<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Delegate_Credentials_Use_Case</id>
	<title>Delegate Credentials Use Case - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Delegate_Credentials_Use_Case"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Delegate_Credentials_Use_Case&amp;action=history"/>
	<updated>2026-05-06T12:27:17Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=Delegate_Credentials_Use_Case&amp;diff=1461&amp;oldid=prev</id>
		<title>Omaerz: 7 revisions imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Delegate_Credentials_Use_Case&amp;diff=1461&amp;oldid=prev"/>
		<updated>2018-06-28T03:51:55Z</updated>

		<summary type="html">&lt;p&gt;7 revisions imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Status:&amp;#039;&amp;#039;&amp;#039; &amp;lt;span style=&amp;quot;background:#ff0000&amp;quot;&amp;gt;Proposed&amp;lt;/span&amp;gt;&lt;br /&gt;
This Use Case has been submitted as a new entry to the Use Cases Catalog. It has not yet been validated or reviewed.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Title:&amp;#039;&amp;#039;&amp;#039; Two Party Delegation&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Use Case Description:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
With delegation technologies, the service provider issues delegation credentials that are tailored for access to data and/or processes limited to third-party service, but exclude access rights to anything else, such as user settings and controls. With delegations, should malicious third party activities occur, the primary service revokes the delegated credential, while the user credential remains valid. At the same time, the user is protected from Denial of Service (DoS) attacks. Delegations of a service should also be time constrained by limiting the access of a third-party service to the time necessary to perform the delegated service.  ( [[NISTIR 7817]] Section 2.1.1 )&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Use Case Category:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
Authentication&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Contributor:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Scott Shorter extracted from [[NISTIR 7817]]&lt;br /&gt;
&lt;br /&gt;
=== Use Case Details ===&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Actors&amp;#039;&amp;#039;&amp;#039;: &lt;br /&gt;
* Service Provider - issues delegation credentials &lt;br /&gt;
* Third-party Service - accesses data and/or processes authorized for the delegation credentials issued to them.&lt;br /&gt;
* User - has a full account with Service Provider, wishes to grant access to Third-party Service.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Goals:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Authorize limited access of information or processes to a third party.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Assumptions&amp;#039;&amp;#039;&amp;#039;: &lt;br /&gt;
* User can authenticate to Service Provider&lt;br /&gt;
* Third-Party Service does not have Delegated Credentials for User yet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirements&amp;#039;&amp;#039;&amp;#039;: &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Process Flow&amp;#039;&amp;#039;&amp;#039;: &lt;br /&gt;
# User accesses Third-Party Service which wants data from Service Provider&lt;br /&gt;
# Third-Party Service requests Delegated Credentials for User&lt;br /&gt;
# Service Provider obtains User consent for delegation&lt;br /&gt;
# Service Provider grants Delegated Credentials to Third-Party Service&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Success Scenario&amp;#039;&amp;#039;&amp;#039;: Third Party Service can access limited User data from Service Provider&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Error Conditions&amp;#039;&amp;#039;&amp;#039;: Third-Party Service forges User consent for Delegation&lt;br /&gt;
&lt;br /&gt;
=== Relationships ===&lt;br /&gt;
* Extended by:&lt;br /&gt;
&lt;br /&gt;
* Extends:&lt;br /&gt;
&lt;br /&gt;
=== References and Citations ===&lt;br /&gt;
* [[NISTIR 7817]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Authentication Use Cases]]&lt;br /&gt;
[[Category:Use Cases]]&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
</feed>