wishing to bid on a public contract in France through platforms such as </span><a href=\"https://www.economie.gouv.fr/dae/les-projets-achats-les-consultations/place-la-plateforme-des-achats-de-letat\" target=\"_blank\" rel=\"noopener\"><em>PLACE (Plateforme des achats de l&rsquo;&Eacute;tat)</em></a><span style=\"font-weight: 400;\"> must submit its </span>technical and financial proposal with a specific level of security<span style=\"font-weight: 400;\">. The terms of reference for these tenders routinely require the </span>use of RGS certificates <span style=\"font-weight: 400;\">(generally 2-star level) or strictly equivalent certificates recognized on the </span>European Trusted List (EUTL).</strong></p>\n<h4><strong>European Interconnection and Secure Supply Chains</strong></h4>\n<p><strong><span style=\"font-weight: 400;\">Major French corporations in the aerospace, automotive, or defense sectors require their Spanish suppliers (Tier 1, Tier 2) to </span>align with their own cybersecurity standards. <span style=\"font-weight: 400;\">On many of these supplier portals (EDI, electronic invoicing platforms), the use of an RGS certificate guarantees </span><a href=\"https://www.tecalis.com/blog/non-repudiation-what-is-signature-example-guarantees-deniability\" target=\"_blank\" rel=\"noopener\">non-repudiation</a><span style=\"font-weight: 400;\"> and the integrity of document exchange. </span></strong></p>\n<h4><strong>Regulatory Anticipation</strong></h4>\n<p><strong><span style=\"font-weight: 400;\">The </span><a href=\"https://cyber.gouv.fr/en/\" target=\"_blank\" rel=\"noopener\">ANSSI</a><span style=\"font-weight: 400;\"> RGS is considered one of the most mature and demanding security frameworks in the world. </span>Spanish companies that adopt RGS-compatible processes are, by default, implementing information security policies that exceed the market average<span style=\"font-weight: 400;\">, which protects them against </span>audits, cyberattacks<span style=\"font-weight: 400;\">,</span> and future regulations<span style=\"font-weight: 400;\">, thereby boosting their global competitiveness. </span></strong></p>","strapi_component":"blog.content-rich-text"},{"id":26,"text":"<p><span style=\"font-weight: 400;\">For Spanish companies, the RGS is a strategic barrier to entry, as France requires certificates that comply with this standard for signing invoices, contracts, and bids with its government agencies. Lacking a compatible solution not only increases cybersecurity risks but also results in immediate exclusion from public tenders in sectors such as engineering, technology, and construction. </span></p>","color":"default","strapi_component":"blog.callout"},{"id":4554,"text":"<h2><strong>The three types of RGS certificates: The star rating system</strong></h2>\n<p><strong><span style=\"font-weight: 400;\">The </span>innovation of the RGS <span style=\"font-weight: 400;\">compared to other security frameworks lies in its pragmatic approach to classifying risks using a visual and intuitive scale: the </span>star system<span style=\"font-weight: 400;\">. Depending on the criticality of the operation, the financial impact, confidentiality requirements, and the nature of the data processed, ANSSI requires one level or another. This classification of </span>RGS certificates <span style=\"font-weight: 400;\">is divided into three increasing levels of security:</span> 1 star (*<em>), 2 stars (</em>**<em>), and 3 stars (</em>***).</strong></p>\n<h3><strong>RGS 1-star (*): Basic and operational security</strong></h3>\n<p><span style=\"font-weight: 400;\">The</span><strong> 1-star RGS</strong><span style=\"font-weight: 400;\"> certificate is designed for </span><strong>low- or moderate-risk operations. </strong><span style=\"font-weight: 400;\">Its main advantage is its agility and ease of deployment in corporate environments, as it does not require dedicated hardware on the end-user side.&nbsp;</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Technical features: </strong><span style=\"font-weight: 400;\">This is a </span><strong>software-based</strong><span style=\"font-weight: 400;\"> certificate (typically delivered in a .p12 or .pfx file). The user&rsquo;s private key is stored in the web browser, in the operating system&rsquo;s certificate store (Windows/macOS), or on a centralized corporate server.&nbsp;</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Authentication and signing: </strong><span style=\"font-weight: 400;\">It enables basic strong authentication and the generation of </span><strong>simple</strong><span style=\"font-weight: 400;\"> or low-profile</span><a href=\"https://www.tecalis.com/blog/electronic-signature-simple-what-is-definition-eidas-types-characteristics-differences-regulation\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\"> </span><strong>advanced electronic signatures</strong></a><span style=\"font-weight: 400;\">. However, since it resides in software, it is more vulnerable to unauthorized extraction if the user&rsquo;s device is compromised by malware or Trojans.&nbsp;</span></li>\n</ul>\n<p><strong><span style=\"font-weight: 400;\">This level is optimal for </span>signing common electronic invoices <span style=\"font-weight: 400;\">that do not require the highest legal assurance and for </span>streamlining internal Human Resources processes<span style=\"font-weight: 400;\">, such as signing vacation requests or pay stubs. Additionally, it is very useful for </span>protecting encrypted communications and emails within the same corporate network<span style=\"font-weight: 400;\">, as well as for managing access to non-critical platforms or general information portals. </span></strong></p>","strapi_component":"blog.content-rich-text"},{"id":4555,"text":"<h3><strong>RGS 2-star (**): Medium-high security and the cross-border standard</strong></h3>\n<p><span style=\"font-weight: 400;\">The </span><strong>RGS 2-star certificate </strong><span style=\"font-weight: 400;\">is the true cornerstone of the B2B and B2G business ecosystem and the one sought by the vast majority of Spanish companies. It represents a massive qualitative leap in terms of cybersecurity and legal guarantees.&nbsp;</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Technical characteristics: </strong><span style=\"font-weight: 400;\">The key feature of this level is that </span><strong>it mandates cryptographic hardware support</strong><span style=\"font-weight: 400;\">. The certificate cannot be exported or copied. It is delivered and stored on a physical device, typically a </span><strong>cryptographic USB token </strong><span style=\"font-weight: 400;\">or a smart card that complies with </span><strong>international security standards </strong><span style=\"font-weight: 400;\">(such as </span><em><span style=\"font-weight: 400;\">Common Criteria EAL4+ </span></em><span style=\"font-weight: 400;\">or FIPS 140-2 Level 3).&nbsp;</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Legal equivalence: </strong><span style=\"font-weight: 400;\">Depending on how identity verification was performed (which usually requires physical presence or a highly qualified video identification </span><a href=\"https://www.tecalis.com/use-cases/digital-onboarding-registration-activation\" target=\"_blank\" rel=\"noopener\"><strong>onboarding</strong></a><span style=\"font-weight: 400;\"> process), an RGS** is the direct equivalent of a reinforced advanced electronic signature or, in many cases, a </span><a href=\"https://www.tecalis.com/blog/qualified-electronic-signature-qes-recognised-certified-certificate-advanced-devices-centralized-eidas-companies\" target=\"_blank\" rel=\"noopener\"><strong>qualified electronic signature</strong></a><span style=\"font-weight: 400;\">.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Usage process: </strong><span style=\"font-weight: 400;\">To sign a document, the user must connect the physical token to their computer and enter a personal PIN. This ensures </span><a href=\"https://www.tecalis.com/blog/two-step-authentication-2FA-verification-which-is-account-activate-factors-security-systems-configure-business-second-factor\" target=\"_blank\" rel=\"noopener\"><strong>authenticity through two factors</strong></a><span style=\"font-weight: 400;\"> (something you possess: the token; and something you know: the PIN), guaranteeing absolute non-repudiation.&nbsp;</span></li>\n</ul>\n<p><strong><span style=\"font-weight: 400;\">This level is mandatory in </span>public tenders for submitting bids to the French Public Administration. <span style=\"font-weight: 400;\">It is also ideal for signing high-value commercial contracts and </span><a href=\"https://www.tecalis.com/blog/nda-what-is-a-confidentiality-agreement-how-to-sign\" target=\"_blank\" rel=\"noopener\">non-disclosure agreements (NDAs)</a><span style=\"font-weight: 400;\">, as well as for </span>signing annual accounts, financial statements, and corporate documentation <span style=\"font-weight: 400;\">with full legal effect, and is indispensable for conducting highly sensitive procedures with tax agencies and commercial registries. </span></strong></p>","strapi_component":"blog.content-rich-text"},{"id":981,"title":null,"alt":"A woman verifying digital documents using RGS standards.","figcaption":null,"link":null,"blank":null,"image":{"id":5171,"name":"RGS-interior-1.png","hash":"e_CMR_interior_1_7_79b0353a00","sha256":null,"ext":".png","mime":"image/png","size":743.25,"url":"/uploads/e_CMR_interior_1_7_79b0353a00.png","provider":"local","provider_metadata":null,"created_at":"2026-05-08T11:35:36.000Z","updated_at":"2026-05-08T11:35:52.000Z","alternativeText":"","caption":"","width":954,"height":525,"formats":{"thumbnail":{"name":"thumbnail_eCMR_interior_1 (7).png","hash":"thumbnail_e_CMR_interior_1_7_79b0353a00","ext":".png","mime":"image/png","width":245,"height":135,"size":91.91,"path":null,"url":"/uploads/thumbnail_e_CMR_interior_1_7_79b0353a00.png"},"medium":{"name":"medium_eCMR_interior_1 (7).png","hash":"medium_e_CMR_interior_1_7_79b0353a00","ext":".png","mime":"image/png","width":750,"height":413,"size":773.31,"path":null,"url":"/uploads/medium_e_CMR_interior_1_7_79b0353a00.png"},"small":{"name":"small_eCMR_interior_1 (7).png","hash":"small_e_CMR_interior_1_7_79b0353a00","ext":".png","mime":"image/png","width":500,"height":275,"size":353.82,"path":null,"url":"/uploads/small_e_CMR_interior_1_7_79b0353a00.png"}},"previewUrl":null,"localFile___NODE":"2be5466d-24ab-58d4-8aab-d37ed78ec48c"},"strapi_component":"blog.image"},{"id":4556,"text":"<h3><strong>RGS 3-star (***): Maximum government and defense security</strong></h3>\n<p><span style=\"font-weight: 400;\">The </span><strong>RGS 3-star level </strong><span style=\"font-weight: 400;\">represents the pinnacle of civil and government cryptographic security. Obtaining, maintaining, and using it involves extremely rigorous, slow, and costly processes.&nbsp;</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Technical characteristics: </strong><span style=\"font-weight: 400;\">It uses state-of-the-art cryptographic algorithms recommended for the protection of state secrets. The requirements for the Certification Authority issuing them are draconian, including </span><strong>constant audits, bunkered physical facilities, and redundant infrastructure resistant to nation-state attacks</strong><span style=\"font-weight: 400;\">. Hardware support is even more restrictive than at Level 2.&nbsp;</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Identity verification: </strong><span style=\"font-weight: 400;\">Scrutiny of the applicant&rsquo;s identity and background is absolute, requiring </span><strong>exhaustive in-person validations </strong><span style=\"font-weight: 400;\">by personnel specifically authorized by the State.&nbsp;</span></li>\n</ul>\n<p><strong><span style=\"font-weight: 400;\">This level </span>is not intended for general business use<span style=\"font-weight: 400;\">, as its application is restricted to </span>Operators of Vital Importance <span style=\"font-weight: 400;\">(OVI) as defined by the French government. It is specifically applied to </span>military communications, defense systems, intelligence networks, and the management of critical infrastructure <span style=\"font-weight: 400;\">(nuclear energy, air traffic control, strategic telecommunications), as well as to the protection of documents classified as \"Restricted\" or higher.</span></strong></p>","strapi_component":"blog.content-rich-text"},{"id":7,"table":"<table style=\"border-collapse: collapse; width: 100%; height: 132px;\" border=\"1\">\n<tbody>\n<tr style=\"height: 22px;\">\n<th style=\"width: 23.7104%; height: 22px;\"><strong>Feature </strong></th>\n<th style=\"width: 23.7104%; height: 22px;\"><strong>RGS 1 Star (*) </strong></th>\n<th style=\"width: 23.7104%; height: 22px;\"><strong>RGS 2 Stars (**) </strong></th>\n<th style=\"width: 23.7104%; height: 22px;\"><strong>RGS 3 Stars (***) </strong></th>\n</tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 23.7104%; height: 22px;\">Risk Level</td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Low / Moderate </span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">High / Critical</span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Maximum / National Security </span></td>\n</tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 23.7104%; height: 22px;\">Storage Media</td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Software (Browser, .p12, Server) </span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Hardware (Cryptographic USB Token, Card) </span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">High-Security Cryptographic Hardware </span></td>\n</tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 23.7104%; height: 22px;\">Key Extraction</td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Possible (if configured)</span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Impossible (hardware protection) </span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Not possible </span></td>\n</tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 23.7104%; height: 22px;\">Use in Bidding</td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Not valid or very limited </span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">The default required standard </span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Required only for Defense/OIV </span></td>\n</tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 23.7104%; height: 22px;\">Cost and Complexity</td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Low </span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Medium-High </span></td>\n<td style=\"width: 23.7104%; height: 22px;\"><span style=\"font-weight: 400;\">Very High </span></td>\n</tr>\n</tbody>\n</table>","strapi_component":"blog.table"},{"id":1105,"name":null,"description":"<p><strong>Integrate RGS**-equivalent certificates into your ERP with centralized signatures</strong></p>\n<p>&nbsp;</p>","button":"Discover Tecalis Sign","url":"https://www.tecalis.com/products/electronic-signature","blank":true,"image":null,"strapi_component":"blog.cta"},{"id":4557,"text":"<h2><strong>RGS and the European eIDAS Regulation</strong></h2>\n<p><strong><span style=\"font-weight: 400;\">It is impossible to discuss </span>RGS certificates <span style=\"font-weight: 400;\">today without placing them within the </span>context<span style=\"font-weight: 400;\"> of </span><a href=\"https://www.tecalis.com/blog/eidas-electronic-identification-trust-services\" target=\"_blank\" rel=\"noopener\">the eIDAS Regulation</a><span style=\"font-weight: 400;\"> (EU Regulation 910/2014, and its upcoming iteration, eIDAS 2.0). While RGS is an older French national framework, the European regulation is the Union&rsquo;s supreme legislation aimed at creating an interoperable Digital Single Market. This legal text classifies electronic signatures into three levels: </span>Simple, Advanced, and Qualified<span style=\"font-weight: 400;\">. The question that inevitably arises for legal experts and CTOs is: </span><em><span style=\"font-weight: 400;\">How do RGS stars map to the EU categories? </span></em><span style=\"font-weight: 400;\">The answer lies in </span>interoperability and mutual recognition<span style=\"font-weight: 400;\">, as ANSSI has worked intensively to align its RGS repository with eIDAS requirements. In general terms, the functional and legal equivalence is as follows:</span></strong></p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>RGS Convergence</strong><span style=\"font-weight: 400;\">:** A 2-star RGS certificate, issued by a </span><a href=\"https://www.tecalis.com/blog/qualified-trust-services-providers-qtsp-electronic-list-digital-identity-transactions-eidas\" target=\"_blank\" rel=\"noopener\"><strong>Qualified Trust Service Provider (QTSP)</strong></a><span style=\"font-weight: 400;\"> that meets RGS requirements and uses a </span><strong>Qualified Signature Creation Device </strong><span style=\"font-weight: 400;\">(QSCD), is equivalent in practice to a </span><strong>Qualified Electronic Signature </strong><span style=\"font-weight: 400;\">under eIDAS.&nbsp;</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>European Trust List (EUTL): </strong><span style=\"font-weight: 400;\">Thanks to European standardization, a Spanish company is not strictly required to purchase a certificate from a French CA to bid on contracts in France. It may use a </span><strong>certificate issued by a Spanish CA </strong><span style=\"font-weight: 400;\">(such as FNMT, Camerfirma, or qualified private providers), provided that this certificate meets the \"Qualified\" (QES) level and complies with </span><strong>technical specifications comparable to the requirements of an RGS**. </strong><span style=\"font-weight: 400;\">The French procurement platform will verify that the certificate is listed in the European EUTL.&nbsp;</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The Future with </span><a href=\"https://www.tecalis.com/blog/eidas2-eidas-2-regulation-eudi-20-europe-eu-wallet\" target=\"_blank\" rel=\"noopener\"><strong>eIDAS 2.0</strong></a><span style=\"font-weight: 400;\"> and the EUDI Wallet: The evolution toward the </span><a href=\"https://www.tecalis.com/blog/eudi-digital-identity-eu-wallet-eidas2-eidas-2-application\" target=\"_blank\" rel=\"noopener\"><strong>European Digital Identity Wallet (EUDI Wallet)</strong></a><span style=\"font-weight: 400;\"> will require local frameworks such as the RGS to continue adapting. However, the security principles upon which RGS certificates are based (such as robust encryption and unambiguous binding to the signatory) will remain at the core of any trust architecture. </span><strong>The French \"star-based\" approach will continue to serve as a benchmark for conducting risk assessments within the EU.&nbsp;</strong></li>\n</ol>\n<p><strong><span style=\"font-weight: 400;\">Understanding this eIDAS/RGS duality is key for Spanish companies to avoid duplicating operational costs by acquiring multiple certificates for different countries, and instead opt for <strong><a href=\"https://www.tecalis.com/products/electronic-signature\" target=\"_blank\" rel=\"noopener\">electronic signature solutions</a> </strong>that ensure simultaneous pan-European compliance. </span></strong></p>","strapi_component":"blog.content-rich-text"},{"id":4558,"text":"<h2><strong>How to Choose the Right RGS Level for Your Business</strong></h2>\n<p><span style=\"font-weight: 400;\">Selecting the wrong RGS certification level for your company&rsquo;s operations can lead to </span><strong>two serious strategic problems </strong><span style=\"font-weight: 400;\">that will directly impact the bottom line. On the one hand, you could face </span><strong>severe operational and legal roadblocks by using a signature level lower than that required by official specifications</strong><span style=\"font-weight: 400;\">, invalidating your documents in public tenders or critical contracts. On the other hand, </span><strong>overdoing it and implementing a maximum-security cryptographic infrastructure </strong><span style=\"font-weight: 400;\">for mundane corporate procedures will generate immediate financial overcosts and unnecessary technological friction in your employees&rsquo; day-to-day work.</span></p>\n<p><strong><span style=\"font-weight: 400;\">To avoid both scenarios and make the correct technological and legal decision, IT directors (CIOs), security officers (CISOs), and legal directors (CLOs) </span>must jointly implement a strictly risk-based approach. <span style=\"font-weight: 400;\">This preliminary corporate analysis requires a detailed mapping of the company&rsquo;s document flows, an assessment of the legal impact of each cross-border process, and a balancing of the sensitivity of the information handled against the system&rsquo;s usability. By rigorously auditing these factors, senior management can ensure </span>compliance with ANSSI regulations without compromising the business&rsquo;s operational agility or overburdening their departments&rsquo; budgets. </strong></p>","strapi_component":"blog.content-rich-text"},{"id":982,"title":null,"alt":"A businessman handling paperwork using an RGS electronic signature.","figcaption":null,"link":null,"blank":null,"image":{"id":5172,"name":"RGS-interior-2.png","hash":"e_CMR_interior_2_6_89b4b38adf","sha256":null,"ext":".png","mime":"image/png","size":828.85,"url":"/uploads/e_CMR_interior_2_6_89b4b38adf.png","provider":"local","provider_metadata":null,"created_at":"2026-05-08T11:36:20.000Z","updated_at":"2026-05-08T11:36:32.000Z","alternativeText":"","caption":"","width":1272,"height":700,"formats":{"thumbnail":{"name":"thumbnail_eCMR_interior_2 (6).png","hash":"thumbnail_e_CMR_interior_2_6_89b4b38adf","ext":".png","mime":"image/png","width":245,"height":135,"size":80.1,"path":null,"url":"/uploads/thumbnail_e_CMR_interior_2_6_89b4b38adf.png"},"large":{"name":"large_eCMR_interior_2 (6).png","hash":"large_e_CMR_interior_2_6_89b4b38adf","ext":".png","mime":"image/png","width":1000,"height":550,"size":1086.57,"path":null,"url":"/uploads/large_e_CMR_interior_2_6_89b4b38adf.png"},"medium":{"name":"medium_eCMR_interior_2 (6).png","hash":"medium_e_CMR_interior_2_6_89b4b38adf","ext":".png","mime":"image/png","width":750,"height":413,"size":645.52,"path":null,"url":"/uploads/medium_e_CMR_interior_2_6_89b4b38adf.png"},"small":{"name":"small_eCMR_interior_2 (6).png","hash":"small_e_CMR_interior_2_6_89b4b38adf","ext":".png","mime":"image/png","width":500,"height":275,"size":303.18,"path":null,"url":"/uploads/small_e_CMR_interior_2_6_89b4b38adf.png"}},"previewUrl":null,"localFile___NODE":"8597bfeb-523e-5c05-bcbd-fb7fc4e6aa2a"},"strapi_component":"blog.image"},{"id":4559,"text":"<h3><strong>Risk Analysis by Process: Public Bidding vs. Internal Billing</strong></h3>\n<p><strong><span style=\"font-weight: 400;\">The first step before acquiring any type of </span><a href=\"https://www.tecalis.com/blog/digital-identification-digital-verification-online-identity-online-customers-businesses\" target=\"_blank\" rel=\"noopener\">digital identity</a><span style=\"font-weight: 400;\"> is to conduct a </span>comprehensive and strategic mapping of all the <span style=\"font-weight: 400;\">company&rsquo;s </span>document <span style=\"font-weight: 400;\">and transaction </span>processes<span style=\"font-weight: 400;\">. Organizations must classify each process based on its legal criticality, the volume of signatures required daily, and the type of counterpart involved (public entities versus private partners).&nbsp; This internal risk audit will allow for a precise distinction between which workflows require absolute legal protection against third parties and which demand, above all, technological speed and automation to avoid stifling daily corporate productivity. </span>To achieve this balance, the analysis must focus on the following key scenarios:</strong></p>\n<h4><strong>1. Impact Assessment (Tenders and External Contracts):</strong><span style=\"font-weight: 400;\">&nbsp;</span></h4>\n<p><span style=\"font-weight: 400;\">If the company&rsquo;s primary objective is to expand its market share in France by participating in the public sector ecosystem, the decision is automatic. French public procurement regulations leave no room for maneuver. </span><strong>You must, without exception, have processes compatible with RGS 2-star </strong><span style=\"font-weight: 400;\">(or equivalent Qualified eIDAS with a qualified token/cloud).&nbsp;</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Associated risk: </strong><span style=\"font-weight: 400;\">Rejection of the bid for procedural irregularities, loss of millions of euros in contracts, legal nullity of the agreement.&nbsp;</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Action: </strong><span style=\"font-weight: 400;\">Acquisition of hardware certificates or eIDAS/RGS**-qualified centralized signatures.&nbsp;</span></li>\n</ul>\n<h4><strong>2. Assessment of volume and agility (Internal operations and invoicing):&nbsp;</strong></h4>\n<p><span style=\"font-weight: 400;\">If the company operates in France but its activity is limited to issuing electronic invoices to private customers via EDI (Electronic Data Interchange) platforms, or cross-border HR processes (expatriate employment contracts), </span><strong>an RGS** level may create too much friction.</strong><span style=\"font-weight: 400;\"> Requiring every billing employee to insert a USB drive and enter a PIN 200 times a day is unfeasible.&nbsp;</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Associated risk</strong><span style=\"font-weight: 400;\">: Operational friction, slow processes, loss of productivity, even if the legal risk of dispute is low. </span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Action: <span style=\"font-weight: 400;\">Implementation of</span> 1-star RGS certificates <span style=\"font-weight: 400;\">in software, integrated into the corporate ERP (SAP, Navision) for the automated signing of invoices or bulk documents.</span></strong></li>\n</ul>","strapi_component":"blog.content-rich-text"},{"id":4560,"text":"<h2><strong>Signature and onboarding solutions that integrate RGS and eIDAS standards</strong></h2>\n<p><span style=\"font-weight: 400;\">The major challenge facing organizations is how to implement high-level cryptographic requirements without compromising the </span><a href=\"https://www.tecalis.com/blog/user-experience\" target=\"_blank\" rel=\"noopener\"><strong>user experience</strong></a><span style=\"font-weight: 400;\">. Historically, using physical RGS**-type certificates was synonymous with complex driver installations, browser incompatibilities, and frustration for the end user.</span></p>\n<p><strong><span style=\"font-weight: 400;\">Today, </span>leading RegTech and LegalTech platforms resolve this dichotomy. <span style=\"font-weight: 400;\">It is essential to rely on cutting-edge solutions that hide technical complexity (the underlying cryptography, CRL or OCSP checks) and offer an intuitive interface.</span></strong></p>\n<h3><strong>Tools like Tecalis Sign and Tecalis Identity facilitate compliance</strong></h3>\n<p><span style=\"font-weight: 400;\">Comprehensive digital identity platforms like Tecalis have been specifically designed to navigate these </span><strong>complex regulatory frameworks transparently</strong><span style=\"font-weight: 400;\">, enabling corporate clients to comply with regulations without sacrificing operational efficiency. To achieve this simplification of regulatory compliance, Tecalis&rsquo; technology is built on the </span><strong>following key pillars:&nbsp;</strong></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Digital onboarding and identity verification: </strong><span style=\"font-weight: 400;\">Before issuing or using a high-assurance certificate, identity must be rigorously validated. Solutions like </span><a href=\"https://www.tecalis.com/products/identity-verification\" target=\"_blank\" rel=\"noopener\"><strong>Tecalis Identity</strong></a><span style=\"font-weight: 400;\"> use </span><strong>artificial intelligence, facial biometrics, and advanced </strong><span style=\"font-weight: 400;\">document</span><strong> scanning </strong><span style=\"font-weight: 400;\">via NFC or OCR. These tools enable compliance with the prior identification requirements mandated by eIDAS and the CAs that issue RGS. Thanks to this system, physical visits are eliminated, and weeks of bureaucracy are reduced to just a few minutes.&nbsp;</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Multi-channel and multi-standard electronic signature: </strong><span style=\"font-weight: 400;\">Using </span><a href=\"https://www.tecalis.com/es/productos/firma-electronica\" target=\"_blank\" rel=\"noopener\"><strong>Tecalis Sign</strong></a><span style=\"font-weight: 400;\">, companies configure signature workflows based on the document&rsquo;s risk level. The system allows for requesting a simple </span><a href=\"https://www.tecalis.com/blog/biometric-signature-what-is-advanced-electronic-digital-uses\" target=\"_blank\" rel=\"noopener\"><strong>biometric signature</strong></a><span style=\"font-weight: 400;\"> for delivery notes or requiring qualified certificates for high-value contracts. This flexibility ensures compliance with the rigor demanded by the RGS** standard in critical operations.</span></li>\n</ul>\n<ul>\n<li aria-level=\"1\"><strong>API integration and user experience: </strong><span style=\"font-weight: 400;\">The key to success is seamless technical integration. Using RESTful APIs, Spanish companies </span><strong>embed RGS- and eIDAS-compliant signatures into their own CRMs or portals</strong><span style=\"font-weight: 400;\">. Users can sign with full legal validity from any device without needing to be experts in ANSSI regulations.&nbsp;</span></li>\n</ul>\n<p><strong><span style=\"font-weight: 400;\">In short, understanding what RGS is, mastering its star rating system, and relying on reputable technology providers that align these French requirements with the robustness of the eIDAS regulation is the </span>definitive strategic move for any Spanish company that wants to succeed and operate with complete security in the European and international markets.</strong></p>","strapi_component":"blog.content-rich-text"},{"id":1106,"name":null,"description":"<p><strong>Automate your B2B processes with onboarding and European e-signatures</strong></p>","button":"Request a demo from our experts","url":"https://www.tecalis.com/request-demo","blank":true,"image":null,"strapi_component":"blog.cta"}],"blog_categories":[{"id":13,"name":"Electronic Signature","url":"electronic-signature"},{"id":14,"name":"Risk Management","url":"risk-management"},{"id":24,"name":"Identity Verification","url":"identity-verification"}],"reading_time":"Reading time: 5 minutes."},"site":{"siteMetadata":{"title":"Tecalis","twitterHandle":"Tecalis"}}},"pageContext":{"id":"Blog-posts_425","title":"RGS: What It Is, Levels, Stars, and Its Impact on Electronic Signatures","langKey":"en","location":"https://tecalis.com/blog/rgs-guide-levels-stars-electronic-signature-eidas","dateFormat":"MMMM D, YYYY","translates":{"en":"/blog/rgs-guide-levels-stars-electronic-signature-eidas","es":"/es/blog/guia-rgs-niveles-estrellas-firma-electronica-eidas"},"images":{"2be5466d-24ab-58d4-8aab-d37ed78ec48c":{"data":{"image":{"childImageSharp":{"gatsbyImageData":{"layout":"constrained","placeholder":{"fallback":"data:image/png;base64,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"},"images":{"fallback":{"src":"/static/9b75b0673d4f39373d28b7f3aaa0f2c8/59ffd/e_CMR_interior_1_7_79b0353a00.webp","srcSet":"/static/9b75b0673d4f39373d28b7f3aaa0f2c8/7b6bd/e_CMR_interior_1_7_79b0353a00.webp 350w,\n/static/9b75b0673d4f39373d28b7f3aaa0f2c8/aa5f2/e_CMR_interior_1_7_79b0353a00.webp 512w,\n/static/9b75b0673d4f39373d28b7f3aaa0f2c8/806ca/e_CMR_interior_1_7_79b0353a00.webp 520w,\n/static/9b75b0673d4f39373d28b7f3aaa0f2c8/59ffd/e_CMR_interior_1_7_79b0353a00.webp 572w","sizes":"(min-width: 572px) 572px, 100vw"},"sources":[]},"width":572,"height":315}}}}},"8597bfeb-523e-5c05-bcbd-fb7fc4e6aa2a":{"data":{"image":{"childImageSharp":{"gatsbyImageData":{"layout":"constrained","placeholder":{"fallback":"data:image/png;base64,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"},"images":{"fallback":{"src":"/static/b871a7aec5b399ad7db33829ca23e51b/59ffd/e_CMR_interior_2_6_89b4b38adf.webp","srcSet":"/static/b871a7aec5b399ad7db33829ca23e51b/7b6bd/e_CMR_interior_2_6_89b4b38adf.webp 350w,\n/static/b871a7aec5b399ad7db33829ca23e51b/aa5f2/e_CMR_interior_2_6_89b4b38adf.webp 512w,\n/static/b871a7aec5b399ad7db33829ca23e51b/806ca/e_CMR_interior_2_6_89b4b38adf.webp 520w,\n/static/b871a7aec5b399ad7db33829ca23e51b/59ffd/e_CMR_interior_2_6_89b4b38adf.webp 572w","sizes":"(min-width: 572px) 572px, 100vw"},"sources":[]},"width":572,"height":315}}}}}},"advertisements":{},"advertisementsForms":{},"ctas":{},"videos":{},"cookies":true}},
    "staticQueryHashes": ["1208480927","235538228","2927780632","3803179178","536423426","63159454"]}