Use case: H2M interaction (with coarse-grained authorisation)
This use case showcases iSHARE Trust Framework's key functionality, 'support Human to Machine (H2M) interaction'.
The example described in the linked chapter is as follows:
Human X, working for Party A, requests a status update from the ERP system (machine) of Party B. It does so via a user interface.
To showcase the key functionality 'facilitate flexible authorisations', Party A's ERP system (machine) is allowed to request ANY information about ANY (part of a) bill of lading. This can be considered a coarse-grained authorisation.
The following explains this example in detail, utilising the iSHARE Trust Framework.
Roles and Relations
The following roles are fulfilled in this use case:
Party A requests a status update, so it is the participant fulfilling the Service Consumer role.
Party B responds with the status update, so it is the participant fulfilling the Service Provider role.
No delegation takes place, so Party A also fulfils the Entitled Party role.
Human X is the Human Service Consumer that represents Party A.
The only legal relation is the mandatory relation between the Entitled Party (Party A) and the Service Provider (Party B), which establishes the entitlements of the Entitled Party (Party A). As depicted:

Prerequisites
It is a prerequisite of this use case that:
[Classical JWT]:
The Service Provider (Party B) has and manages its own entitlement information indicating what Entitled Parties are entitled to what (parts of) services, i.e. Party B has information indicating that Party A is allowed to request ANY information about ANY (part of a) bill of lading from its ERP system;
The Service Consumer (Party A) has and manages its own authorisation information indicating which Human Service Consumers are authorised to act on its behalf;
The delegation/authorisation responsible at the the Service Consumer (Party A) registers the authorisation information at the Service Provider (Party B);
The Human Service Consumer (Human X) can authenticate the Service Provider (Party B);
The Service Provider (Party B) can authenticate the Human Service Consumer (Human X);
The Human Service Consumer (Human X) has been issued identity credentials by the Service Provider (Party B).
[VC Variant]:
Human Service Consumer (Human X) has been issued an Identity Credential
Service Consumer (Party A) and Service Provider (Party B) have been issued a ParticipantCredential once onboarded into data space;
Human Service Consumer (Human X) has been issued a DataRights Credential from the Entitled Party (in this case Party A);
Service Provider (Party B) can verify Service Consumer's (Party A) Verifiable Credential/Presentation and vice versa.
Use case
The use case consists of the following steps:
The Human Service Consumer (Human X) requests a service from the Service Provider (Party B);
The Service Provider (Party B) authenticates the Human Service Consumer (Human X), and validates the iSHARE adherence of the Service Consumer (Party A);
The Service Provider (Party B) authorises the Human Service Consumer (Human X) of the Service Consumer (Party A) based on the entitlement- and authorisation information registered with the Service Provider (Party B);
The Service Provider (Party B) executes the requested service;
The Service Provider (Party B) provides the service result to the Human Service Consumer (Human X).
As depicted

Note that this use case is the same as primary use case 2, as found under detailed Functional descriptions.
Sequence diagram

What needs to be implemented technically for this use case is described generically, and specifically per role in the iSHARE Developer Portal.
Last updated