This section details iSHARE's functionality.
The use cases depicted in earlier chapters are only a selection of iSHARE's full use case scope. This scope is based on three 'primary' use cases:
- Machine to Machine service provision;
- Human to Machine service provision with authorization and identity info held at the Service Provider;
- Human to Machine service provision with identity info held at the Identity Provider.
These primary use cases have several 'derived' use cases which cover all possible uses.
The primary use cases are supported by 'secondary' use cases, that include processes related to registration, and processes that recur in primary use cases. This section is concluded by functional requirements - those per role in the scheme and those to the iSHARE user interface in H2M use cases.