Book page

8 - Consumers selects and uses an Infrastructure Catalogue Resource from the Infrastructure Provider

Rick Santbergen
Rick Santbergen • 5 August 2024

8 - Consumers selects and uses an Infrastructure Catalogue Resource from the Infrastructure Provider

Description

To help understand the content of this document, readers should familiarize themselves with the key definitions and actors and the business process introduction containing the diagram legend.

This business process covers the access and consumption of an infrastructure resource by a Consumer that is provided by an Infrastructure Provider.

The following actors are involved in the process: Provider and Consumer.

Prerequisites:

The prerequisites for this business process are outlined below. These prerequisites must be met to enable the process to occur:

  1. Consumer / Provider Onboarded: Before the Consumer / Provider can consume / provide any of the available resources, they should have successfully completed the onboarding business process (Business Process – 3A);
  2. End User Authenticated & Authorised: It is assumed that the End User, who is effectively performing the steps in the process, is authenticated and has the appropriate role and permissions to perform them (Business Process – 3B);
  3. Resources registered at data space connector: The data space connector is the component to control and ensure data exchange via the dataspace protocol (DSP). Hence the resource must be registered as asset first to define the contract negotiation id needed for the resource descriptions to start contract negotiation.
  4. Resource description is present in the catalogue: A Resource Description must be published in the catalogue for the Consumer to find a resource on the dataspace (Business Process – 05). As such, it is assumed that the Consumer has searched in the catalogue and found the Resource Description (Business Process - 06).

Business Process Diagram & Steps

This chapter presents a diagram visualising the business process, labelled with specific steps. Each step is further detailed in the accompanying 'Step Description'.

Step Description:

Below is a description of the steps involved in this business process. Each step outlines the specific actions and decisions required to successfully complete the process:

  1. Request infrastructure: The Consumer requests the infrastructure resource from the Infrastructure Provider.
  2. Verify access policy: The Infrastructure Provider verifies the Consumer description details (as described in their Self-Description), to ensure that according to the usage policies, they are allowed to access the requested dataset. 
  3. Terminate process: If the Consumer does not have the required permissions and conditions, or fails the access policy check, the process is terminated, and the Consumer is notified.
  4. Verify Usage Contract: The Infrastructure Provider verifies whether the Consumer has a Usage Contract to ensure the Consumer already has or needs to sign the relevant Usage Contract. If there is already an existing contract in place then the process continues to step 06. If there is no contract the process continues to step 05 to allow the Consumer to sign the relevant contract.
  5. BP - 07B - Consumer establishes a Usage Contract with the Provider for selected Catalogue items: A contract is being established to articulate and govern the obligations of both the Infrastructure Provider and the Consumer, ensuring mutual compliance and clarity in the terms of engagement. This contract outlines the obligations of both parties, including the duration of access, permitted uses of the infrastructure, and any associated fees for the Consumer, as well as the Provider’s responsibilities in delivering the agreed-upon infrastructure. The entire process can be seen in business process - 07.
  6. Provision Requested Infrastructure Resource: The Infrastructure Provider provisions and configures the infrastructure resources for a dedicated environment specific to the Consumer.
  7. Notification and Manual Review: If during the provisioning or the process of applying usage and access policies an error occurs that affects the successful continuation of the process, both the Consumer and the Provider will be informed, and the Provider will review the process to solve the errors and manually continue and monitor the process till the end.  
  8. Post Configuration: If the deployment script contains any part for the post configuration process, such as deployment of applications or loading datasets or images, it will take place in the post configuration phase. 
  9. Configure and Apply Usage and Access Policy: The Infrastructure Provider configures and applies usage and access policies (e.g., who has access, the instance usage duration, resource limitations) on the infrastructure instance (and the applications/datasets, if they're a part of the deployment script) based on the contract. 
  10. Provide access to infrastructure resource: The Infrastructure Provider applies the access control rules and provides the Consumer with the right access credentials.
  11. Access the resource: The Consumer accesses the infrastructure resource and is able to consume the resource for its intended purpose. the access is granted based on the contractual details (including the access policies and other contractual terms).
L0 - Business ProcessStatus: Proposed
Associated L1s - High Level Requirements
  • 8.1 - Requesting a resource (app/data/infrastructure)
    SIMPL shall have a mechanism to allow the consumers of ...

    See more details

  • 8.2 - Using infrastructure from a provider - Consumer Monitoring
    Simpl shall provide monitoring to ...

    See more details

  • 8.3 - Using infrastructure from a provider - Connectivity
    SIMPL shall support the establishment of the necessary channel to ...

    See more details

  • 8.4 - Mechanisms to configure and provision infrastructure resources
    Simpl shall provide the mechanisms to be able to automatically ...

    See more details

 

Back to Simpl requirements overview

Be the first one to comment


Please log in or sign up to comment.