Skip to content

Authentication process #117

Answered by richardtreier
jes14 asked this question in Q&A
Feb 10, 2023 · 1 comments · 1 reply
Discussion options

You must be logged in to vote

Hi @jes14,

authentication in EDC can be distinguished into:

  • User Identity and Access Management (IAM) that decides who can access your connector.
  • Connector Identity and Access Management (IAM) that decides data space participants and secures all communication between connectors. Connector IAM is realized via Data Attribute Provisioning Services (DAPS), which are defined by the Core EDC.

We add our own extensions to the Core EDC, so our EDC is compatible to other EDCs.

Connector-as-a-Service (CaaS)

Sovity (Website | LinkedIn | Contact) offers its customers the Connector-as-a-Service (CaaS), hosted and maintained by sovity:

  • Decide who can access your Connector. Decide who can access your…

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@jes14
Comment options

Answer selected by jes14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants