Spaces
Apps
Templates
Create
iSHARE Trust Framework
All content
Space settings
Content
Results will update as you type.
iSHARE Trust Framework
Introduction
Releases
Main aspects of the iSHARE Trust Framework
Use cases
•
Use case: M2M interaction (with fine-grained authorization)
•
Use case: H2M interaction (with coarse-grained authorization)
•
Use case: portable identity
•
Use case: delegation (and management of consent)
Detailed descriptions
Glossary and legal notices
Blogs
iSHARE Trust Framework
/
/
Use cases
/
Use case: H2M interaction (with coarse-grained authorization)
Summarize
Use case: H2M interaction (with coarse-grained authorization)
Gerard van der Hoeven
Pieter Nijs (Unlicensed)
Vinith Bhandari
+3
Owned by
Gerard van der Hoeven
Last updated:
Jul 03, 2024
by
Vinith Bhandari
Loading data...
Content has been moved
This content has been moved. Please find the content
here
.
Related pages
Info icon
Collapse
Use case: M2M interaction (with fine-grained authorization)
Use case: M2M interaction (with fine-grained authorization)
iSHARE Trust Framework
Read with this
1. M2M service provision
1. M2M service provision
iSHARE Trust Framework
Read with this
Primary use cases
Primary use cases
iSHARE Trust Framework
Read with this
3. H2M service provision with identity info at the IP
3. H2M service provision with identity info at the IP
iSHARE Trust Framework
Read with this
Introduction
Introduction
iSHARE Trust Framework
Read with this
Enable data exchange based on delegations - even between unknown parties
Enable data exchange based on delegations - even between unknown parties
iSHARE Trust Framework
Read with this
{"serverDuration": 74, "requestCorrelationId": "f18877b4017d4d0fb50851780b7ee2fa"}