In use case 3, a service is provided by the Service Provider to the Human Service Consumer. Identity info is held at the Identity Provider.
Roles
Delegation? | No | Yes | ||
Delegation info PIP | N/A | Service Provider | Entitled Party | Authorisation Reg |
Auth info 2 PIP: | ||||
Service Provider | 3 | 3a | 3b | 3c |
Entitled Party | 3.1 | 3a.1 | 3b.1 | 3b.1 |
Authorisation Reg | 3.2 | 3a.2 | 3b.2 | 3b.2 |
Identity Provider* | 3.3 | 3a.3 | 3b.3 | 3c.3 |
As there is no delegation, the Entitled Party acts as Human Service Consumer
Depiction
Description
It is prerequisite of this use case that:
...
The use case consists of the following steps:
- The Human Service Consumer requests a service from the Service Provider
- The Service Provider requests a login from the Identity Provider
- The Identity Provider authenticates the Human Service Consumer
- The Identity Provider issues an identity assertion to the Service Provider
- The Human Service Consumer requests a service from the Service Provider, including its identity assertionThe Service Provider validates the identity assertion through the following steps:
- The Service Provider authenticates the Identity Provider and validates it as an iSHARE certified party
- The Service Provider authenticates the Human Service Consumer based on the validity of the identity assertion
- The Service Provider authorises the Human Service Consumer based on the authorisation information registered with the Service Provider
- The Service Provider executes the requested service
- The Service Provider provides the service result to the Service Consumer
...
All Functional working group-members are invited to add practical examples of this use case in the comment section.