...
- The Human Service Consumer requests a service from the Service Provider;
- The Service Provider requests a login from the Identity Broker;
- The Identity Broker asks the Human Service Consumer to select his Identity Provider;
- The Identity Broker requests a login from the Identity Provider;
- The Identity Provider authenticates the Human Service Consumer;
- The Identity Provider issues an identity assertion and authorization assertion for the Service Provider to the Identity Broker;
- The Identity Broker forwards the identity assertion and authorization assertion to the Service Provider;
- The Service Provider validates the identity assertion and authorization assertion through the following steps:
- The Service Provider authenticates the Identity Broker and validates its iSHARE certification;
- The Service Provider authenticates the Identity Provider and validates its iSHARE certification.
- The Service Provider authenticates the Human Service Consumer based on the validity of the identity assertion, and validates the iSHARE adherence of the Service Consumer;
- The Service Provider authorizes the Human Service Consumer of the Service Consumer based on the authorization assertion and the entitlement information registered with the Service Provider;
- The Service Provider executes the requested service;
- The Service Provider provides the service result to the Human Service Consumer.
...