BS ISO 20078-3:2019 download free

05-23-2021 comment

BS ISO 20078-3:2019 download free.Road vehicles – Extended vehicle (ExVe ) web services.
1 Scope
BS ISO 20078-3 defines how to authenticate users and Accessing Parties on a web services interface. It also defines how a Resource Owner can delegate Access to its Resources to an Accessing Party. Within this context, BS ISO 20078-3 also defines the necessary roles and required separation of duties between these in order to fulfil requirements stated on security, data privacy and data protection.
All conditions and dependencies of the roles are defined towards a reference implementation using OAuth 2.0 compatible framework and OpenID Connect 1.0 compatible framework.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 20078-1, Road vehicles — Extended vehicle (ExVe) ‘web services’ — Content
3.1
Identity Token
ID Token
digitally signed JWT and contains claims about the authenticated Resource Owner
3.2
Access Token
AT
digitally signed JWT issued by the identity Provider or Authorization Provider and consumed by the
Resource Provider
Note 1 to entry: An Access Token represents an authorization that is issued to the client and limited by scope and has a defined expiration time.
3.3
Refresh Token
RT
credential (string) issued to the Accessing Party by the identity Provider or the Authorization Provider and used to obtain a new Access Token when the currently used AT expires, or to obtain additional ATs depending on the intended scope of use
1 The Resource Owner is authenticated by the Identity Provider.
2 The Resource Owner is granting access to the Accessing Party The granting is handled by the Authorization Provider.
3 The Accessing Party is accessing resources from the Resource Provider.
Figure 1 — The roles and the three distinct communication flows
5.2 Authentication
The Identity Provider is responsible for authenticating the Resource Owner and managing the Resource Owner profile, based on the Resource Owner registration. The Resource Owner credentials are revealed only to the Identity Provider, and the Identity Provider confirms a successful authentication to concerned parties. If the Resource Owner has given consent, the Accessing Party will be authorized to access the Resource Owner’s profile (Figure 2).
5.3 Authorization
The Client Application as a component of the Accessing Party requires Access to Resources on behalf of the Resource Owner. At the authorization step, the Accessing Party requests authorization to access the Resources provided by the Resource Provider (Offering Party). The required authorization is requested at the Authorization Provider, providing the intended scope. By the consent of the Resource Owner, the Authorization Provider returns a limited authorization to the client application of the Accessing Party. Using the obtained authorization, the Client Application can access Resources.
Additionally, actual implementation often depends on national legal requirements (e.g. handling of
Resource Owner Profile, implemented Resource Owner’s Verification Process etc.) and the required
trusted relationship between involved components especially Identity Provider, Authorization
Provider, and Resource Provider.
I REQ_05_06_O1
All communication paths between i
nvolved entities shall u
se secured connections.I
REQ_05_06_02
The Identity for ensuring
Provider, Authorization
that only recent cipher
Provider, and Resource suites are used.
Provider
are
responsible
NOTE Changes in the interface are communicated to Accessing Parties within a reasonable notice period.
If the Offering Party encounters an unreliable Accessing Party, the Offering Party can temporarily or permanently revoke the Accessing Party’s access. This is done in order to protect the Resource Owners. Examples of circumstances that could trigger this are: insecure srnartphone applications, disabled host verification, data breach of database, forbidden caching or storage of resource data, usage of discouraged security algorithms.
REQ_05_06_03 It shall be possible to validate the authenticity and integrity of information provided by the Identity Provider, Authorization Provider and Resource Provider.

Download infomation Go to download
Note: If you can share this website on your Facebook,Twitter or others,I will share more.

ISO 9885:1991 download free

ISO 9885:1991 download free.Wide-mouth glass containers - Deviation from flatness of top sealing surface - Test methods. ISO 9885 specifies two complementary test methods for the determination or the deviation from flatness of the top sealing surface...
Download Now

ISO 9009:1991 download

ISO 9009:1991 download.Glass containers — Height and non-parallelism of finish with reference to container base — Test methods. ISO 9009 specifies test methods for determining the height and the non-parallelism of finish with reference to the container...
Download Now

ISO 10076:1991 pdf free download

ISO 10076:1991 pdf free download.Metallic powders — Determination of particle size distribution by gravitational sedimentation in a liquid and attenuation measurement. The settling behaviour under gravity of a given mass of particles dispersed in an initially static...
Download Now

LEAVE A REPLY

Anonymous netizen Fill in information