Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In use case 3, a service is provided by the Service Provider to the Human Service Consumer. Identity info is held at the Identity Provider.

Note that this use case is exactly the same as the old use case 4B

Roles 



Delegation info PIP
No delegationService ProviderEntitled PartyAuthorisation Reg

Auth info PIP

Service Provider33a3b3c

Entitled Party

3.13a.13b.13c.1
Authorisation Reg3.23a.23b.23c.2
Identity Provider*3.33a.33b.33c.3

...

  1. The Human Service Consumer requests a service from the Service Provider
  2. The Service Provider requests a login from the Identity Provider
  3. The Identity Provider authenticates the Human Service Consumer 
  4. The Identity Provider issues an identity assertion to the Service Provider
  5. The Service Provider validates the identity assertion through the following steps:
    1. The Service Provider authenticates the Identity Provider and validates it as an iSHARE certified party
  6. The Service Provider authenticates the Human Service Consumer based on the validity of the identity assertion
  7. The Service Provider authorises the Human Service Consumer based on the entitlement information registered with the Service Provider
  8. The Service Provider executes the requested service 
  9. The Service Provider provides the service result to the Service Consumer

Practical examples

...

Sequence diagram


Note that an Identity Broker can be introduced to broker the relation between the Service Provider and the Identity Provider(s) and/or the Service Provider and the Authorisation Registry(s). This is optional and useful in situations with several Identity Providers and/or Authorisation Registries. This use case would look as follows with a Service Broker:

...