This use case showcases iSHARE Trust Framework's key functionality 'facilitate portable identity(s) for parties and humans'.

The example described in the linked chapter is as follows:

Human X will now use its Identity Provider Y credentials to request a status update from the ERP system (machine) of Party B.

The following explains this example in detail, utilising the iSHARE Trust Framework. 

Roles and Relations

The following roles are fulfilled in this use case:

Legal relations

As depicted:

 

Prerequisites 

It is prerequisite of this use case that:


The prerequisites in bold are depicted as follows:

 

Use case

The use case consists of the following steps:

  1. The Human Service Consumer (Human X) requests a service from the Service Provider (Party B);
  2. The Service Provider (Party B) requests a login from the Identity Broker (Z);
  3. The Identity Broker (Z) asks the Human Service Consumer (Human X) to select his Identity Provider (Y);
  4. The Identity Broker (Z) requests a login from the Identity Provider (Y);
  5. The Identity Provider (Y) authenticates the Human Service Consumer (Human X) (on the basis of Human X's credentials);
  6. The Identity Provider (Y) issues an identity assertion and authorization assertion for the Service Provider (Party B) to the Identity Broker (Z);
  7. The Identity Broker (Z) forwards the identity assertion and authorization assertion to the Service Provider (Party B);
  8. The Service Provider (Party B) validates the identity assertion and authorization assertion through the following steps:
    1. The Service Provider (Party B) authenticates the Identity Broker (Z) and validates its iSHARE certification;
    2. The Service Provider (Party B) authenticates the Identity Provider (Y) and validates its iSHARE certification.
  9. The Service Provider (Party B) authenticates the Human Service Consumer (Human X) based on the validity of the identity assertion, and validates the iSHARE adherence of the Service Consumer (Party A);
  10. The Service Provider (Party B) authorizes the Human Service Consumer (Human X) of the Service Consumer (Party A) based on the authorization assertion and the entitlement information registered with the Service Provider (Party B);
  11. The Service Provider (Party B) executes the requested service;
  12. The Service Provider (Party B) provides the service result to the Human Service Consumer (Human X).


As depicted:

  



Note that this use case is exactly the same as primary use case 3, as found under detailed Functional descriptions. In this section, the same use case is also explained without an Identity Broker.

Sequence diagram


What needs to be implemented technically for this use case is described generically, and specifically per role in the iSHARE Developer Portal.