This use case showcases iSHARE Trust Framework's key functionality 'support Human to Machine (H2M) interaction'.

The example described in the linked chapter is as follows:

To showcase the key functionality 'facilitate flexible authorizations', Party A's ERP system (machine) is allowed to request ANY information about ANY (part of a) bill of lading. This can be considered a coarse-grained authorization. 

The following explains this example in detail, utilising the iSHARE Trust Framework.

Roles and Relations

The following roles are fulfilled in this use case:


The only legal relation is the mandatory relation between the Entitled Party (Party A) and the Service Provider (Party B), which establishes the entitlements of the Entitled Party (Party A). As depicted:

 

Prerequisites

It is prerequisite of this use case that:


Use case

The use case consists of the following steps:

  1. The Human Service Consumer (Human X) requests a service from the Service Provider (Party B);
  2. The Service Provider (Party B) authenticates the Human Service Consumer (Human X), and validates the iSHARE adherence of the Service Consumer (Party A);
  3. The Service Provider (Party B) authorizes the Human Service Consumer (Human X) of the Service Consumer (Party A) based on the entitlement- and authorization information registered with the Service Provider (Party B);
  4. The Service Provider (Party B) executes the requested service;
  5. The Service Provider (Party B) provides the service result to the Human Service Consumer (Human X).


As depicted:

 


Note that this use case is exactly the same as primary use case 2, as found under detailed Functional descriptions.

Sequence diagram


What needs to be implemented technically for this use case is described generically, and specifically per role in the iSHARE Developer Portal.