You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a data provider,
I want to sovereingly decide which identity provider, which applications and which agents (user identities) to trust for accessing my data,
So that I can ensure (protocol) security when sharing my data.
Example: limiting user identities
Alice only wants to share her private holiday blog only with her friends, e.g. Bob and Charlie, but not with others.
Example: limiting identity providers
Alice assumes that the identity provider "EvilCorp" asserts that some malicious agent is actually Alice or one of her friends.
To keep her data secure, she disallows any request that uses a token issued "EvilCorp" as an identity provider.
Example: limiting applications
Alice wants to use "myTaxApp" to process her finance data and create a tax report.
Alice does not want her finance data to be available to "myShadyImageApp", even when she is logged in herself.
Preconditions:
What conditions must be in place or assumed before this use case can begin?
data storage where the data provider can set access rules on their data
Trigger:
What (user or system) event or action initiates this use case?
there may exist malicious or compromised identity providers
there may exist malicious or compromised users (identities)
there may exist malicious or compromised applications
some use cases restrict access to certain identity providers, applications, users
Actors:
Describe the primary actor, and any other relevant actors involved in this use case
data provider
data storage
Distinction:
What unique challenges or distinguishing factors (like technical issues, user experience needs, workflow integration, etc.) are associated with this use case?
expressivity of the access control description
correponding enforcement
Scenario:
Describe an ideal or happy-case scenario where this use case would play out as intended.
In case a data provider wants to restrict access to specific users, from specific identity providers, and to specific applications,
the data provider describes their choice in the access control rules that are applied to the data storage.
Alternative case(s):
What alternative flows or variations should the system handle for this use case?
Error scenario:
What unexpected issues or errors might arise, and how should the system handle them?
Acceptance Criteria:
What conditions or criteria must be met for this use case to be considered successfully handled? What limitations are acceptable?
Security of the corresponding (authentication and) authorization protocol must be ensured.
References:
List any relevant resources or examples that could inform this use case, possibly from other domains or solutions.
Status: Draft
As a data provider,
I want to sovereingly decide which identity provider, which applications and which agents (user identities) to trust for accessing my data,
So that I can ensure (protocol) security when sharing my data.
Example: limiting user identities
Alice only wants to share her private holiday blog only with her friends, e.g. Bob and Charlie, but not with others.
Example: limiting identity providers
Alice assumes that the identity provider "EvilCorp" asserts that some malicious agent is actually Alice or one of her friends.
To keep her data secure, she disallows any request that uses a token issued "EvilCorp" as an identity provider.
Example: limiting applications
Alice wants to use "myTaxApp" to process her finance data and create a tax report.
Alice does not want her finance data to be available to "myShadyImageApp", even when she is logged in herself.
Preconditions:
What conditions must be in place or assumed before this use case can begin?
Trigger:
What (user or system) event or action initiates this use case?
Actors:
Describe the primary actor, and any other relevant actors involved in this use case
Distinction:
What unique challenges or distinguishing factors (like technical issues, user experience needs, workflow integration, etc.) are associated with this use case?
Scenario:
Describe an ideal or happy-case scenario where this use case would play out as intended.
In case a data provider wants to restrict access to specific users, from specific identity providers, and to specific applications,
the data provider describes their choice in the access control rules that are applied to the data storage.
Alternative case(s):
What alternative flows or variations should the system handle for this use case?
Error scenario:
What unexpected issues or errors might arise, and how should the system handle them?
Acceptance Criteria:
What conditions or criteria must be met for this use case to be considered successfully handled? What limitations are acceptable?
Security of the corresponding (authentication and) authorization protocol must be ensured.
References:
List any relevant resources or examples that could inform this use case, possibly from other domains or solutions.
Solid Community:
This use case is in the spirit of
The text was updated successfully, but these errors were encountered: