This section details the Trust Framework's functionality.
The use cases depicted in earlier chapters are only a selection of iSHARE Trust Framework's full use case scope. This scope is based on three 'primary' use cases:
- Machine to Machine service provision;
- Human to Machine service provision with authorization and identity info held at the Service Provider;
- Human to Machine service provision with identity info held at the Identity Provider.
These primary use cases have several 'derived' use cases which cover all possible uses.
...
Note | ||
---|---|---|
| ||
This content has been moved. Please find the content here. |