# Use cases

This chapter builds on the [iSHARE Trust Framework](/main-aspects-of-the-ishare-trust-framework/framework-and-roles.md) to showcase the [key functionalities](/main-aspects-of-the-ishare-trust-framework/key-functionality.md) in four use cases and their Verifiable Credentials (VC) variant.

Both versions describe the same business goals; they differ only in the technical evidence used for authentication and authorisation:

* **\[Classic]:** JWT artefacts and registry lookups
* **\[VC variant]**: Verifiable Credentials (VCs) and Verifiable Presentations (VPs) ([Refer to Glossary](/glossary-and-legal-notices/glossary.md))

{% hint style="info" %}
Many implementers run the classic flow today. The VC pages let you adopt RFC040 gradually and compare flows 1:1. Use whichever matches your deployment.
{% endhint %}

1. **Use case:** [**M2M interaction (with fine-grained authorisation)**](/use-cases/use-case-m2m-interaction-with-fine-grained-authorization.md) showcases:
   * [Support Machine-to-Machine (M2M) interaction](/main-aspects-of-the-ishare-trust-framework/key-functionality/support-machine-to-machine-m2m-interaction.md);
   * [Facilitate flexible authorisations, applicable in any context](/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-flexible-authorizations-applicable-in-any-context.md).
2. **Use case:** [**H2M interaction (with coarse-grained authorisation)**](/use-cases/use-case-h2m-interaction-with-coarse-grained-authorization.md) showcases:
   * [Support Human to Machine (H2M) interaction](/main-aspects-of-the-ishare-trust-framework/key-functionality/support-human-to-machine-h2m-interaction.md);
   * [Facilitate flexible authorisations, applicable in any context](/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-flexible-authorizations-applicable-in-any-context.md).
3. **Use case:** [**portable identity**](/use-cases/use-case-portable-identity.md) showcases:
   * [Facilitate portable identity(s) for parties and humans](/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-portable-identity-s-for-parties-and-humans.md).
4. **Use case:** [**delegation (and management of consent)** ](/use-cases/use-case-delegation-and-management-of-consent.md)showcases:
   * [Enable data exchange based on delegations - even between unknown parties](/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-data-exchange-based-on-delegations-even-between-unknown-parties.md);
   * [Enable control over own data through management of consent](/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-control-over-own-data-through-management-of-consent.md).

### **Structure**

Each use case includes:

* A description and depiction of the roles and relations;
* A description of the prerequisites, and a depiction of prerequisite registration;
* A description and depiction of the use case;
* A sequence diagram;
* A reference to what needs to be technically implemented for this use case.

The depicted use cases are only a selection of the iSHARE Trust Framework's use case scope. For the full scope, please refer to the [detailed Functional descriptions](/detailed-descriptions/functional.md).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://framework.ishare.eu/use-cases.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
