In use case 3, a service is provided by the Service Provider to the Human Service Consumer. Identity info is held at the Identity Provider.
Roles
| Delegation info PIP |
No delegation | Service Provider | Entitled Party | Authorisation Reg |
Auth info PIP | Service Provider | 3 | 3a | 3b | 3c |
Entitled Party | 3.1 | 3a.1 | 3b.1 | |
Authorisation Reg | 3.2 | 3a.2 | 3b.2 | 3c.2 |
Identity Provider* | 3.3 | 3a.3 | 3b.3 | 3c.3 |
*The Identity Provider cannot hold explicit authorisation info, but it can hold info about a Human Service Consumer's identity that implies authorisation - i.e. 'working for truck company X'
As no delegation takes place, the legal entity fulfilling the Entitled Party-role also fulfils the Service Consumer-role.
Note that an Identity Broker is introduced to broker the relation between the Service Provider and the Identity Provider(s) and/or the Service Provider and the Authorisation Registry(s). This is optional and useful in situations with several Identity Providers and/or Authorisation Registries.
Depiction
Legal relations

Prerequisite registration

Use case interaction
Description
It is prerequisite of this use case that:
*The Service Provider can outsource this function to a third party
**The Entitled Party can outsource this function to a third party
The use case consists of the following steps:
- The Human Service Consumer requests a service from the Service Provider;
- The Service Provider requests a login from the Identity Broker;
- The Identity Broker asks the Human Service Consumer to select his Identity Provider;
- The Identity Broker requests a login from the Identity Provider;
- The Identity Provider authenticates the Human Service Consumer;
- The Identity Provider issues an identity assertion for the Service Provider to the Identity Broker;
- The Identity Broker forwards the identity assertion to the Service Provider;
- The Service Provider validates the identity assertion through the following steps:
- The Service Provider authenticates the Identity Broker and validates its iSHARE certification;
- The Service Provider authenticates the Identity Provider and validates its iSHARE certification.
- The Service Provider authenticates the Human Service Consumer based on the validity of the identity assertion, and validates the iSHARE adherence of the Service Consumer;
- The Service Provider authorises the Human Service Consumer of the Service Consumer based on the authorisation information registered with the Service Provider;
- The Service Provider executes the requested service;
- The Service Provider provides the service result to the Human Service Consumer.
Sequence diagram

This use case would look as follows without an Identity Broker:
Depiction without Identity Broker
Legal view

Prerequisite registration

Interaction

Description without Identity Broker
It is prerequisite of this use case that:
*The Service Provider can outsource this function to a third party
**The Service Consumer can outsource this function to a third party
The use case consists of the following steps:
- The Human Service Consumer requests a service from the Service Provider;
- The Service Provider requests a login from the Identity Provider;
- The Identity Provider authenticates the Human Service Consumer;
- The Identity Provider issues an identity assertion to the Service Provider;
- The Service Provider validates the identity assertion through the following steps:
- The Service Provider authenticates the Identity Provider and validates its iSHARE certification.
- The Service Provider authenticates the Human Service Consumer based on the validity of the identity assertion, and validates the iSHARE adherence of the Service Consumer;
- The Service Provider authorises the Human Service Consumer of the Service Consumer based on the entitlement information registered with the Service Provider;
- The Service Provider executes the requested service;
- The Service Provider provides the service result to the Human Service Consumer.
Sequence diagram without Identity Broker
