User Tools

Site Tools


concepts:05-operations

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
concepts:05-operations [2019/08/01 09:47]
tjotov created
concepts:05-operations [2020/03/25 22:51] (current)
mpospisek ↷ Page name changed from concepts:operations to concepts:05-operations
Line 2: Line 2:
  
  
-The fundamental element of ADUCID®’s activity is an **operation**. The target application requests AIM to perform an operation, AIM along with PEIG® then perform the operation and make the result available to the application. The application can then use the result of the operation (e.g. use a positive authentication result to grant access to information to a specific user in the scope of that user’s assigned rights, or use a negative result to deny access). Standard applications only use the "open" operation, which performs user authentication. Applications that manage identities (Identity Management) use other operations that support the execution of the entire lifecycle of the identity and other activities. For illustration, a list of supported operations of ADUCID® is provided with a brief description of each operation:+The fundamental element of ADUCID®’s activity is an **operation**. 
  
-|Unordered List ItemInitialization of an identity |II |Identity Initialization |"init" |PEIG® and AIM together form a new unique electronic identity. |+  * The target application requests AIM to perform an operation, AIM along with PEIG® then perform the operation and make the result available to the application.  
 +  * The application can then use the result of the operation (e.g. use a positive authentication result to grant access to information to a specific user in the scope of that user’s assigned rights, or use a negative result to deny access).  
 +  * Standard applications only use the "open" operation, which performs user authentication.  
 +  * Applications that manage identities (Identity Management) use other operations that support the execution of the entire lifecycle of the identity and other activities.  
 + 
 +For illustration, a list of supported operations of ADUCID® is provided with a brief description of each operation: 
 + 
 +|Item Initialization of an identity |II |Identity Initialization |"init" |PEIG® and AIM together form a new unique electronic identity. |
 |Use of an identity |IU |Identity Use |"open" |PEIG® and AIM together validate the eID and provide a link to user information (authentication). | |Use of an identity |IU |Identity Use |"open" |PEIG® and AIM together validate the eID and provide a link to user information (authentication). |
 |Change in an identity |IC |Identity Change |"change" |PEIG® and AIM together change the existing internal values of the identity while preserving the entire context of personification (including all associated personal data). | |Change in an identity |IC |Identity Change |"change" |PEIG® and AIM together change the existing internal values of the identity while preserving the entire context of personification (including all associated personal data). |
Line 12: Line 19:
 |Extended Use |XUSE |  |  |Advanced operation to create replicas, display dialogs and work with personal factor. | |Extended Use |XUSE |  |  |Advanced operation to create replicas, display dialogs and work with personal factor. |
  
 +[<>
concepts/05-operations.1564652868.txt.gz · Last modified: 2019/08/01 09:47 by tjotov