Published on 1 April 2026
Questions & answers
1 Utilisation of AGOV
You can use the AGOV login in your electronic dealings with all Swiss authorities participating in AGOV, including cantons, their municipalities, the Federal Administration, and EMBAG-compatible third parties (EMBAG: Federal Law on the Use of Electronic Means to Carry Out Official Tasks).
You can manage your AGOV login at www.agov.ch/me.
Passwordless means that AGOV does not support the outdated and insecure login method “username + password + optionally a second factor”, and instead uses secure authentication factors.
This architectural principle stipulates that only login factors meeting the ‘high’ security level in accordance with ICT policy Si001 of the Federal Office for Cybersecurity (NCSC) are permitted in AGOV. This provides end users with the advantage that no step-up authentication is required (step-up of login factors).
In summary: all login factors accepted by AGOV meet the “high” level according to Si001, as well as Level of Assurance 3 according to the ICT directive I050 and the standard eCH-0170 V2.
The login factors currently accepted by AGOV are the Swiss e-ID (once available), the AGOV access app, and the FIDO security keys.
The “high” level of ICT policy Si001 is only met if the login factors used are cryptographically protected, non-extractable, and stored in a hardware-bound manner. Therefore, extractable or synchronizable passkeys as well as software-based FIDO solutions are not permitted.
AGOV is operated from the Confederation's own data centres located in Switzerland. Your data is also stored there.
Exceptions:
Your access keys (cryptographic artifacts) are stored in the security chip of your smartphone or in the security chip of your security key (FIDO2). If you access your smartphone or security key via biometrics, your biometric data remains exclusively stored on the device or the security key and is not transmitted to AGOV.The AGOV access app offers much better security than Google Authenticator, for example, because its access keys (cryptographic artefacts) are stored on your smartphone's security chip. This technology guarantees a particularly high level of security and makes the AGOV access app very resistant to hacking. Banks also use this secure form of authentication and offer their own access apps.
The process with access apps requires each institution to provide its own app, as they cannot and must not be used jointly for more than one target system. The AGOV access app was specially developed for the secure electronic use of public services. The AGOV access app is free to download from the Apple App Store and Google Play Store. The storage space requirements on your smartphone are very low, at less than 100MB.Passkeys are a modern and secure method for passwordless authentication, where a cryptographic key is stored on the user’s device.
However, for security and regulatory reasons, AGOV only allows cryptographic keys that are stored locally on a security chip* -for example, on a FIDO2 security key or directly on the device itself.
Passkeys that are synchronized across multiple devices via cloud services such as iCloud or Google are considered less trustworthy, as they can potentially be exported. To ensure the origin and integrity of the keys at all times, AGOV only accepts hardware-bound keys that cannot be transferred, exported, or synchronized. The AGOV access app and the swiyu app for the Swiss e-ID already fully meet these requirements.* By “security chip” we refer to dedicated, non-exportable storage units for keys, such as Trusted Platform Modules (TPM), Apple’s Secure Enclave, Google’s Titan M, or the security modules used in FIDO2 security keys.
Here you can find the operating systems on which the AGOV access app works: Operating system
Here you will find a list of suitable security keys.
In principle, AGOV can be used worldwide by anyone, regardless of age, legal capacity, origin, location or other personal characteristics. An AGOV account always represents a natural person acting either for themselves or on behalf of someone else (see also the question on legal entities below).
From a technical and legal perspective, the following applies:
- If Internet restrictions apply to AGOV addressing elements and/or target applications, e.g. government blocks, AGOV and its target applications cannot be used directly via the affected connections.
- If the AGOV access app cannot be downloaded (e.g. due to device or country restrictions), FIDO2 security keys must be used instead.
Responsibility for checking whether a specific person is allowed to perform a certain action (e.g. checks on minimum age, legal capacity or membership of an organisation) lies solely with the target applications, not with AGOV. Likewise, the relevant target application decides whether an identity check with an official ID must be performed via AGOV.
These identity checks are internationally available (a list of accepted ID documents can be found here: Country list). If a target application requires the AHV number to be input via AGOV, the possible user group is restricted to people with a Swiss social security number (AHVN13).
Individuals act on behalf of legal entities, and these individuals can use AGOV logins. Individuals are not mapped to legal entities in AGOV. That is a matter for the target systems.
You are free to manage multiple AGOV accounts and decide for yourself which email addresses to use. While the email address stored in AGOV is not intended as a correspondence address in the sense of a business partner management of the target systems, many target systems still rely on it.
Therefore, it is common practice - and even explicitly preferred by certain target systems - to set up an additional AGOV account with your business email address. There is no legal basis preventing target systems from requiring this solution from end users.
As part of the migration from CH-LOGIN to AGOV, it is recommended to use an AGOV account with the same email address to avoid potential issues - especially with target systems that use the email address as the primary identifier.
Please note: The email address linked to an AGOV account can be changed at any time at agov.ch/me. If you manage multiple AGOV accounts in your AGOV access app, it is important to label them clearly so that you always use the correct account.
No. Access rights, affiliations, delegations, trustee relationships, etc. are not shown in AGOV, but should instead be managed and controlled by the target systems. Thus, AGOV does not determine whether you are acting as a private individual, on behalf of an organisation or in another role. The interpretation and verification of your specific role are carried out exclusively by the target system.
Conversely, one natural person can have more than one AGOV account (one for each email address) and can decide for themselves which account they want to use in which context.
As AGOV does not manage affiliations (see FAQ 1.20), their validity period is administered in the respective target systems.
AGOV can be used in all contexts (X2G*), with particular attention to FAQ items 1.10 to 1.12.
*- G2C – Government to Citizen: e.g. online tax declaration, identity documents, e-government portals
- C2G – Citizen to Government: e.g. submitting applications, providing feedback, making reports or notifications
- G2B – Government to Business: e.g. commercial register, subsidies, regulations
- B2G – Business to Government: e.g. supplying public authorities, tenders, service delivery
- G2E – Government to Employee: e.g. internal HR services, training, internal communication
- E2G – Employee to Government: e.g. internal feedback, HR notifications, compliance forms
- G2G – Government to Government: cooperation between administrations, data exchange
AGOV login accounts are personal and always represent exactly one natural person, regardless of whether they are acting for themselves via AGOV login or on behalf of an entity, for example. The responsibility for the proper use of AGOV logins, the associated applications and the transactions carried out using them lies with this natural person. This means that the person is also responsible for the secure storage and appropriate use of the associated login factors (AGOV access app and/or security key). If this person passes on an AGOV login for use to one or more other persons, a disclosure or handover of the login factors is made by the first person named (by physically passing on or registering security keys or AGOV access apps that are not exclusively under the control of the AGOV login account holder). There is no legal basis that prohibits this process for AGOV. However, provisions relating to the associated target applications and transactions carried out remain reserved.
In summary, the principle set out in the «7 important tips» video applies. Your AGOV login is personal. Do not pass it on and do not register mobile phones or security keys as AGOV login factors if you do not have sole control over them.The obligation to ensure accessibility in accordance with the principles set out below* also applies to AGOV. The AGOV developers achieve accessibility by implementing the recommendations of the Web Content Accessibility Guidelines (WCAG) and conducting usability tests with people who use certain accessibility features. AGOV users can report defective or suboptimal implementation of accessibility in AGOV to the Federal Administration → Comment (messages relating to support must be sent to agov.ch/help). The AGOV access app (iOS or Android) is most commonly used for accessing AGOV. This access app is also accessible and interacts closely with the accessibility mechanisms of the respective mobile phone operating system. Scanning the AGOV QR code can be an issue for visually impaired AGOV users, as visually impaired internet users often work with their screen switched off. Security keys are an alternative to the AGOV access app, as the application flow is reproduced in full by screen readers and on braille displays.
*- Article 8 paragraph 2 of the Federal Constitution states that no person may be discriminated against because of a physical, mental or psychological disability.
- The Disability Discrimination Act (DDA) requires measures to be taken to prevent, reduce or eliminate discrimination.
- The Ordinance on the Elimination of Discrimination against People with Disabilities (EPDO) contains provisions on the requirements to accommodate people with disabilities when designing federal services.
- Article 9 of the UN Convention on the Rights of Persons with Disabilities (UN CRPD) explains the guarantee of equal access to information and services for the public.
- Furthermore, the European Accessibility Act (EAA) has been in force since 28 June 2025. Its provisions are also relevant for Swiss companies that offer products or services in the EU.
Various test pages are available at www.agov.ch/test.
An AGOV account is always linked to exactly one natural person. Your personal data form the basis for this link and therefore for handling your official transactions. The authorities define for which cases you must additionally have an official ID (photo ID or Swiss e-ID) and, if applicable, your AHV number stored in AGOV. In general, the purposes and legal bases for data processing by AGOV are outlined in the privacy statement. The processing of your personal data within the official transactions themselves, i.e. downstream of AGOV, is based on the respective legal bases of the authorities.
AGOV offers the option of verifying and storing official photo IDs. The AGOV account is then considered to be identity-verified. Each authority defines whether or not an AGOV account has to be identity-verified for its own business activities. Where necessary, AGOV automatically forwards end users to the identity verification process. The identity verification covers the entire AGOV ecosystem and is valid for five years. AGOV offers various identity verification methods:
- By post: Swiss Post AG's BmID identity verification service, for people in Switzerland.
- Online: An online identity verification procedure in accordance with the Federal Act on Certification Services in relation to Electronic Signatures and other Uses of Digital Certificates (ESigA), for people in Switzerland and abroad.
- Counter service: Identification at a counter, for people in cantons with a cantonal AGOV counter.
- e-ID: People who own a Swiss e-ID can submit this directly in AGOV. The AGOV account is then automatically identity-verified.
Not all identity verification methods are available in all contexts; this is defined by the relevant authority.
Method II (online) can only be applied by service providers who are certified to do so in accordance with the ESigA. The Federal Administration appoints one or more such service providers for specific periods, in accordance with the Public Procurement Act (PPA). At the time of issue of this FAQ (2025) this provider is Intrum AG.
When creating an electronic identity with a high level of assurance (so-called Level of Assurance 3, abbreviated LoA 3), AGOV is required to carefully verify a person’s identity and to be able to subsequently demonstrate this verification in a traceable manner. Electronic identities at this level of assurance are used for legally relevant procedures. It must therefore be possible, where necessary, to unambiguously determine who actually created such an identity – for example in cases of misuse, disputes, or legal clarification. For this purpose, a copy of an official identity document is created and stored as part of the registration process.
From a data protection law perspective, a copy of an identity document constitutes personal data within the meaning of Art. 5 lit. a of the Data Protection Act (FADP). As long as no additional processing is carried out, such as biometric facial recognition, copies of identity documents do not qualify as particularly sensitive personal data within the meaning of Art. 5 lit. c FADP.
The processing of these personal data is permissible under Art. 6 para. 1 FADP, provided that it is carried out lawfully. The required legal basis in the present context arises in particular from Art. 6 para. 2 FADP. Electronic identities with a high level of assurance (LoA 3), as described in various standards (e.g. eCH-0170), serve the fulfilment of statutory tasks and legally binding electronic procedures. In this context, there is an overriding public interest in a reliable, traceable and auditable identity verification that enables an unambiguous attribution to a real, existing person.
The storage of the copy of the identity document serves exclusively to prove that the identity verification was correctly carried out at the time of registration and that a valid official identity document was presented. It is not required for the ongoing use of the AGOV login account, but fulfils an evidentiary, audit and safeguarding function. Government action must be reviewable and demonstrable in the event of a dispute. Without a documented identity verification, compliance with the requirements for LoA 3 could not be demonstrated in a comprehensible manner to supervisory authorities, audit bodies or judicial instances.
Decisive in this respect is the principle of proportionality pursuant to Art. 6 para. 3 FADP. For identities at LoA 3, the storage of a copy of an identity document is considered appropriate and necessary, as less intrusive measures – such as a visual inspection without documented evidence – would not achieve the required level of proof.
The principle of purpose limitation pursuant to Art. 6 para. 4 FADP is strictly observed. The copy of the identity document may be used exclusively for identity verification, for any investigations in cases of misuse, as well as for audit and evidentiary purposes. Any use for other purposes is excluded.
In addition, the copy of the identity document is stored in a logically separate manner from the actual usage and login data. This ensures that identity data are not used for operational purposes and are accessible only to a narrowly defined group of authorised persons.
Finally, the requirements for data security pursuant to Art. 8 FADP are complied with. These include in particular access restrictions based on the need-to-know principle, secure storage, logging of access, and clearly defined retention periods. The copy of the identity document is retained only for as long as necessary for the stated purpose and is subsequently deleted or irreversibly anonymised.
In summary, the storage of a copy of an identity document when creating an electronic identity at LoA 3 is permissible and objectively justified under Swiss data protection law, provided that it is purpose-bound, proportionate, transparently justified, logically separated, and protected by appropriate technical and organisational security measures.
If you have linked your Swiss e-ID to your AGOV account, the e-ID itself does have an expiry date, but your AGOV account does not. You can simply renew (reissue) your e-ID and continue using your AGOV account as usual with the new e-ID.
If you have stored an official photo ID in your AGOV account (an AGOV identity verification without a Swiss e-ID), this identity verification is valid for five years. After that period, the verification must be repeated. Your AGOV account remains active; you will simply be invited to renew your identity verification.
Even if you change your device — for example, your smartphone or FIDO security key — or the email address or account used for AGOV login, your AGOV account does not expire. Please keep your email address up to date on agov.ch/me so that you can receive AGOV messages in case account recovery is needed.
As AGOV does not manage affiliations (see FAQ 1.12), their validity period is administered in the respective target systems.
Where technically possible and appropriate, the AGOV access app is systematically distributed via the distribution channels of the swiyu app, the Swiss Confederation's wallet for e-ID and other electronic credentials, because the swiyu app containing a Swiss e-ID can also be used directly in AGOV as a login factor.
The AGOV access app is currently available via the Apple and Google app stores, as these are the standard channels for installing and updating applications on the supported mobile operating systems (iOS/iPadOS and Android). A prerequisite for using the AGOV access app is that the respective distribution channel supports platform-integrated app attestation mechanisms for verifying the integrity and origin of the application.
The use of app stores enables in particular:
- the uniform and controlled provision of app versions
- the mandatory delivery of updates to all users
- the embedding of the app in the platform-side mechanisms for integrity and origin verification.
The security of the AGOV access app is based on its technical architecture, the cryptographic methods used, the signing of the application, and the operational security processes. The choice of distribution channel is part of the current operating model, but does not represent a statement about the fundamental technical suitability of other forms of distribution.
According to information from the supplier, the Android version of the AGOV access app is currently being reviewed with a view to implementing distribution outside the Google Play Store as part of an APK-based distribution system in the course of 2026.
This requires reliable app and device integrity verification (attestation) on privately used, non-centrally managed Android devices that meet AGOV's security requirements. Various attestation solutions that do not depend on Google Play-based services are being evaluated.
For the iOS ecosystem, there are currently no comparable options for alternative app distribution outside the established App Store model. Regulatory developments in the EU are being monitored; their transferability to Switzerland is currently unclear.
The distribution model is defined within the overall architecture of AGOV and takes into account not only security aspects but also operational, organisational and support-related requirements. AGOV can also be used without installing the app, for example by using compatible physical security keys (FIDO2).
If you open an AGOV account that is not subject to any further checks (‘step-ups’), AGOV does not impose any explicit legal or technical obligations requiring your information to be truthful and complete.
Whether and which further checks (‘step-ups’) are required is determined by the relevant authority for the application you log into via AGOV. AGOV implements these requirements as part of the respective login process (during the authentication process) and requests the necessary checks on a case-by-case basis, insofar as this is required by the connected application. Successfully completed checks can be reused in the AGOV ecosystem, depending on the design, provided they are recognised for further logins.
Regardless of this, for reasons of effectiveness and efficiency of digital administrative procedures, it is appropriate and expressly recommended to keep the information stored in the AGOV account correct, complete and up to date. Incorrect or outdated information can lead to delays, queries or the refusal of services.
In addition, you may have a legal obligation to provide truthful, complete and up-to-date information in the context of the specific digital administrative procedure. Since AGOV transmits the data you have stored to the connected government applications, there is a direct connection between the maintenance of your AGOV data and the fulfilment of your obligations to cooperate and provide truthful information in the respective administrative procedure.
In the context of further checks (‘step-ups’) within AGOV – including substantial identity checks upon presentation of official identification – you are obliged to provide correct and truthful information. The deliberate provision of a false identity or the use of a wholly or partially fictitious identity may be relevant under criminal law. Depending on the circumstances, the following may apply in particular: Art. 251 SCC (forgery of a document) and – in the case of obtaining services or advantages by deception – Art. 146 SCC (fraud); further offences remain reserved.
There is no general (abstract-general) obligation to have an AGOV account. In other words, no one is obligated to use AGOV as such.
However, there are legal obligations to interact with public authorities, such as filing a tax return. The competent authorities provide various channels for this interaction within the framework of the applicable legal system, including digital channels.
Digital public services often require authentication (login).
Public authorities design authentication procedures using technical means that fulfill their legal mandate. In doing so, they have a legally granted scope for design, which is specified by internal and higher-level guidelines. For the central federal administration, authentication for e-government interactions is carried out uniformly via AGOV. Numerous cantons and municipalities also focus on AGOV.
As a result, AGOV is now the most common login method for digital Swiss government services. Certain digital channels can only be used with AGOV. In this context, pressure to use may arise. Legally, however, this is not a specific “AGOV requirement,” but rather an authentication requirement: in many cases, anyone who wants to use a digital government service must authenticate themselves and therefore maintain a corresponding login method.
This mechanism already existed before the introduction of AGOV, but at that time it was based on different authority-specific login solutions.
Central Federal Administration:
Yes, for the Central Federal Administration, the use of AGOV as a login method in e-government is mandatory (www.eiam.admin.ch/mm).For survey activities of the Federal Statistical Office (FSO), the Swiss Federal Chancellery, as the governance authority, has authorized the use of one-time logins sent by post. This is permitted exclusively for FSO surveys and only on the condition that these logins do not create a persistent e-government data space for end users (so-called «fire-and-forget» procedure).
Other authorities (cantonal, municipal, other public bodies):
For authorities outside the Central Federal Administration, the use of AGOV is voluntary and at their own discretion.For data minimization purposes, AGOV does not record which applications you use via AGOV. The corresponding connection data is stored separately and deleted according to legal requirements. In general, it is handled in accordance with the Verordnung über die Bearbeitung von Personendaten, die bei der Nutzung der elektronischen Infrastruktur des Bundes anfallen (AS 2012 947 ; SR 172.010.442, https://www.fedlex.admin.ch/eli/oc/2012/160).
2 Problems with AGOV
AGOV is operated by a 24/7 organisation in the Federal Administration's data centres and its availability is automatically monitored. The platform and software are designed for a high level of resilience. Any disruptions are always rectified as quickly as possible.
Users can find help articles on the website www.agov.ch/help, which in most cases enable them to solve problems themselves. If the problem still cannot be solved, users can contact the relevant office of the target application they wish to use directly. This may be a cantonal office or a federal office, for example, which usually publishes the contact details on the website of the relevant application. Alternatively, users can also contact the relevant person via the website www.agov.ch/help by accessing the appropriate help article and submitting a support request at the end (under «Were we able to help you?», click on «No, I would like to open a ticket»).
You can find solutions to common problems at www.agov.ch/help. You can also submit a support request, which will be responded to as quickly as possible.
Support for participating authorities is provided by second-level support during office hours exclusively through the creation of tickets online. To do this, go to www.agov.ch/help and open the corresponding help article. The online ticket creation starts at the end of the support article.
You can restore your AGOV login credentials (authentication factors) via the self-service option. Documentation is available at www.agov.ch/help. Depending on your situation, the recovery process can be time-consuming and may require a paid identity verification.
To avoid this, we recommend registering two authentication factors: your smartphone with the AGOV access app and a FIDO security key. You can register additional login factors at www.agov.ch/me.
Even if your app PIN appears on a list of weak or leaked passwords circulating on the darknet, it poses no security risk for the AGOV access App.
Here’s why:- The PIN only protects local access to the app – not your digital identity.
Even if someone knows your PIN, they also need your unlocked smartphone. Without access to your device, the PIN alone is useless. - The app actively defends against repeated incorrect attempts.
After several failed entries, access is blocked or the app is reset. Trying out many PINs (so-called brute-forcing) is therefore not possible. - The PIN does not replace strong authentication.
The AGOV access App uses additional security mechanisms for login to online services - such as digital certificates or two-factor authentication. The PIN only adds extra protection on the device. - Your smartphone provides additional layers of security.
Typically, your device is also secured by fingerprint, Face ID, or a device code. This keeps the app protected even if someone knows your PIN.
- The PIN only protects local access to the app – not your digital identity.
Security-sensitive applications like the AGOV access app can only be used if a screen lock (also called device login) is enabled on your smartphone – for example, a PIN code, a pattern, a fingerprint, or facial recognition (Face ID). This requirement is based on several important security considerations.
On one hand, these apps protect particularly sensitive or personal data - such as in the areas of e-banking, healthcare, email communication, government services, or internal enterprise systems. Without device protection, unauthorized individuals could immediately access such data if the device is lost or stolen.
On the other hand, many modern apps rely on authentication methods that are directly linked to the device lock. These include biometric methods like fingerprint or facial recognition, as well as device-based certificates or cryptographic keys. These only work if a screen lock is activated.
In addition, legal or regulatory requirements in certain fields explicitly mandate such protection measures - for instance in banking (under the EU PSD2 directive), healthcare (e.g. GDPR, HIPAA), public administration (eGovernment), or organizations with mobile device management (MDM).
Screen locks also provide effective protection against misuse in the event of device loss. They prevent access to installed apps without further security checks.
For this reason, it is standard - and often required - that security-critical apps only launch when an appropriate device lock is enabled. This reliably protects both the app and access to your data.
Important note: The AGOV access app does not automatically lock your device, but simply prompts you to set up a screen lock.
Please note: It is your responsibility to choose a lock method and store it in a way that allows you to access it at all times - for example, by keeping it safe or documenting the PIN code used. The AGOV recovery process cannot restore access to your smartphone if you have locked yourself out of it.
Alternative option: If you prefer not to use a screen lock on your device, you can instead use a FIDO2 security key to access AGOV access.The AGOV access App has high security requirements for the device being used. If the app cannot be installed or launched on an older or modified smartphone, this is usually due to one or more security-related factors.
A common reason is that the device has been “rooted” (on Android) or “jailbroken” (on iOS). These are modifications that grant access to protected parts of the system. While such changes offer more control, they also disable core security mechanisms, increasing the risk of malware or data theft. Devices with “Custom ROMs” or an unlocked bootloader are likewise considered compromised. The AGOV access App detects these modifications and blocks execution for security reasons.
Another possible reason is the absence of a security chip. Modern smartphones include dedicated hardware like a “Secure Element,” a “Trusted Platform Module (TPM),” or a “Trusted Execution Environment (TEE)” to securely store sensitive information like biometric data or cryptographic keys. Apple devices use the “Secure Enclave,” while Samsung often relies on “Knox.” These components are essential for secure applications, especially those using device certificates or FIDO2 authentication. Without such a chip, or if it's not certified, the AGOV access App cannot function.
Outdated operating system versions can also cause problems. Android and iOS versions that no longer receive security updates are vulnerable to known exploits. Therefore, the AGOV access App requires a current, supported OS. If this requirement is not met, the app will refuse to start.
Some less common Android variants or special distributions – even those designed with security in mind – also pose challenges. These include enterprise-hardened Androids or open-source project versions. Even if secure, they are not officially whitelisted and are therefore unsupported in the AGOV access security architecture.
The app also requires specific device security features to be enabled – such as a screen lock (PIN, fingerprint, or facial recognition) and functioning system integrity checks. If these safeguards are missing, the app cannot meet its security standards.
In summary: The AGOV access App only runs on unmodified, up-to-date devices equipped with secure hardware that are listed as officially compatible. This protects your personal data and secures the connected systems.
If your device is not compatible, you can use a FIDO2 security key as an alternative way to securely access AGOV access.
At present, GrapheneOS is not yet approved for use with the AGOV access app. The Swiss Federal Chancellery has commissioned the supplier to enable support for GrapheneOS. The delivery date has not yet been determined.
If you carry out an identity verification online and are required to pay for it directly online, you will automatically receive a receipt by email.
If this email does not reach you – for example because it was filtered as spam – the receipt cannot be reissued. In this case, please use the electronic transaction confirmation from your payment provider (e.g. TWINT or credit card) for expense claims or other accounting purposes.
The functionality of mobile devices in connection with AGOV largely depends on the operating system used and the version of the AGOV access app. Changes mainly result from updates to these components.
If an operating system that was previously unsupported or outdated is updated, the device may once again meet the required security standards and therefore be usable with AGOV. Conversely, newly released operating system versions may contain bugs that restrict or prevent the use of AGOV.
Updates to the AGOV access app can also have effects in both directions. Devices may be excluded if, based on new findings, they are no longer considered sufficiently secure. At the same time, adjustments in the app can mitigate operating system issues, allowing AGOV to be used again on affected devices.
This may result in varying usability for end users. This dynamic is particularly evident in the Android ecosystem, which, due to its wide range of devices and versions, shows greater variability than the more standardized iOS platform.
AGOV has no influence on release cycles or quality characteristics of operating systems or device manufacturers. These effects therefore cannot be completely avoided.
Other native mobile apps with lower security requirements are generally less affected by such external influences. A similar technical approach would in principle also be possible for the AGOV access app, but it would require a lower level of security. As this is not an option, such a compromise is deliberately excluded.
Alternative or complementary authentication methods are available, in particular FIDO-compliant security keys. These offer a high degree of independence from specific device configurations as well as increased digital sovereignty.
3 AGOV, other logins and the e-ID
AGOV and CH-LOGIN are currently running in parallel; while CH-LOGIN is available only for the Federal Administration's eGovernment, AGOV can be used by all Swiss authorities. The CH-LOGIN will be fully replaced by AGOV as soon as possible. Users can already switch to AGOV for all CH-LOGIN applications.
The Swiss state e-ID will be usable directly in AGOV as a login factor, thus rendering the AGOV access app (and security keys) obsolete for e-ID users. The AGOV login via the AGOV Access App or a security key remains available as an alternative. This allows end users to freely choose whether to use the e-ID, the AGOV Access App, or the security key as a login factor.AGOV will also support the linking of existing AGOV accounts with the new e-ID (n:1). For AGOV and the underlying target applications, the e-ID has the advantage that the end user can reliably confirm their identity without having to go through identity verification procedures, such as video identification, in AGOV. Please refer to the video: Use of the e-ID with AGOV.
The AGOV access app can be linked to your AGOV account and then serves as a login factor for authentication processes via AGOV.
In the swiyu wallet app, you can store, among other things, your Swiss e-ID*. This e-ID can also be used as a login factor for AGOV sign-ins.
You are free to choose whether to use, for your AGOV login, the AGOV access app, the swiyu wallet app containing your e-ID*, or a security key (FIDO2). These login factors can also be combined freely.
* as soon as available
4 Miscellaneous
The authentication service of the Swiss authorities needed a short name that was easy to pronounce and usable in all the languages of Switzerland plus English - without transation - and was available as intellectual property in Switzerland.
The «AGOV» acronoym is made up of the terms «authentication» and «government». It is pronounced: /ˈeɪ.ɡɒv/ or /ˈeɪ.ɡɑːv/ or /ˈɑː.ɡɒv/AGOV's appearance is based on a colour palette derived from Digital Public Services Switzerland (DPSS). The aim is to consciously avoid using any colours associated with cantons or the Swiss Confederation – as the login flow runs via AGOV from various authorities and back again.
The AGOV logo evolves the squares of the DPSS logo into an extended form that symbolizes the grip of a key.
The design of AGOV focuses on user friendliness and accessibility: it offers optimal contrast, a presentation adjusted for all screen sizes, and a content structure optimised for aids such as screen readers.
The Swiss Confederation is not responsible for processing reviews – that lies with the relevant platform provider, e.g. Google and Apple. Their terms and conditions apply. The Swiss Confederation does not process the evaluations itself. Questions and suggestions on the AGOV access app can be submitted via the support form at www.agov.ch.help.
The number of reviews submitted is very low (in the per mil range of AGOV users) as, unlike many other apps, the AGOV access app does not ask for users to provide an assessment. Reviews are only submitted at the initiative of the users via the relevant platform.
There are no special regulations for private training and support offerings related to public services; market freedom applies. The Swiss Confederation (Federal Administration) does not verify or certify these offerings.
It is the responsibility of the end users to assess the suitability, quality, and seriousness of the offerings and decide whether they wish to use them. In particular, attention should be paid to which personal data is disclosed. Access credentials should not be shared.
The AGOV login is based on three guiding principles: security, user-friendliness, and accessibility. These principles have been reviewed by security experts and confirmed through user testing.
Easy use in everyday life
The login itself is very straightforward. It works similarly to a TWINT payment: Open smartphone → scan QR code → done.One-time setup
Only the initial setup is a bit more demanding. It is similar to setting up smartphone-based e-banking access:- The correct app* must be downloaded from the Apple App Store or Google Play Store.
- Then registration must be completed.
For people who rarely install new apps, this can present a small hurdle at first – for example, if the login data for Apple or Google accounts are not immediately available.
Support and inclusion
Not all users have the same experience with digital processes. That is why it is important that clear information, simple instructions and reliable support are available (AGOV help portal agov.ch/help). Help from family or friends also plays a major role. In this way, even less experienced people can benefit from secure and user-friendly solutions right from the start.* SWIYU App for the Swiss e-ID** or AGOV access App (also works without e-ID)
** as soon as availableOnly genuine AGOV QR codes work in the AGOV access app. The camera app, however, can also open QR codes that lead to external websites. This feature can therefore expose users to fraudulent sites – a practice known as quishing.
The term quishing is a modern derivative of the word phishing, which itself comes from the English fishing. While phishing originally referred to «fishing» for passwords or confidential data through deceptive emails or websites, quishing describes the same fraudulent method but via a QR code. The term results from merging QR (for Quick Response, the name of the square matrix code) and phishing. This results in a concise combination that expresses both the information carrier (QR code) and the method (phishing) – in other words: QR-code phishing → quishing.
Here you can find the technical FAQs as well as glossary entries: FAQ & Glossary
The responsibility for keeping the mobile phone operating system up to date and securing it with updates lies with the end users.
This article uses the term ‘mobile phone operating systems’ to refer to all operating systems and all end devices on which the AGOV access app can be run. The article does not specify which operating systems or operating system brands work for this purpose but deals exclusively with the phase-out of operating system versions.
AGOV rejects the use of certain mobile phone operating systems (outdated). This rejection applies exclusively to the AGOV access app and not to other apps or the use of the browser.
Specifically, AGOV excludes certain (outdated) operating system versions from using the AGOV access app if known security vulnerabilities exist that could harm end users. The exclusion takes place within the period specified by the Federal Chancellery.
Irrespective of this, end users are fundamentally responsible for their own security in accordance with the introductory explanation, in particular during the transition period until a possible exclusion.
At the same time, AGOV may also approve mobile phone operating systems for the AGOV access app that have reached their end of life and no longer receive security updates. The aim is to continue to provide access to as many end users with older hardware as possible. The Federal Chancellery decides on the approval of such outdated operating systems based on generally available security information and in consultation with other federal authorities. A pragmatic approach is also taken to exclude very old operating systems in line with common sense, for example in a harmonised manner with the Swiyu e-ID wallet.
The risks arising from the use of outdated mobile phone operating systems are assumed by the end users in all cases. It should therefore be expressly noted that switching to newer hardware and software is more sensible and secure.
The costs resulting from the exclusion of mobile phone operating systems are borne by the end users. These costs can be reduced by using security keys instead of the AGOV access app. These are inexpensive and have a longer service life.
No. This applies in general as well as to the use of AGOV, for example the AGOV access app: there is no entitlement to compensation for private IT equipment or its replacement.
Electronic authentication means serve to protect sensitive personal data and to ensure the integrity of government information systems. Authorities are required to take appropriate technical and organisational measures to guarantee information security (cf. Art. 8 of the Federal Act on Data Protection, FADP). This includes, in particular, that only devices and operating systems that continue to be supported by the manufacturer with security updates, or that do not exhibit vulnerabilities, are permitted and thus meet current security requirements.
Devices or operating systems whose security support has been discontinued may exhibit vulnerabilities that can no longer be remedied. The exclusion of affected systems is therefore objectively justified as well as appropriate and necessary in order to meet the legal protection requirements.
The constitutional principle of proportionality must be respected (Art. 5 para. 2 of the Federal Constitution of the Swiss Confederation). The definition of minimum technical requirements is carried out solely to ensure security and is limited to what is necessary for that purpose. No requirements are imposed beyond what is needed to achieve this legitimate public interest.
The information and communication infrastructure required to use electronic government services is owned by and under the responsibility of the users. The procurement, maintenance and renewal of this private infrastructure are, in principle, their own responsibility.
Under public law, the principle of legality applies. State benefits or compensation require an explicit legal basis. No such legal basis exists for covering costs related to the renewal of private IT equipment. Accordingly, no entitlement to reimbursement or damages arises vis-à-vis the authorities.
Article 9 EMBAG stipulates in paragraph 1:
“The federal authorities subject to this law shall disclose the source code of software that they develop or have developed for the fulfilment of their tasks, unless third party rights or security related reasons prevent or limit such disclosure.”
In December 2026, the source code of AGOV will be published in accordance with this requirement. This is the AGOV version that represents the achievement of the AGOV project goal, namely AGOV including AGOV e-ID Verifier. Later versions will be described in the release notes www.agov.ch/rn, prepared for publication after release and published.
AGOV end users may receive different types of emails in connection with AGOV. These include in particular:
- Automatic messages from the AGOV system, for example during the account creation process.
- Information messages for end users, such as notifications about outdated operating systems on mobile devices or other security-related information.
Please note that the authenticity of such messages cannot always be reliably verified. Criminals may send fraudulent AGOV emails in order to carry out phishing attacks. You are therefore responsible for carefully assessing, on a case-by-case basis, how you handle such messages and which actions you take as a result.
Some AGOV emails are sent in the language you have defined as your correspondence language at «agov.ch/me».
AGOV is developed and operated in collaboration with Swiss economic partners. Its operation is carried out on behalf of the Swiss Federal Chancellery in federal data centers as well as – in order to increase resilience – additionally in privately owned Swiss data centers.
The infrastructure required for the operation and use of AGOV along the entire value chain – from end users through power supply and internet infrastructure to the AGOV system itself as well as the infrastructures and specialized systems of authorities – is inherently and unavoidably embedded in international contexts. This integration affects all layers, in particular software, hardware, organizational structures, as well as the underlying know-how.