iSHARE Dataspace Template
Other Resources
  • Introduction to the iSHARE Data Space Template
  • Documentation structure
  • Designed on basis of the iSHARE Trust Framework 2.0
  • Glossary
  • Legal notices
  • Business
    • Business model
    • Use cases
    • Data products
    • Data space intermediary
  • Governance
    • Organisational governance & governance authority
    • Participation management
  • Legal
    • Regulatory compliance
    • Contractual framework
  • Data interoperability
    • Data models
    • Data exchange
    • Provenance and traceability
  • Data sovereignty & trust
    • Access & usage policies and enforcement
    • Identity & attestation management
    • Trust framework
  • Data value creation
    • Data, services & offerings descriptions
    • Publication & discovery
    • Value added services
  • Operational
    • Operational processes
Powered by GitBook
LogoLogo

  • Cookie Policy

  • Privacy Policy

  • Imprint

  • Contact Us

Copyright © 2024 iSHARE Foundation

On this page
  1. Data sovereignty & trust

Identity & attestation management

PreviousAccess & usage policies and enforcementNextTrust framework

Last updated 10 months ago

This data space uses iSHARE principles on identity management. In particular these principles are defined here:

On the technical side the following pages are relevant:

Summarised, the data space relies on the iSHARE governance to select eID Providers are to be used. These providers will provide IDs for legal entities and humans. Identity Providers authenticate humans representing legal entities.

DSSC Description

The reliability of information is a foundational element in building trust among participants in a data space and supporting its growth.

Based on a data space’s governance, mandatory information provided on the relevant entities must be verifiable to enable the onboarding and offboarding processes. The trustworthiness of information is linked to the trustworthiness of the (or Trust Service Providers, specifically for identities), who are entitled to issue the respective attestations.

In particular, W3C standards and Qualified Electronic Attestation of Attributes provided by Qualified Trust Service Providers following eIDAS Regulation are leveraged.

The complete description is available .

Facilitate portable identity(s) for parties and humans
Identification by EORI
The role of Identity Provider
The acknoledgement of eIDAS
The PKI standard
The specifications for the Identity Provider role
Trust Anchors
here