Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In use case 3, a service is provided by the Service Provider to the Human Service Consumer. Identity info is held at the Identity Provider.

Roles 

Delegation?NoYes
Delegation info PIPN/AService ProviderEntitled PartyAuthorisation Reg
Auth info 2 PIP:



Service Provider33a3b3c

Entitled Party

3.13a.13b.13b.1
Authorisation Reg3.23a.23b.23b.2
Identity Provider*3.33a.33b.33c.3


As there is no delegation, the Entitled Party acts as Human Service Consumer

Depiction

Image RemovedImage Added

Description

It is prerequisite of this use case that:

...

The use case consists of the following steps:

  1. The Human Service Consumer requests a service from the Service Provider
  2. The Service Provider requests a login from the Identity Provider
  3. The Identity Provider authenticates the Human Service Consumer 
  4. The Identity Provider issues an identity assertion to the Service Provider
  5. The Human Service Consumer requests a service from the Service Provider, including its identity assertionThe Service Provider validates the identity assertion through the following steps:
    1. The Service Provider authenticates the Identity Provider and validates it as an iSHARE certified party
  6. The Service Provider authenticates the Human Service Consumer based on the validity of the identity assertion
  7. The Service Provider authorises the Human Service Consumer based on the authorisation information registered with the Service Provider
  8. The Service Provider executes the requested service 
  9. The Service Provider provides the service result to the Service Consumer

...

All Functional working group-members are invited to add practical examples of this use case in the comment section.

Sequence diagram

Image RemovedImage Added