This chapter builds on the iSHARE frameworkTrust Framework to showcase the scheme's the key functionalities in four use cases:
- Use case: M2M interaction (with fine-grained authorisation) showcases:
- Use case: H2M interaction (with coarse-grained authorisation) showcases:
- Use case: portable identity showcases:
- Use case: delegation (and management of consent) showcases:
...
The depicted use cases are only a selection of iSHARE Trust Framework's use case scope. For the full scope, please refer to the detailed Functional descriptions.