/
Key functionality
Key functionality
Content has been moved
This content has been moved. Please find the content here.
, multiple selections available,
Related content
Governance
Governance
Read with this
Enable data exchange based on delegations - even between unknown parties
Enable data exchange based on delegations - even between unknown parties
Read with this
Facilitate flexible authorizations, applicable in any context
Facilitate flexible authorizations, applicable in any context
Read with this
Use case: M2M interaction (with fine-grained authorization)
Use case: M2M interaction (with fine-grained authorization)
Read with this
Support Machine to Machine (M2M) interaction
Support Machine to Machine (M2M) interaction
Read with this
Use case: portable identity
Use case: portable identity
Read with this