Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note that this use case is exactly the same as the old use case 4B

Roles 



Delegation info PIP
No delegationService ProviderEntitled PartyAuthorisation Reg

Auth info PIP

Service Provider33a3b3c

Entitled Party

3.13a.13b.13b.1
Authorisation Reg3.23a.23b.23b.2
Identity Provider*3.33a.33b.33c.3

*The Identity Provider cannot hold explicit authorisation info, but it can hold info about a Human Service Consumer's identity that implies authorisation - i.e. 'working for truck company X'

...

  • The Service Provider has and manages its own authorisation information entitlement information indicating what Entitled Parties are entitled to what (parts of) services*
  • The Entitled Party has and manages its own authorisation information indicating which Human Service Consumers are authorised to act on its behalf**
  • The Entitled Party registers the authorisation information at the Service Provider
  • The Human Service Consumer is able to authenticate the Service Provider
  • The Service Provider is able to authenticate the Human Service Consumer
  • The Identity Provider is able to authenticate the Service Provider
  • The Service Provider is able to authenticate the Identity Provider 
  • The Human Service Consumer has been issued identity credentials by the Identity Provider
     
  • In this use case the Entitled Party acts as Human Service Consumer

...

  1. The Human Service Consumer requests a service from the Service Provider
  2. The Service Provider requests a login from the Identity Provider
  3. The Identity Provider authenticates the Human Service Consumer 
  4. The Identity Provider issues an identity assertion to the Service Provider
  5. The Service Provider validates the identity assertion through the following steps:
    1. The Service Provider authenticates the Identity Provider and validates it as an iSHARE certified party
  6. The Service Provider authenticates the Human Service Consumer based on the validity of the identity assertion
  7. The Service Provider authorises the Human Service Consumer based on the authorisation information entitlement information registered with the Service Provider
  8. The Service Provider executes the requested service 
  9. The Service Provider provides the service result to the Service Consumer

...