iSHARE Trust Framework
Other resources
Version 2.1 (current version)
Version 2.1 (current version)
  • iSHARE Trust Framework
  • Introduction
    • Goals and scope of the iSHARE Trust Framework
    • Guiding principles
    • Governance
  • Releases
    • Release notes
    • Release planning
    • Version history
  • Main aspects of the iSHARE Trust Framework
    • Key functionality
      • Support Machine to Machine (M2M) interaction
      • Support Human to Machine (H2M) interaction
      • Facilitate portable identity(s) for parties and humans
      • Facilitate flexible authorizations, applicable in any context
      • Enable data exchange based on delegations - even between unknown parties
      • Enable control over own data through management of consent
      • Provide a Trust Framework
    • Technical overview
    • Framework and roles
    • Legal provisions
    • Operational provisions
  • Use cases
    • Use case: M2M interaction (with fine-grained authorization)
    • Use case: H2M interaction (with coarse-grained authorization)
    • Use case: portable identity
    • Use case: delegation (and management of consent)
  • Detailed descriptions
    • Functional
      • Primary use cases
        • 1. M2M service provision
          • 1b. M2M service provision with the EP as the delegation info PIP
          • 1c. M2M service provision with the AR as the delegation info PIP
          • M2M service provision including an app
        • 2. H2M service provision with identity info at the IP
          • Without Identity Broker
          • With Identity Broker
      • Secondary use cases
      • Licenses
      • Delegation paths
      • Functional requirements per role
        • Party identification
        • User interface requirements
    • Technical
      • Technical standards
      • Structure of delegation evidence
        • Example cases
    • Operational
      • Operational processes
        • Admission
        • Withdrawal or Downgrade
        • Warnings, Suspension and Exclusion
        • Incident Management
        • Change Management
        • Management reporting
      • Service levels
        • Service levels for Adhering Parties
        • Service levels for Certified Parties
      • Communication
    • Legal
      • Legal context
        • Dutch Civil Code
        • Regulation on Electronic Identification and Trust Services (eIDAS)
        • Applicable competition law
        • General Data Protection Regulation (GDPR)
  • Glossary and legal notices
    • Glossary
    • Legal notices
    • Assumptions
Powered by GitBook
LogoLogo

  • Cookie Policy

  • Privacy Policy

  • Imprint

  • Contact Us

Copyright © 2024 iSHARE Foundation

On this page
  • Roles and Relations
  • Prerequisites
  • Use case
  • Sequence diagram
  1. Use cases

Use case: M2M interaction (with fine-grained authorization)

PreviousUse casesNextUse case: H2M interaction (with coarse-grained authorization)

Last updated 2 months ago

This use case showcases iSHARE Trust Framework's key functionality ''.

The example described in the linked chapter is as follows:

  • Every day, the ERP system (machine) of Party A requests a status update from the ERP system (machine) of Party B. Party B's ERP system automatically responds with the requested status update. No humans are needed to interfere.

To showcase the key functionality '', Party A's ERP system (machine) is ONLY allowed to request status updates concerning line X of bill of lading Y. This can be considered a fine-grained authorization.

The following explains this example in detail, utilising the iSHARE Trust Framework.

Roles and Relations

The following roles are fulfilled in this use case:

  • Party A requests a status update, so it is the legal entity fulfilling the Service Consumer-role;

  • Party B responds with the status update, so it is the legal entity fulfilling the Service Provider-role;

  • No delegation takes place, so Party A also fulfils the Entitled Party-role;

  • As this is a M2M use case, a Machine Service Consumer represents Party A.

The only legal relation is the mandatory relation between the Entitled Party (Party A) and the Service Provider (Party B), which establishes the entitlements of the Entitled Party (Party A). As depicted:

Prerequisites

It is prerequisite of this use case that:

  • The Service Provider (Party B) has and manages its own entitlement information indicating what Entitled Parties are entitled to what (parts of) services, i.e. Party B has information indicating that Party A is allowed to request status updates concerning line X of bill of lading Y from its ERP system;

  • The Service Consumer (Party A) is able to authenticate the Service Provider (Party B);

  • The Service Provider (Party B) is able to authenticate the Service Consumer (Party A).

Use case

The use case consists of the following steps:

  1. The Machine Service Consumer (of Party A) requests a service from the Service Provider (Party B);

  2. The Service Provider (Party B) authenticates the Machine Service Consumer (of Party A) and validates the iSHARE adherence of the Service Consumer (Party A);

  3. The Service Provider (Party B) authorizes the Machine Service Consumer of the Service Consumer (Party A) based on the entitlement information registered with the Service Provider (Party B);

  4. The Service Provider (Party B) executes the requested service;

  5. The Service Provider (Party B) provides the service result to the Machine Service Consumer (of Party A).

As depicted:

Sequence diagram

Note that this use case is exactly the same as primary use case 1, as found under .

What needs to be implemented technically for this use case is described , and specifically per role in the .

detailed Functional descriptions
support Machine to Machine (M2M) interaction
facilitate flexible authorizations
generically
iSHARE Developer Portal