This use case showcases iSHARE Trust Framework's key functionality 'enable data exchange based on delegations - even between unknown parties'.

The example described in the linked chapter is as follows:

The following explains this example in detail, utilising the iSHARE Trust Framework.

After explanation of the delegation use case, a scenario is introduced that showcases key functionality 'enable control over own data through management of consent'. In this Use case: delegation (and management of consent)#Alternative scenario on management of consent, Party C decides to revoke Party A's access to requesting a time slot.

Roles and Relations

The following roles are fulfilled in this use case:

Legal relations


As depicted:

 

Prerequisites 

It is prerequisite of this use case that:

The prerequisites in bold are depicted as follows:

 

Use case

The use case consists of the following steps:

  1. The Machine Service Consumer (of Trucking Company B) requests a service from the Service Provider (Party C);
  2. The Service Provider (Party C) authenticates the Machine Service Consumer (of Trucking Company B) and validates the iSHARE adherence of the Service Consumer (Trucking Company B);

  3. The Service Provider (Party C) requests delegation evidence from the Authorization Registry (D);
  4. The Authorization Registry (D) authenticates the Service Provider (Party C) and validates its iSHARE adherence;
  5. The Authorization Registry (D) authorizes the Service Provider (Party C) based on the scheme agreements for providing delegation information;
  6. The Authorization Registry (D) provides the delegation evidence;
  7. The Service Provider (Party C) validates the received delegation evidence through the following steps:
    1. The Service Provider (Party C) authenticates the Authorization Registry (D) and validates its iSHARE certification;
    2. The Service Provider (Party C) authorizes the Entitled Party (Party A) based on the entitlement information registered with the Service Provider (Party C), and validates its iSHARE adherence.
  8. The Service Provider (Party C) authorizes the Machine Service Consumer of the Service Consumer (Trucking Company B) based on the validity of the delegation evidence;
  9. The Service Provider (Party C) executes the requested service;
  10. The Service Provider (Party C) provides the service result to the Machine Service Consumer (of Trucking Company B).


As depicted:

 


Note that this use case is exactly the same as derived use case 1c, as found under detailed Functional descriptions. This section also includes delegation use cases with delegation information held by other roles than an Authorization Registry.

Sequence diagram

Alternative scenario on management of consent

This alternative scenario showcases key functionality 'enable control over own data through management of consent'.

The example detailed in the above is as follows:

Now imagine:

Prerequisites 

To the prerequisites, ONLY the following changes:

Use case

The alternative use case consists of the following steps, with changes to the above use case in bold:

  1. The Machine Service Consumer (of Trucking Company B) requests a service from the Service Provider (Party C);
  2. The Service Provider (Party C) authenticates the Machine Service Consumer (of Trucking Company B) and validates the iSHARE adherence of the Service Consumer (Trucking Company B);

  3. The Service Provider (Party C) requests delegation evidence from the Authorization Registry (D);
  4. The Authorization Registry (D) authenticates the Service Provider (Party C) and validates its iSHARE adherence;
  5. The Authorization Registry (D) authorizes the Service Provider (Party C) based on the scheme agreements for providing delegation information;
  6. The Authorization Registry (D) provides the delegation evidence;
  7. The Service Provider (Party C) validates the received delegation evidence through the following steps:
    1. The Service Provider (Party C) authenticates the Authorization Registry (D) and validates its iSHARE certification;
    2. The Service Provider (Party C) CANNOT authorize the Entitled Party (Party A) based on the entitlement information registered with the Service Provider (Party C)
  8. The Service Provider (Party C) CANNOT authorize the Machine Service Consumer of the Service Consumer (Trucking Company B) based on the validity of the delegation evidence;
  9. The Service Provider (Party C) communicates an access forbidden message to the Machine Service Consumer (of Trucking Company B).

Sequence diagram


What needs to be implemented technically for this use case (and the alternative scenario) is described generically, and specifically per role in the iSHARE Developer Portal.