{"version":1,"pages":[{"id":"hGusFBTbyTnp6fhW7FlY","title":"iSHARE Trust Framework","pathname":"/","siteSpaceId":"sitesp_dzoYb","description":""},{"id":"keCDDO4IgadyAurGWW4a","title":"Introduction","pathname":"/introduction","siteSpaceId":"sitesp_dzoYb","description":""},{"id":"0dIZwBV8yD0NOwtO0uWp","title":"Goals and scope of the iSHARE Trust Framework","pathname":"/introduction/goals-and-scope-of-the-ishare-trust-framework","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"5JB6uL6WnAVsciCpnkCx","title":"Guiding principles","pathname":"/introduction/guiding-principles","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"e6ziGB5oGfV9KbFch0uT","title":"Governance","pathname":"/introduction/governance","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"S8EiBUVZK17dp4XIy2Kf","title":"Releases","pathname":"/releases","siteSpaceId":"sitesp_dzoYb","description":""},{"id":"wwpaMJGjqrlzC1zy8i2k","title":"Release notes","pathname":"/releases/release-notes","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"Z0yduACX8o2H9qNZtsd6","title":"Release planning","pathname":"/releases/release-planning","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"9sNxLF0XOkpyKpOXcer2","title":"Version history","pathname":"/releases/version-history","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"irtl6qzup7otVUs4FZ8G","title":"Main aspects of the iSHARE Trust Framework","pathname":"/main-aspects-of-the-ishare-trust-framework","siteSpaceId":"sitesp_dzoYb","description":""},{"id":"xst5cEEiqYj3D28sOune","title":"Key functionality","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"VE0HWTaD6pp0E5CnGd0V","title":"Support Machine-to-Machine (M2M) interaction","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality/support-machine-to-machine-m2m-interaction","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"vyTtU7vtzuu4rs1L0WSw","title":"Support Human to Machine (H2M) interaction","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality/support-human-to-machine-h2m-interaction","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"2ZnPjb4FQyhtyr0IYjco","title":"Facilitate portable identity(s) for parties and humans","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-portable-identity-s-for-parties-and-humans","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"YlCvZlEz3O43mRBCXFKv","title":"Facilitate flexible authorisations, applicable in any context","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-flexible-authorizations-applicable-in-any-context","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"hUtFjAW7SllFJd00RG5B","title":"Enable data exchange based on delegations - even between unknown parties","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-data-exchange-based-on-delegations-even-between-unknown-parties","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"33yauP6NzMFKHVg6Qh4N","title":"Enable control over own data through management of consent","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-control-over-own-data-through-management-of-consent","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"lGNEZruYOa53YOjP3diX","title":"Provide a Trust Framework","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality/provide-a-trust-framework","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"qyD3xhG1QB3crEo9GxLK","title":"Support Verifiable Credentials","pathname":"/main-aspects-of-the-ishare-trust-framework/key-functionality/support-verifiable-credentials","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"QCB6mUWTK9ryCvFSRS6W","title":"Technical overview","pathname":"/main-aspects-of-the-ishare-trust-framework/technical-overview","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"j0v8Odo4QG34v6ZeY3r7","title":"Framework and roles","pathname":"/main-aspects-of-the-ishare-trust-framework/framework-and-roles","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"vJ3umx18bChLtC7iaCXm","title":"Legal provisions","pathname":"/main-aspects-of-the-ishare-trust-framework/legal-provisions","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"CX9odthxVLCdrfOXx3P6","title":"Operational provisions","pathname":"/main-aspects-of-the-ishare-trust-framework/operational-provisions","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"wjQ0540J0716RQDhpmCC","title":"Use cases","pathname":"/use-cases","siteSpaceId":"sitesp_dzoYb","description":""},{"id":"eaF9FdwomCPTsm0rljyg","title":"Use case: M2M interaction (with fine-grained authorisation)","pathname":"/use-cases/use-case-m2m-interaction-with-fine-grained-authorization","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"QcLuRSRdxfFfT1ZU1z7O","title":"Use case: H2M interaction (with coarse-grained authorisation)","pathname":"/use-cases/use-case-h2m-interaction-with-coarse-grained-authorization","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"YfABP5fYD4vIGNAOg4EZ","title":"Use case: portable identity","pathname":"/use-cases/use-case-portable-identity","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"YoOWBvRSvAOobaHUsAjI","title":"Use case: delegation (and management of consent)","pathname":"/use-cases/use-case-delegation-and-management-of-consent","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"sbvW9KW5Bf3NCLBt2mQG","title":"Detailed descriptions","pathname":"/detailed-descriptions","siteSpaceId":"sitesp_dzoYb","description":""},{"id":"ApWYFXJhBdl3MUq1fmUT","title":"Functional","pathname":"/detailed-descriptions/functional","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"vBfJduREHbvMK8e6AfKo","title":"Primary use cases","pathname":"/detailed-descriptions/functional/primary-use-cases","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"RXIjVhtxRcHeAGWGBqGP","title":"1. M2M service provision","pathname":"/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"vXCWUyzd69caNA8xGIb2","title":"1b. M2M service provision with the EP storing delegation info","pathname":"/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1b.-m2m-service-provision-with-the-ep-as-the-delegation-info-pip","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"iZLwAtIeCjrV85gjauvn","title":"1c. M2M service provision with the AR storing delegation info","pathname":"/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1c.-m2m-service-provision-with-the-ar-as-the-delegation-info-pip","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"h5C4Kk9FhkotubaGoBmY","title":"1d. M2M service provision with Verifiable Credentials","pathname":"/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1d.-m2m-service-provision-with-verifiable-credentials","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"WwbyCLqN22qJjNbtCIaX","title":"M2M service provision including an app","pathname":"/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/m2m-service-provision-including-an-app","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"lGk9YEKkeUlPtUhFtyak","title":"2. H2M service provision with identity info at the IP","pathname":"/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"7u8i4mEXYRJj8xjiSkfj","title":"Without Identity Broker","pathname":"/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/without-identity-broker","siteSpaceId":"sitesp_dzoYb","description":"This use case would look as follows without an Identity Broker:","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"pFZ5KEyAzw0y3qsulE41","title":"With Identity Broker","pathname":"/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/with-identity-broker","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"EoSS2ZFFMoa464IuUkHw","title":"H2M with Verifiable Credentials","pathname":"/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/h2m-with-verifiable-credentials","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"HUrNDRiKU4pcYgOIfZmq","title":"Secondary use cases","pathname":"/detailed-descriptions/functional/secondary-use-cases","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"gvzqGRQMYVNVG5rGbxyN","title":"Licenses","pathname":"/detailed-descriptions/functional/licenses","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"ubyuNzSV9j8jB2N5tkUX","title":"Delegation paths","pathname":"/detailed-descriptions/functional/delegation-paths","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"kqjWAnvc9ny9qp59WSTQ","title":"Functional requirements per role","pathname":"/detailed-descriptions/functional/functional-requirements-per-role","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"jVi9ItH8rrCqNPb3sRaJ","title":"Party identification","pathname":"/detailed-descriptions/functional/functional-requirements-per-role/party-identification","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"gjDP2krBoUZwgH88MJQR","title":"User interface requirements","pathname":"/detailed-descriptions/functional/functional-requirements-per-role/user-interface-requirements","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"yEOU8A4WAgjOB8W3QID9","title":"Technical","pathname":"/detailed-descriptions/technical","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"qQvK0caQNfdxqkgD2eVU","title":"Technical standards","pathname":"/detailed-descriptions/technical/technical-standards","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"g0dtYA9MPKKm9NhDf2aJ","title":"Structure of delegation evidence","pathname":"/detailed-descriptions/technical/structure-of-delegation-evidence","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"C9nAcimrk5G5DjuRHEXq","title":"Example cases","pathname":"/detailed-descriptions/technical/structure-of-delegation-evidence/example-cases","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Structure of delegation evidence"}]},{"id":"Ko5RtxV5FWq4JMD1bmiB","title":"Data Rights Credential (VC)","pathname":"/detailed-descriptions/technical/structure-of-delegation-evidence/data-rights-credential-vc","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Structure of delegation evidence"}]},{"id":"R3kVYSZ3hscr4S948mb2","title":"Operational","pathname":"/detailed-descriptions/operational","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"GkjUKJ7mW5ZWXNiHnWiC","title":"Operational processes","pathname":"/detailed-descriptions/operational/operational-processes","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"6uxpDb79N0zPLYPJuhhe","title":"Admission","pathname":"/detailed-descriptions/operational/operational-processes/admission","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"abSaHM7RiZja6ermwVQz","title":"Withdrawal or Downgrade","pathname":"/detailed-descriptions/operational/operational-processes/withdrawal-or-downgrade","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"vUxA7V5ciYD7XXE0jDjU","title":"Warnings, Suspension and Exclusion","pathname":"/detailed-descriptions/operational/operational-processes/warnings-suspension-and-exclusion","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"pRPv8027wtiEtwoRgTMp","title":"Incident Management","pathname":"/detailed-descriptions/operational/operational-processes/incident-management","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"czCS3yb3aezGdeOtDcZ8","title":"Change Management","pathname":"/detailed-descriptions/operational/operational-processes/change-management","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"hFvEY2GXDWu3RaDE0BiO","title":"Management reporting","pathname":"/detailed-descriptions/operational/operational-processes/management-reporting","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"SYuPcA0EaJhkYtDcKFkZ","title":"Service levels","pathname":"/detailed-descriptions/operational/service-levels","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"9QsZT3otXTODHdllcROy","title":"Service levels for Adhering Parties","pathname":"/detailed-descriptions/operational/service-levels/service-levels-for-adhering-parties","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"A4Ux0IfruIM5F6bLMNBu","title":"Service levels for Certified Parties","pathname":"/detailed-descriptions/operational/service-levels/service-levels-for-certified-parties-satellite","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"hBnPdUKnxgPwaZffBkC6","title":"Communication","pathname":"/detailed-descriptions/operational/communication","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"JTzG10TVriBU945LkCEl","title":"Legal","pathname":"/detailed-descriptions/legal","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"wrhRTyhnLnVEcrDwG1pt","title":"Legal context","pathname":"/detailed-descriptions/legal/legal-context","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"}]},{"id":"qbc0AuLjknnFA3vuP36V","title":"Dutch Civil Code","pathname":"/detailed-descriptions/legal/legal-context/dutch-civil-code","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"K5coSci3YLFpAVLdq3yH","title":"Regulation on Electronic Identification and Trust Services (eIDAS)","pathname":"/detailed-descriptions/legal/legal-context/regulation-on-electronic-identification-and-trust-services-eidas","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"zpIY09TpDerXbbR5GbO4","title":"Applicable competition law","pathname":"/detailed-descriptions/legal/legal-context/applicable-competition-law","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"na0mhAwpRN5PhuVK9RbH","title":"General Data Protection Regulation (GDPR)","pathname":"/detailed-descriptions/legal/legal-context/general-data-protection-regulation-gdpr","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"vDQENXWK33aeTZ0c6pSp","title":"Glossary and legal notices","pathname":"/glossary-and-legal-notices","siteSpaceId":"sitesp_dzoYb","description":""},{"id":"x0wZSmmmUuFFPhMSPJ42","title":"Glossary","pathname":"/glossary-and-legal-notices/glossary","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"qtiClK17U6XShGc9xljc","title":"Legal notices","pathname":"/glossary-and-legal-notices/legal-notices","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"ShmBvOwU1mS78URZ9MvN","title":"Assumptions","pathname":"/glossary-and-legal-notices/assumptions","siteSpaceId":"sitesp_dzoYb","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"kb5lMnHxgUlilfvFmefO","title":"iSHARE Trust Framework","pathname":"/version-2.2","siteSpaceId":"sitesp_J7ta7","description":""},{"id":"PdsMms6azWAZ6mIGFQza","title":"Introduction","pathname":"/version-2.2/introduction","siteSpaceId":"sitesp_J7ta7","description":""},{"id":"WT4oixdRbzTaRT3REgKN","title":"Goals and scope of the iSHARE Trust Framework","pathname":"/version-2.2/introduction/goals-and-scope-of-the-ishare-trust-framework","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"a4zlkPbXnDhzFezNjg5F","title":"Guiding principles","pathname":"/version-2.2/introduction/guiding-principles","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"tfwAOzcotdL0BXLX8BwJ","title":"Governance","pathname":"/version-2.2/introduction/governance","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"1yQOzbkGZChV1YeVOY0V","title":"Releases","pathname":"/version-2.2/releases","siteSpaceId":"sitesp_J7ta7","description":""},{"id":"OPgzVxnkc5oWt1tyJZsB","title":"Release notes","pathname":"/version-2.2/releases/release-notes","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"ZoGyQUrnbPX1z9EP8aWC","title":"Release planning","pathname":"/version-2.2/releases/release-planning","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"uvdnsSBnJ00ZGeDe1bI3","title":"Version history","pathname":"/version-2.2/releases/version-history","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"11tBwMlfPJrRXlhlwCfd","title":"Main aspects of the iSHARE Trust Framework","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework","siteSpaceId":"sitesp_J7ta7","description":""},{"id":"eChgbMwZQxseztQvLiCo","title":"Key functionality","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/key-functionality","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"ZIg9L0SforatEVdfoenR","title":"Support Machine to Machine (M2M) interaction","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/key-functionality/support-machine-to-machine-m2m-interaction","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"7XkQbwKo7wNalZlkNHrH","title":"Support Human to Machine (H2M) interaction","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/key-functionality/support-human-to-machine-h2m-interaction","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"xv151P0AWneUzqsglV2W","title":"Facilitate portable identity(s) for parties and humans","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-portable-identity-s-for-parties-and-humans","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"lCBhQwNEZIB1Sjh0ybnV","title":"Facilitate flexible authorizations, applicable in any context","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-flexible-authorizations-applicable-in-any-context","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"KA0Y53I7896NXnyzXbss","title":"Enable data exchange based on delegations - even between unknown parties","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-data-exchange-based-on-delegations-even-between-unknown-parties","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"QTDqelLZPijIgNlewUnk","title":"Enable control over own data through management of consent","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-control-over-own-data-through-management-of-consent","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"0fRJy6Mq2aPGOkaemmay","title":"Provide a Trust Framework","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/key-functionality/provide-a-trust-framework","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"FH94peOLRFyREwt0n1ha","title":"Technical overview","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/technical-overview","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"26DVs4l4hUhshYJJG5tk","title":"Framework and roles","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/framework-and-roles","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"B9nLA1X65pec7JVvvnKn","title":"Legal provisions","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/legal-provisions","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"1qGYqiCrxynlj5TMNqfy","title":"Operational provisions","pathname":"/version-2.2/main-aspects-of-the-ishare-trust-framework/operational-provisions","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"7EdDuMW5nHCHrGoGyb3v","title":"Use cases","pathname":"/version-2.2/use-cases","siteSpaceId":"sitesp_J7ta7","description":""},{"id":"GYPh0S1gXZygs5D42KyF","title":"Use case: M2M interaction (with fine-grained authorization)","pathname":"/version-2.2/use-cases/use-case-m2m-interaction-with-fine-grained-authorization","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"bB3a00qWtHJ5SLy3TS0n","title":"Use case: H2M interaction (with coarse-grained authorization)","pathname":"/version-2.2/use-cases/use-case-h2m-interaction-with-coarse-grained-authorization","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"4R48qbpdsRDkMesxfaV8","title":"Use case: portable identity","pathname":"/version-2.2/use-cases/use-case-portable-identity","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"IN4InQOb6k3Qw5tWIv77","title":"Use case: delegation (and management of consent)","pathname":"/version-2.2/use-cases/use-case-delegation-and-management-of-consent","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"0laPmizVtZIZR2fX8yLr","title":"Detailed descriptions","pathname":"/version-2.2/detailed-descriptions","siteSpaceId":"sitesp_J7ta7","description":""},{"id":"O7P11zMp3GXnHugiUWj8","title":"Functional","pathname":"/version-2.2/detailed-descriptions/functional","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"E6CWtOMkHULuYsIatbcc","title":"Primary use cases","pathname":"/version-2.2/detailed-descriptions/functional/primary-use-cases","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"H9Fcz6VvKYLETO6GGsbh","title":"1. M2M service provision","pathname":"/version-2.2/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"povZ9aT4u9OblISO2dtt","title":"1b. M2M service provision with the EP as the delegation info PIP","pathname":"/version-2.2/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1b.-m2m-service-provision-with-the-ep-as-the-delegation-info-pip","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"qrO28cSfxNyIWPAVX7fq","title":"1c. M2M service provision with the AR as the delegation info PIP","pathname":"/version-2.2/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1c.-m2m-service-provision-with-the-ar-as-the-delegation-info-pip","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"bOpM7OvSN2wMOUbXwhC3","title":"M2M service provision including an app","pathname":"/version-2.2/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/m2m-service-provision-including-an-app","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"9PgiW9Ph8dmdfyrO6Ukd","title":"2. H2M service provision with identity info at the IP","pathname":"/version-2.2/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"bGaDa4SMfJrc5uJT5dgO","title":"Without Identity Broker","pathname":"/version-2.2/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/without-identity-broker","siteSpaceId":"sitesp_J7ta7","description":"This use case would look as follows without an Identity Broker:","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"u6VatY3gosOa9a6xcYWD","title":"With Identity Broker","pathname":"/version-2.2/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/with-identity-broker","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"iPBnwg9pdWrr1uCW8weV","title":"Secondary use cases","pathname":"/version-2.2/detailed-descriptions/functional/secondary-use-cases","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"AfKOIEuH8bdovb6KdQuM","title":"Licenses","pathname":"/version-2.2/detailed-descriptions/functional/licenses","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"cj8oEt0IOBR9EE2i9ygI","title":"Delegation paths","pathname":"/version-2.2/detailed-descriptions/functional/delegation-paths","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"JeAY6boYmA6WPwFZO7ep","title":"Functional requirements per role","pathname":"/version-2.2/detailed-descriptions/functional/functional-requirements-per-role","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"8uTGxTm1MsP8cOukJQVB","title":"Party identification","pathname":"/version-2.2/detailed-descriptions/functional/functional-requirements-per-role/party-identification","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"Fu0Buas0vFkk4ETo5HUR","title":"User interface requirements","pathname":"/version-2.2/detailed-descriptions/functional/functional-requirements-per-role/user-interface-requirements","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"5o5mg8JkssPHMLMnCRkF","title":"Technical","pathname":"/version-2.2/detailed-descriptions/technical","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"Z6invaNPJfJfYu5TVWX6","title":"Technical standards","pathname":"/version-2.2/detailed-descriptions/technical/technical-standards","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"5LV9Gk9Q6NyUjRvg7HRh","title":"Structure of delegation evidence","pathname":"/version-2.2/detailed-descriptions/technical/structure-of-delegation-evidence","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"RVS1vQfWTYIkeHpX3ntt","title":"Example cases","pathname":"/version-2.2/detailed-descriptions/technical/structure-of-delegation-evidence/example-cases","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Structure of delegation evidence"}]},{"id":"eBbB3AylTZSNgCxIsqvA","title":"Operational","pathname":"/version-2.2/detailed-descriptions/operational","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"2ttSQuwvgwD90g1OzieC","title":"Operational processes","pathname":"/version-2.2/detailed-descriptions/operational/operational-processes","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"rPJluA4kXuQIJlOfUmsE","title":"Admission","pathname":"/version-2.2/detailed-descriptions/operational/operational-processes/admission","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"8zgdVOEYdPfJmYbbRpWD","title":"Withdrawal or Downgrade","pathname":"/version-2.2/detailed-descriptions/operational/operational-processes/withdrawal-or-downgrade","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"jdQsMWiZNZ70KGBLTZbG","title":"Warnings, Suspension and Exclusion","pathname":"/version-2.2/detailed-descriptions/operational/operational-processes/warnings-suspension-and-exclusion","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"CdHnhyc5mbN4Kq7lbcX6","title":"Incident Management","pathname":"/version-2.2/detailed-descriptions/operational/operational-processes/incident-management","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"9iCUXTYA9oXdZDCvoQ13","title":"Change Management","pathname":"/version-2.2/detailed-descriptions/operational/operational-processes/change-management","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"vY4Wj6MeB8XdjJVZqBH5","title":"Management reporting","pathname":"/version-2.2/detailed-descriptions/operational/operational-processes/management-reporting","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"axMBnyjZPc9BkburbXEr","title":"Service levels","pathname":"/version-2.2/detailed-descriptions/operational/service-levels","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"IszreYIWdjkrelH5Wpm3","title":"Service levels for Adhering Parties","pathname":"/version-2.2/detailed-descriptions/operational/service-levels/service-levels-for-adhering-parties","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"QBV6xSF6iPb9OuUzGKDL","title":"Service levels for Certified Parties","pathname":"/version-2.2/detailed-descriptions/operational/service-levels/service-levels-for-certified-parties-satellite","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"7CcDvnVU3ZWMfiHLv1vn","title":"Communication","pathname":"/version-2.2/detailed-descriptions/operational/communication","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"RTSkUY0Iv6pwHjNAIdCH","title":"Legal","pathname":"/version-2.2/detailed-descriptions/legal","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"bLZudzViYklgmhKfb7gx","title":"Legal context","pathname":"/version-2.2/detailed-descriptions/legal/legal-context","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"}]},{"id":"pAjmRBUaYNCV4a7BQB4x","title":"Dutch Civil Code","pathname":"/version-2.2/detailed-descriptions/legal/legal-context/dutch-civil-code","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"Np1bWBEWzhWwwZMrP69u","title":"Regulation on Electronic Identification and Trust Services (eIDAS)","pathname":"/version-2.2/detailed-descriptions/legal/legal-context/regulation-on-electronic-identification-and-trust-services-eidas","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"E9SFAh9QALx7FhSUi0NU","title":"Applicable competition law","pathname":"/version-2.2/detailed-descriptions/legal/legal-context/applicable-competition-law","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"KWOKzuOktci2Ludt5PXI","title":"General Data Protection Regulation (GDPR)","pathname":"/version-2.2/detailed-descriptions/legal/legal-context/general-data-protection-regulation-gdpr","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"Kr3MIGOdwXnOK6dWkSHo","title":"Glossary and legal notices","pathname":"/version-2.2/glossary-and-legal-notices","siteSpaceId":"sitesp_J7ta7","description":""},{"id":"ZclznVbsf7gqJptBnE8K","title":"Glossary","pathname":"/version-2.2/glossary-and-legal-notices/glossary","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"HC7ANupbpDK3hL7Hn6oX","title":"Legal notices","pathname":"/version-2.2/glossary-and-legal-notices/legal-notices","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"Mz8gxRP5eetEQyCLw4HJ","title":"Assumptions","pathname":"/version-2.2/glossary-and-legal-notices/assumptions","siteSpaceId":"sitesp_J7ta7","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"vBvLz8D1jPKXIpVkUFXv","title":"iSHARE Trust Framework","pathname":"/version-2.1.1","siteSpaceId":"sitesp_V9sMd","description":""},{"id":"JvsfLifmTcNN7nFzZF7A","title":"Introduction","pathname":"/version-2.1.1/introduction","siteSpaceId":"sitesp_V9sMd","description":""},{"id":"Je68MgcZHI0XkpS51kar","title":"Goals and scope of the iSHARE Trust Framework","pathname":"/version-2.1.1/introduction/goals-and-scope-of-the-ishare-trust-framework","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"6FQggQP61iM9jrLVOcpR","title":"Guiding principles","pathname":"/version-2.1.1/introduction/guiding-principles","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"YAm2t2Ah1eZAeB5rqRYv","title":"Governance","pathname":"/version-2.1.1/introduction/governance","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"kwbptM4IH5dzsgrVhAqV","title":"Releases","pathname":"/version-2.1.1/releases","siteSpaceId":"sitesp_V9sMd","description":""},{"id":"wCVUJb58tUujnvfmIR9p","title":"Release notes","pathname":"/version-2.1.1/releases/release-notes","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"RItZgPYvTV1W3DxO95kG","title":"Release planning","pathname":"/version-2.1.1/releases/release-planning","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"AASgLO2SF5r9QobEzLtT","title":"Version history","pathname":"/version-2.1.1/releases/version-history","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"7WDcZrKyxOx14y0lt0l2","title":"Main aspects of the iSHARE Trust Framework","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework","siteSpaceId":"sitesp_V9sMd","description":""},{"id":"jjqnEdJIhwSxz0Add643","title":"Key functionality","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/key-functionality","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"7mezM3ghfBJ0tuvhdy5g","title":"Support Machine to Machine (M2M) interaction","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/key-functionality/support-machine-to-machine-m2m-interaction","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"X5PZZTpwrS6tsBfrOW1N","title":"Support Human to Machine (H2M) interaction","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/key-functionality/support-human-to-machine-h2m-interaction","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"ysMmyBY57gpaVQUR2gR1","title":"Facilitate portable identity(s) for parties and humans","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-portable-identity-s-for-parties-and-humans","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"V1rnp6gOdTUmeGEqv9As","title":"Facilitate flexible authorizations, applicable in any context","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-flexible-authorizations-applicable-in-any-context","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"nDsDYGGQXKGe5PGYKWIP","title":"Enable data exchange based on delegations - even between unknown parties","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-data-exchange-based-on-delegations-even-between-unknown-parties","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"IlRn3u4hHqFXznsTnsWZ","title":"Enable control over own data through management of consent","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-control-over-own-data-through-management-of-consent","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"Y7CbJEo1YLJJi3qPRMxg","title":"Provide a Trust Framework","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/key-functionality/provide-a-trust-framework","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"RTbzB6dVQ0AzxVGkQ0Dp","title":"Technical overview","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/technical-overview","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"uZbxY6odLIBotXWkOKXR","title":"Framework and roles","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/framework-and-roles","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"Oeb2hDzK1xpcIQmqxoFV","title":"Legal provisions","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/legal-provisions","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"eCXl7WwJK8P5OjEtar39","title":"Operational provisions","pathname":"/version-2.1.1/main-aspects-of-the-ishare-trust-framework/operational-provisions","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"09sf7ZCEjRVj4hth63S0","title":"Use cases","pathname":"/version-2.1.1/use-cases","siteSpaceId":"sitesp_V9sMd","description":""},{"id":"SjT9vgL01tjxqyLDujh8","title":"Use case: M2M interaction (with fine-grained authorization)","pathname":"/version-2.1.1/use-cases/use-case-m2m-interaction-with-fine-grained-authorization","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"mKr3y9idDXUBVh4hXNOY","title":"Use case: H2M interaction (with coarse-grained authorization)","pathname":"/version-2.1.1/use-cases/use-case-h2m-interaction-with-coarse-grained-authorization","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"chWFOb2hQpfkcRSmlboV","title":"Use case: portable identity","pathname":"/version-2.1.1/use-cases/use-case-portable-identity","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"vlgsJkbKscG3Pg8kcTnR","title":"Use case: delegation (and management of consent)","pathname":"/version-2.1.1/use-cases/use-case-delegation-and-management-of-consent","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"6FO7kAa0wXf1VBHmFTXq","title":"Detailed descriptions","pathname":"/version-2.1.1/detailed-descriptions","siteSpaceId":"sitesp_V9sMd","description":""},{"id":"atYJOTCArFGKrFDx2O5r","title":"Functional","pathname":"/version-2.1.1/detailed-descriptions/functional","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"Hj4DwcqOAqoyoXxn7mKs","title":"Primary use cases","pathname":"/version-2.1.1/detailed-descriptions/functional/primary-use-cases","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"xZvfZfsV6C5WhYwkce1E","title":"1. M2M service provision","pathname":"/version-2.1.1/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"LhQHQll2vuQw3oZ5A6mr","title":"1b. M2M service provision with the EP as the delegation info PIP","pathname":"/version-2.1.1/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1b.-m2m-service-provision-with-the-ep-as-the-delegation-info-pip","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"btxaIHKfI98EPNRIsURV","title":"1c. M2M service provision with the AR as the delegation info PIP","pathname":"/version-2.1.1/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1c.-m2m-service-provision-with-the-ar-as-the-delegation-info-pip","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"Z91w2KphNd17xXymfYfl","title":"M2M service provision including an app","pathname":"/version-2.1.1/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/m2m-service-provision-including-an-app","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"oUel7659MgQAewyBnhYz","title":"2. H2M service provision with identity info at the IP","pathname":"/version-2.1.1/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"vuPUaLCGJCPoFvR0wmzA","title":"Without Identity Broker","pathname":"/version-2.1.1/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/without-identity-broker","siteSpaceId":"sitesp_V9sMd","description":"This use case would look as follows without an Identity Broker:","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"QJGRLziFLgQLnLiwT97h","title":"With Identity Broker","pathname":"/version-2.1.1/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/with-identity-broker","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"8rJyFqmQaG8uJgyn8WKI","title":"Secondary use cases","pathname":"/version-2.1.1/detailed-descriptions/functional/secondary-use-cases","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"li9isWhscqYMhPPopr6X","title":"Licenses","pathname":"/version-2.1.1/detailed-descriptions/functional/licenses","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"deeqeHjTH5aNLjTJESI3","title":"Delegation paths","pathname":"/version-2.1.1/detailed-descriptions/functional/delegation-paths","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"UaYOqSkwvCVuPGOZQNme","title":"Functional requirements per role","pathname":"/version-2.1.1/detailed-descriptions/functional/functional-requirements-per-role","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"QtUZLLb3eqkpvDaBl1VU","title":"Party identification","pathname":"/version-2.1.1/detailed-descriptions/functional/functional-requirements-per-role/party-identification","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"WK7rTLavwMOn6MPeee4c","title":"User interface requirements","pathname":"/version-2.1.1/detailed-descriptions/functional/functional-requirements-per-role/user-interface-requirements","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"VzUBZFqCURSed1yYSt5d","title":"Technical","pathname":"/version-2.1.1/detailed-descriptions/technical","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"OicbwB9EEGYSjHMnyB2v","title":"Technical standards","pathname":"/version-2.1.1/detailed-descriptions/technical/technical-standards","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"cXPFIU17BOAgwNUSGGwd","title":"Structure of delegation evidence","pathname":"/version-2.1.1/detailed-descriptions/technical/structure-of-delegation-evidence","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"sRoiHmkkNX0swSPBSckC","title":"Example cases","pathname":"/version-2.1.1/detailed-descriptions/technical/structure-of-delegation-evidence/example-cases","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Structure of delegation evidence"}]},{"id":"QrqmstL8JXohDxvH9AvS","title":"Operational","pathname":"/version-2.1.1/detailed-descriptions/operational","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"jtQ6HN74AqbgXN1b22Jt","title":"Operational processes","pathname":"/version-2.1.1/detailed-descriptions/operational/operational-processes","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"G4X8Q3SulToNs7oses0p","title":"Admission","pathname":"/version-2.1.1/detailed-descriptions/operational/operational-processes/admission","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"6v8Q0pGHeYaAwQg14wL2","title":"Withdrawal or Downgrade","pathname":"/version-2.1.1/detailed-descriptions/operational/operational-processes/withdrawal-or-downgrade","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"Epd0ga12lTEfsTEC8Rhp","title":"Warnings, Suspension and Exclusion","pathname":"/version-2.1.1/detailed-descriptions/operational/operational-processes/warnings-suspension-and-exclusion","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"r8MmszgGha4q2iIrbA3A","title":"Incident Management","pathname":"/version-2.1.1/detailed-descriptions/operational/operational-processes/incident-management","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"7LaQy4xE5tS4jfG2sNfh","title":"Change Management","pathname":"/version-2.1.1/detailed-descriptions/operational/operational-processes/change-management","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"HMHDQk2lmL3qNRM6FkU5","title":"Management reporting","pathname":"/version-2.1.1/detailed-descriptions/operational/operational-processes/management-reporting","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"H9AU09UY5lKYt75Kx4N1","title":"Service levels","pathname":"/version-2.1.1/detailed-descriptions/operational/service-levels","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"mqG8eMZ7zfvqB7vPioRA","title":"Service levels for Adhering Parties","pathname":"/version-2.1.1/detailed-descriptions/operational/service-levels/service-levels-for-adhering-parties","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"Nocjx74BqX48RUpylCu5","title":"Service levels for Certified Parties","pathname":"/version-2.1.1/detailed-descriptions/operational/service-levels/service-levels-for-certified-parties-satellite","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"gZHIlEpV4Abj0Rxxx0JK","title":"Communication","pathname":"/version-2.1.1/detailed-descriptions/operational/communication","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"mvJS4LlUd6nrSq9cEdVg","title":"Legal","pathname":"/version-2.1.1/detailed-descriptions/legal","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"eWQndGNTz9lZOgaGvtOD","title":"Legal context","pathname":"/version-2.1.1/detailed-descriptions/legal/legal-context","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"}]},{"id":"9o4Bj5bfHxweuWsiyCVh","title":"Dutch Civil Code","pathname":"/version-2.1.1/detailed-descriptions/legal/legal-context/dutch-civil-code","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"HUsbyXW3NtekgiVd03sN","title":"Regulation on Electronic Identification and Trust Services (eIDAS)","pathname":"/version-2.1.1/detailed-descriptions/legal/legal-context/regulation-on-electronic-identification-and-trust-services-eidas","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"YD5KTD0cefusgXOjmnF3","title":"Applicable competition law","pathname":"/version-2.1.1/detailed-descriptions/legal/legal-context/applicable-competition-law","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"YOrhNrlzHid3vftJVkft","title":"General Data Protection Regulation (GDPR)","pathname":"/version-2.1.1/detailed-descriptions/legal/legal-context/general-data-protection-regulation-gdpr","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"vH6JQsmtBPvQx3Wa98yK","title":"Glossary and legal notices","pathname":"/version-2.1.1/glossary-and-legal-notices","siteSpaceId":"sitesp_V9sMd","description":""},{"id":"3tcXNGccLCNEn1WzuPBG","title":"Glossary","pathname":"/version-2.1.1/glossary-and-legal-notices/glossary","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"5pwceIyZUhr9kEIMVVB7","title":"Legal notices","pathname":"/version-2.1.1/glossary-and-legal-notices/legal-notices","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"Sr9rCMmHeW1zrkHcIltE","title":"Assumptions","pathname":"/version-2.1.1/glossary-and-legal-notices/assumptions","siteSpaceId":"sitesp_V9sMd","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"5KXvYIfEQoDSoTZpbDpB","title":"iSHARE Trust Framework","pathname":"/version-2.1","siteSpaceId":"sitesp_jYyZ3","description":""},{"id":"WD0pfYZt3qbgjDv3gg0T","title":"Introduction","pathname":"/version-2.1/introduction","siteSpaceId":"sitesp_jYyZ3","description":""},{"id":"4CeLgKBczRnSObZ3TQ7T","title":"Goals and scope of the iSHARE Trust Framework","pathname":"/version-2.1/introduction/goals-and-scope-of-the-ishare-trust-framework","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"obhbkYC2LdAj0ICHpSze","title":"Guiding principles","pathname":"/version-2.1/introduction/guiding-principles","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"skAgEDFXpg3aN5VJOOvF","title":"Governance","pathname":"/version-2.1/introduction/governance","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"VNtb1mcNWjvQCVZMBmDR","title":"Releases","pathname":"/version-2.1/releases","siteSpaceId":"sitesp_jYyZ3","description":""},{"id":"wkD8cwbrxNwWMlhNXiKX","title":"Release notes","pathname":"/version-2.1/releases/release-notes","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"ItFtnv0SdvZdrw5VsYF7","title":"Release planning","pathname":"/version-2.1/releases/release-planning","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"TVT9EH3hd9PGhws1Xdn0","title":"Version history","pathname":"/version-2.1/releases/version-history","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Releases"}]},{"id":"FkMjXTwlbdoKYpAVlYQr","title":"Main aspects of the iSHARE Trust Framework","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework","siteSpaceId":"sitesp_jYyZ3","description":""},{"id":"zGRvg8TUmcVOmoQafvCP","title":"Key functionality","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/key-functionality","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"9QKHNhtbNsuQ6rg7SfJe","title":"Support Machine to Machine (M2M) interaction","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/key-functionality/support-machine-to-machine-m2m-interaction","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"gh2OSWgT44R8O9yIPtvY","title":"Support Human to Machine (H2M) interaction","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/key-functionality/support-human-to-machine-h2m-interaction","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"bARlij7ZyMaRiaMAlepg","title":"Facilitate portable identity(s) for parties and humans","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-portable-identity-s-for-parties-and-humans","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"6W7l3bFaqLbfhE0qkXme","title":"Facilitate flexible authorizations, applicable in any context","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-flexible-authorizations-applicable-in-any-context","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"eiIltjeqEeks2xZAx6LH","title":"Enable data exchange based on delegations - even between unknown parties","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-data-exchange-based-on-delegations-even-between-unknown-parties","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"MnJ9WRiCOHmgr4s1eaoS","title":"Enable control over own data through management of consent","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-control-over-own-data-through-management-of-consent","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"FWkLC5xUBNw2WhwRDw1s","title":"Provide a Trust Framework","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/key-functionality/provide-a-trust-framework","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"K4Kc5UnLAMYMc98SIPWC","title":"Technical overview","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/technical-overview","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"5CQOa5jlah7RUIasjwKR","title":"Framework and roles","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/framework-and-roles","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"RijwUqCvVvE12mnuJML8","title":"Legal provisions","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/legal-provisions","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"iEjXo16h211esQ3L4SXZ","title":"Operational provisions","pathname":"/version-2.1/main-aspects-of-the-ishare-trust-framework/operational-provisions","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"IbtMU5Fs97xj74BDie85","title":"Use cases","pathname":"/version-2.1/use-cases","siteSpaceId":"sitesp_jYyZ3","description":""},{"id":"G56SSOVUMWHleK5aCMRi","title":"Use case: M2M interaction (with fine-grained authorization)","pathname":"/version-2.1/use-cases/use-case-m2m-interaction-with-fine-grained-authorization","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"upcRIVynurzmy5XO7uAm","title":"Use case: H2M interaction (with coarse-grained authorization)","pathname":"/version-2.1/use-cases/use-case-h2m-interaction-with-coarse-grained-authorization","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"SJLObIJBLS7hLHzYXrOc","title":"Use case: portable identity","pathname":"/version-2.1/use-cases/use-case-portable-identity","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"ozwMbPX4mL1R9ufvNyxu","title":"Use case: delegation (and management of consent)","pathname":"/version-2.1/use-cases/use-case-delegation-and-management-of-consent","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Use cases"}]},{"id":"riDFreLnEBK9xvov3jMY","title":"Detailed descriptions","pathname":"/version-2.1/detailed-descriptions","siteSpaceId":"sitesp_jYyZ3","description":""},{"id":"TIONIvPhygyliO3MlMt9","title":"Functional","pathname":"/version-2.1/detailed-descriptions/functional","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"vkE7yYiLOgOvHu2SSReL","title":"Primary use cases","pathname":"/version-2.1/detailed-descriptions/functional/primary-use-cases","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"c7oMdMR3wvWtuMBgErw1","title":"1. M2M service provision","pathname":"/version-2.1/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"Dx9k57qH9SrMoWjpmmPJ","title":"1b. M2M service provision with the EP as the delegation info PIP","pathname":"/version-2.1/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1b.-m2m-service-provision-with-the-ep-as-the-delegation-info-pip","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"7tiDb5qh6mPvAMVb4V8v","title":"1c. M2M service provision with the AR as the delegation info PIP","pathname":"/version-2.1/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1c.-m2m-service-provision-with-the-ar-as-the-delegation-info-pip","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"IFnvNTZuhi2LFUY6ySiy","title":"M2M service provision including an app","pathname":"/version-2.1/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/m2m-service-provision-including-an-app","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"KV7K5VS4I5b39K47Ebar","title":"2. H2M service provision with identity info at the IP","pathname":"/version-2.1/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"FveSAIE1eJe9CqiUPa0l","title":"Without Identity Broker","pathname":"/version-2.1/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/without-identity-broker","siteSpaceId":"sitesp_jYyZ3","description":"This use case would look as follows without an Identity Broker:","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"uvuewKLGisPRuENuMT3V","title":"With Identity Broker","pathname":"/version-2.1/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip/with-identity-broker","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"2. H2M service provision with identity info at the IP"}]},{"id":"eRGC0TPqcZCN5cVB4s2n","title":"Secondary use cases","pathname":"/version-2.1/detailed-descriptions/functional/secondary-use-cases","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"5vkx76NgKHpvQXKUBdkd","title":"Licenses","pathname":"/version-2.1/detailed-descriptions/functional/licenses","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"h4nTrfLC2ttyJine6wtU","title":"Delegation paths","pathname":"/version-2.1/detailed-descriptions/functional/delegation-paths","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"eqDeZ4NiYu6uTO32ScrH","title":"Functional requirements per role","pathname":"/version-2.1/detailed-descriptions/functional/functional-requirements-per-role","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"W3g1z0EopOvbrb4GR5Gs","title":"Party identification","pathname":"/version-2.1/detailed-descriptions/functional/functional-requirements-per-role/party-identification","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"nMuacqN6JIfmYbjSwq48","title":"User interface requirements","pathname":"/version-2.1/detailed-descriptions/functional/functional-requirements-per-role/user-interface-requirements","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"cQZ9Vu5tHafBVcSDJ6hu","title":"Technical","pathname":"/version-2.1/detailed-descriptions/technical","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"U7KfxOaWC1FVWSmMh7XM","title":"Technical standards","pathname":"/version-2.1/detailed-descriptions/technical/technical-standards","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"CWb0ByDFDPO49dWsRDLQ","title":"Structure of delegation evidence","pathname":"/version-2.1/detailed-descriptions/technical/structure-of-delegation-evidence","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"pZ4TghCWs6H5X2ejKhU2","title":"Example cases","pathname":"/version-2.1/detailed-descriptions/technical/structure-of-delegation-evidence/example-cases","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Structure of delegation evidence"}]},{"id":"Yui7o9dB26Y5wP0Zia9G","title":"Operational","pathname":"/version-2.1/detailed-descriptions/operational","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"U9vYpR5yhk0XWzbPsArL","title":"Operational processes","pathname":"/version-2.1/detailed-descriptions/operational/operational-processes","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"CfRg1a0UuQDtmSBTUNre","title":"Admission","pathname":"/version-2.1/detailed-descriptions/operational/operational-processes/admission","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"wSpZfsNT9IDUqvMQMafB","title":"Withdrawal or Downgrade","pathname":"/version-2.1/detailed-descriptions/operational/operational-processes/withdrawal-or-downgrade","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"aYp1gb6bt01rmRXXEXZy","title":"Warnings, Suspension and Exclusion","pathname":"/version-2.1/detailed-descriptions/operational/operational-processes/warnings-suspension-and-exclusion","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"qihHsaMXJF9DALI2Z2vW","title":"Incident Management","pathname":"/version-2.1/detailed-descriptions/operational/operational-processes/incident-management","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"rUwIqqWNt7JmG5BuhTwS","title":"Change Management","pathname":"/version-2.1/detailed-descriptions/operational/operational-processes/change-management","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"afcqSvvfX7AcNJJb1Vqr","title":"Management reporting","pathname":"/version-2.1/detailed-descriptions/operational/operational-processes/management-reporting","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"lBQRUTdDrtTHawRhBFNi","title":"Service levels","pathname":"/version-2.1/detailed-descriptions/operational/service-levels","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"Gz4Ui2wMXY3kPHuWOMRY","title":"Service levels for Adhering Parties","pathname":"/version-2.1/detailed-descriptions/operational/service-levels/service-levels-for-adhering-parties","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"NmyDj2cxS5UAdPUjnNPI","title":"Service levels for Certified Parties","pathname":"/version-2.1/detailed-descriptions/operational/service-levels/service-levels-for-certified-parties-satellite","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"zkVT6rUTqfYOjjZnB4MQ","title":"Communication","pathname":"/version-2.1/detailed-descriptions/operational/communication","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"VVkLFDs3CC7IWchGvBqv","title":"Legal","pathname":"/version-2.1/detailed-descriptions/legal","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"}]},{"id":"QtXxteNiQP2GSdKp5jzJ","title":"Legal context","pathname":"/version-2.1/detailed-descriptions/legal/legal-context","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"}]},{"id":"O6xi2xDcMFvjTWuH4yqC","title":"Dutch Civil Code","pathname":"/version-2.1/detailed-descriptions/legal/legal-context/dutch-civil-code","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"JwqtsCSPaensPOt9Sb6K","title":"Regulation on Electronic Identification and Trust Services (eIDAS)","pathname":"/version-2.1/detailed-descriptions/legal/legal-context/regulation-on-electronic-identification-and-trust-services-eidas","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"TyKvpdh0A3vrLxk2Tv2u","title":"Applicable competition law","pathname":"/version-2.1/detailed-descriptions/legal/legal-context/applicable-competition-law","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"pJRc71P2hk2GSnujc5Xe","title":"General Data Protection Regulation (GDPR)","pathname":"/version-2.1/detailed-descriptions/legal/legal-context/general-data-protection-regulation-gdpr","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"ESQG87lqwgBsKxGudNxA","title":"Glossary and legal notices","pathname":"/version-2.1/glossary-and-legal-notices","siteSpaceId":"sitesp_jYyZ3","description":""},{"id":"1zBd0AjWvVFIzVnwRrqf","title":"Glossary","pathname":"/version-2.1/glossary-and-legal-notices/glossary","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"DP6VJDYIZzxe6naj3yK3","title":"Legal notices","pathname":"/version-2.1/glossary-and-legal-notices/legal-notices","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"QQcnCsIbf345uv8lQsau","title":"Assumptions","pathname":"/version-2.1/glossary-and-legal-notices/assumptions","siteSpaceId":"sitesp_jYyZ3","description":"","breadcrumbs":[{"label":"Glossary and legal notices"}]},{"id":"sX8Di8JcLcOq7XjnQmvc","title":"iSHARE Trust Framework","pathname":"/version-2.0.1","siteSpaceId":"sitesp_RHAkD","description":""},{"id":"YQQjjuJYvzw0M5ZBTyUS","title":"Introduction","pathname":"/version-2.0.1/readme/introduction","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"}]},{"id":"I5rLB0WcHWEVcAn3QCl7","title":"Goals and scope of the iSHARE Trust Framework","pathname":"/version-2.0.1/readme/introduction/goals-and-scope-of-the-ishare-trust-framework","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Introduction"}]},{"id":"BDaTWHj8u3NyX1b8Eq8g","title":"Guiding principles","pathname":"/version-2.0.1/readme/introduction/guiding-principles","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Introduction"}]},{"id":"8oBOdTV8xBCzNM0AjxAh","title":"Governance","pathname":"/version-2.0.1/readme/introduction/governance","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Introduction"}]},{"id":"VkBhrbBwFF9ItTV2JpsC","title":"Releases","pathname":"/version-2.0.1/readme/releases","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"}]},{"id":"2cyQ1VRxEIGGINYi9E9q","title":"Release notes","pathname":"/version-2.0.1/readme/releases/release-notes","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Releases"}]},{"id":"YyxyZ7eafahF4hacQB1m","title":"Release planning","pathname":"/version-2.0.1/readme/releases/release-planning","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Releases"}]},{"id":"8I4suuSuFQEiCfYzVmlo","title":"Version history","pathname":"/version-2.0.1/readme/releases/version-history","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Releases"}]},{"id":"RGMul7d2nysmVYQbfsSC","title":"Main aspects of the iSHARE Trust Framework","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"}]},{"id":"ZuCSMF0t1BDYEtPz8wo7","title":"Key functionality","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/key-functionality","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"jLsVLa5au3dlkUvVbiyd","title":"Support Machine to Machine (M2M) interaction","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/key-functionality/support-machine-to-machine-m2m-interaction","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"dVeNtBHaROaMdoFema2g","title":"Support Human to Machine (H2M) interaction","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/key-functionality/support-human-to-machine-h2m-interaction","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"nWUO1YAQKKZGbEBJ1MSv","title":"Facilitate portable identity(s) for parties and humans","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-portable-identity-s-for-parties-and-humans","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"K0Wh2b732jjpXGTvt8JA","title":"Facilitate flexible authorizations, applicable in any context","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/key-functionality/facilitate-flexible-authorizations-applicable-in-any-context","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"sgHfh3A3fL2AX6kDQzR0","title":"Enable data exchange based on delegations - even between unknown parties","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-data-exchange-based-on-delegations-even-between-unknown-parties","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"oc3KitlUWoGp1O2ypBII","title":"Enable control over own data through management of consent","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/key-functionality/enable-control-over-own-data-through-management-of-consent","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"OLrPRVw1AVDEJN8DD8Cm","title":"Provide a Trust Framework","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/key-functionality/provide-a-trust-framework","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"},{"label":"Key functionality"}]},{"id":"PHNC1qYvD6J6jHtKWVhu","title":"Technical overview","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/technical-overview","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"e3yERNXX3snODTAWf0wx","title":"Framework and roles","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/framework-and-roles","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"PXL4QU9YXhiVnDNfJvsw","title":"Legal provisions","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/legal-provisions","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"v2MYIcM11MA7QURJw24C","title":"Operational provisions","pathname":"/version-2.0.1/readme/main-aspects-of-the-ishare-trust-framework/operational-provisions","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Main aspects of the iSHARE Trust Framework"}]},{"id":"awhK7ZL5w3vf5w0kuoCp","title":"Use cases","pathname":"/version-2.0.1/readme/use-cases","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"}]},{"id":"oB5QnTVGiXVJJizrsw7l","title":"Use case: M2M interaction (with fine-grained authorization)","pathname":"/version-2.0.1/readme/use-cases/use-case-m2m-interaction-with-fine-grained-authorization","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Use cases"}]},{"id":"vrqVr2Pdv9GeBgybcJu0","title":"Use case: H2M interaction (with coarse-grained authorization)","pathname":"/version-2.0.1/readme/use-cases/use-case-h2m-interaction-with-coarse-grained-authorization","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Use cases"}]},{"id":"U1gqzJFKtbavF12fzV27","title":"Use case: portable identity","pathname":"/version-2.0.1/readme/use-cases/use-case-portable-identity","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Use cases"}]},{"id":"D8uSzBn3zJsrC7ITTMXV","title":"Use case: delegation (and management of consent)","pathname":"/version-2.0.1/readme/use-cases/use-case-delegation-and-management-of-consent","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Use cases"}]},{"id":"nwWYYPzbgA8IJ16CrN9j","title":"Detailed descriptions","pathname":"/version-2.0.1/readme/detailed-descriptions","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"}]},{"id":"EUKOrBDhyA6b0QCIi75x","title":"Functional","pathname":"/version-2.0.1/readme/detailed-descriptions/functional","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"}]},{"id":"f14zkkdh9gfVbc0fdP5i","title":"Primary use cases","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/primary-use-cases","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"901emZomdqR1IkceS4Lr","title":"1. M2M service provision","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"JkUt1yud9Z0a8PJcDzB4","title":"1b. M2M service provision with the EP as the delegation info PIP","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1b.-m2m-service-provision-with-the-ep-as-the-delegation-info-pip","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"lO71WJElPhBca4fXax80","title":"1c. M2M service provision with the AR as the delegation info PIP","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/1c.-m2m-service-provision-with-the-ar-as-the-delegation-info-pip","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"8iPbv9cNlA0SHjdzqOz8","title":"M2M service provision including an app","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/primary-use-cases/1.-m2m-service-provision/m2m-service-provision-including-an-app","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"},{"label":"1. M2M service provision"}]},{"id":"3kPJXhnIWOEG7lPwab7L","title":"2. H2M service provision with identity info at the SP","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/primary-use-cases/2.-h2m-service-provision-with-identity-info-at-the-sp","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"hHS6ZM5pf0G3OWorF4N4","title":"3. H2M service provision with identity info at the IP","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/primary-use-cases/3.-h2m-service-provision-with-identity-info-at-the-ip","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Primary use cases"}]},{"id":"xBFAEquYenuaYC5qtU4y","title":"Secondary use cases","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/secondary-use-cases","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"VpykMU9Pv6VeK0pVyRtx","title":"Licenses","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/licenses","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"BuNQokMLVnC7fsa8oAKw","title":"Delegation paths","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/delegation-paths","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"G2R4MzzHT3TxfFzGBncG","title":"Functional requirements per role","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/functional-requirements-per-role","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"}]},{"id":"fPJKYzsl19rOY0LtaOjo","title":"Identification by EORI","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/functional-requirements-per-role/identification-by-eori","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"lj7qMjS2QpaGLcI0TPdS","title":"User interface requirements","pathname":"/version-2.0.1/readme/detailed-descriptions/functional/functional-requirements-per-role/user-interface-requirements","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Functional"},{"label":"Functional requirements per role"}]},{"id":"4XgnT3VYeSgKbGQ2DA9q","title":"Technical","pathname":"/version-2.0.1/readme/detailed-descriptions/technical","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"}]},{"id":"1BkHj5wHR3mMKLM837bR","title":"Generic technical standards","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"6K11d3hY1qUL6Q5zef7V","title":"Caching","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards/caching","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Generic technical standards"}]},{"id":"PdGMwkFJJQYNkgDTG2nW","title":"HTTP response codes","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards/http-response-codes","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Generic technical standards"}]},{"id":"mLIPEPtKJwfx9DerIb8i","title":"JSON Web Token (JWT)","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards/json-web-token-jwt","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Generic technical standards"}]},{"id":"j2OIlCwsOpVRtAQIUioq","title":"OAuth 2.0","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards/oauth-2.0","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Generic technical standards"}]},{"id":"fltDIVtzl5zFbHjmKR2k","title":"OpenID Connect 1.0","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards/openid-connect-1.0","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Generic technical standards"}]},{"id":"Ii94II0T9yemPBLJqW0E","title":"PKI","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards/pki","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Generic technical standards"}]},{"id":"QPNU9FwqUTwAOIJ6W0Cl","title":"TLS","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards/tls","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Generic technical standards"}]},{"id":"OkNeb2zCmNEvNVZqdcYe","title":"XACML 3.0","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/generic-technical-standards/xacml-3.0","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Generic technical standards"}]},{"id":"Y8Un2JQZTOT8b693x7Md","title":"Structure of delegation evidence","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/structure-of-delegation-evidence","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"}]},{"id":"UCyf35o2Go5Yj8JDxG4Z","title":"Example cases","pathname":"/version-2.0.1/readme/detailed-descriptions/technical/structure-of-delegation-evidence/example-cases","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Technical"},{"label":"Structure of delegation evidence"}]},{"id":"z0sWT0YjdqLvCEUZlF8d","title":"Operational","pathname":"/version-2.0.1/readme/detailed-descriptions/operational","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"}]},{"id":"w9WYE6ZOHWzrKAwVyMMe","title":"Operational processes","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/operational-processes","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"S4hPrW4H7AVCN4cx6Sfr","title":"Admission","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/operational-processes/admission","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"dqQFcJrVTmOKUemM1nbo","title":"Withdrawal or Downgrade","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/operational-processes/withdrawal-or-downgrade","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"zNCT6RzLMo0j72tVlJYB","title":"Warnings, Suspension and Exclusion","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/operational-processes/warnings-suspension-and-exclusion","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"tEYcm2kupWbaPW74vUda","title":"Incident Management","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/operational-processes/incident-management","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"SiKgXmTlNVybplRUPXTK","title":"Change Management","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/operational-processes/change-management","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"H1KTsKGtje8U3Jh2IF6b","title":"Management reporting","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/operational-processes/management-reporting","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Operational processes"}]},{"id":"h3lbIVAiP9kO6sDLZ6R2","title":"Service levels","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/service-levels","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"iE63CzUJo7FL56sKHB3r","title":"Service levels for Adhering Parties","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/service-levels/service-levels-for-adhering-parties","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"j5J8pQSTDfHdwMQxiclR","title":"Service levels for Certified Parties/Satellite","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/service-levels/service-levels-for-certified-parties-satellite","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"},{"label":"Service levels"}]},{"id":"OQ6MSG3j0RRA8jZgU4pc","title":"Communication","pathname":"/version-2.0.1/readme/detailed-descriptions/operational/communication","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Operational"}]},{"id":"2mfm4VfZeg3Dh5tocnb7","title":"Legal","pathname":"/version-2.0.1/readme/detailed-descriptions/legal","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"}]},{"id":"SBGPrOf5hgFHj3h50dTV","title":"Legal context","pathname":"/version-2.0.1/readme/detailed-descriptions/legal/legal-context","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Legal"}]},{"id":"Vh3LkCw8wioYUWjuWapS","title":"Dutch Civil Code","pathname":"/version-2.0.1/readme/detailed-descriptions/legal/legal-context/dutch-civil-code","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"VeM2FIxZjLioRDAelNJW","title":"Regulation on Electronic Identification and Trust Services (eIDAS)","pathname":"/version-2.0.1/readme/detailed-descriptions/legal/legal-context/regulation-on-electronic-identification-and-trust-services-eidas","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"Yu3rDnbEu8XHKMhfZxDt","title":"Applicable competition law","pathname":"/version-2.0.1/readme/detailed-descriptions/legal/legal-context/applicable-competition-law","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"GHrlAdF2jLvRoFImga94","title":"General Data Protection Regulation (GDPR)","pathname":"/version-2.0.1/readme/detailed-descriptions/legal/legal-context/general-data-protection-regulation-gdpr","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Detailed descriptions"},{"label":"Legal"},{"label":"Legal context"}]},{"id":"VEDLae8j0hxSXBYXE9qE","title":"Glossary and legal notices","pathname":"/version-2.0.1/readme/glossary-and-legal-notices","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"}]},{"id":"En9j56DspJD9efB1VkWF","title":"Glossary","pathname":"/version-2.0.1/readme/glossary-and-legal-notices/glossary","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Glossary and legal notices"}]},{"id":"mQoV6fqupA9vCcCKyzte","title":"Legal notices","pathname":"/version-2.0.1/readme/glossary-and-legal-notices/legal-notices","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Glossary and legal notices"}]},{"id":"LkraKfO9NrPdzr9T82xo","title":"Assumptions","pathname":"/version-2.0.1/readme/glossary-and-legal-notices/assumptions","siteSpaceId":"sitesp_RHAkD","description":"","breadcrumbs":[{"label":"iSHARE Trust Framework"},{"label":"Glossary and legal notices"}]}]}