Hack Track 1: ALFA Policies for Trust and Identity Transformation Component
Overview
This is a sub-hack to #40 (closed). The objective is to write ALFA policies for example use-cases in the Trust and Identity Transformation Component.
Example Use-case
Carol is a research engineer at an AI company working as a part of developing company’s AI model for Traffic Management to enable better road safety, traffic prediction and so on. In order to increase the precision of her model she needs to obtain traffic data from Alice a taxi driver about her GPS location and time spend at each traffic signal. Alice drives for a ride hailing company which obtain these values continuously from Alice. To fetch Alice’s data Carol needs to send a request to ride hailing company’s service instance (manages the data asset) that authenticates her and checks whether she has appropriate permissions to access the data. The challenge in this scenario is that the principals Carol and the service instance which provides the data belongs to different participants (AI company and ride hailing company) with their own trust domains (means that they have their own identity systems). So, how Carol who is the consumer principal authenticate with the service instance associated with the ride hailing company who is the provider for delivering the traffic data and to collect the data from the taxi drivers? The obtained data is then input to the AI model principal to do accurate predications and manage traffic on the road efficiently.
Prerequisites
- Understanding of SSI and Federated Identity (preferably OpenID Connect OIDC).
- Preferable understanding of XACML or ALFA policy language.