Difference between revisions of "Lookup Pattern"

From DE4A
Jump to navigation Jump to search
 
(79 intermediate revisions by 4 users not shown)
Line 1: Line 1:
 +
The Lookup pattern is used by the Doing Business Abroad Pilot in [[Use Case "Doing Business in Another Member State" (DBA UC2)]].
  
 +
== Functional Variants of the Lookup Pattern ==
 +
The basic logic of the Lookup pattern is a simple Request-Response interaction between DC and DP without any user involvement. This is only applicable in cases where the exchange has a legal basis and can be executed without explicit request or consent from the User. Its main characteristic is online and near real-time (NRT) use of information. The pattern must be "light weight". DC and DP usually know each other up front and the communication relationship is set up to cover a number of repetitive interactions over time.
  
 +
We identified two functional variations: the Evidence Lookup and the Attribute Lookup.
  
The lookup pattern is considered for a specific purpose; Its main characteristic is online and near real-time (NRT) use of information. The information is simple, attributes based. This is only applicable in cases where the exchange has a legal basis and can be executed without explicit User consent.
+
=== Evidence Lookup ===
 +
This variant is for looking up a complete Evidence. Once is established that a lookup of the evidence is needed, e.g. via a notification from the DP to DC (see for instance the [[Subscription and Notification Pattern]]), the evidence can be retrieved in its entirety. This flavour of the Lookup Pattern can also be used for integration in public service (back-office) processes for cases where a legal basis for data sharing exists (e.g. bilateral agreement or publicly available data).
 +
{| class="wikitable"
 +
|+Message Exchange
 +
!Request
 +
!Response
 +
|-
 +
|Evidence type ID
 +
|The evidence in its entirety
 +
|}
 +
 
 +
=== Attribute Lookup (i.e., using API) ===
 +
This variant is for getting updates for specific attribute(s) as well as addressing the need for an API approach. Reusing existing APIs that already exist in MSs and providing a light-weight alternative for eDelivery.
 +
{| class="wikitable"
 +
|+Message Exchange
 +
!Request
 +
!Response
 +
|-
 +
|(array of) attribute(s) [canonical of domestic]
 +
|A partial evidence, i.e., a number of attributes (key/value pairs or a data structure)
 +
|}
  
When the required information is not available right away, the process requiring the information stops and needs to be executed again from the start (as soon as the required information is available again).
+
=== Alternative Solution Approaches ===
  
This pattern requires synchronous communication, i.e. it must be “light weight”. This pattern ties DP and DC closely together: the DC cannot provide its service in case the DP is not available means that DC and DP usually know each other up front and the communication relationship is set up to cover a large number of repetitive interactions over time.
+
==== Evidence Lookup ====
 +
It makes sense to reuse what has already been implemented, i.e., the Intermediation Pattern. This way we are leveraging the AS4-infrastructure and message definitions which are already put in place. Because the Lookup Pattern doesn't imply user intervention the Intermediation pattern can be simplified, i.e., no explicit request and no preview and less multiplicity concerns.
  
== Functional Variants of the Lookup Pattern ==
+
This alternative is the proposed solution approach for DBA second iteration.
  
=== Evidence Lookup ===
+
==== Attribute Lookup ====
 +
This flavour of the Lookup Pattern addresses the need for a "light weight" alternative for eDelivery as well as the need for reusing existing APIs in MSs.
  
=== Attribute Lookup ===
+
One such example in context of our [[Doing Business Abroad Pilot]]: The Netherlands is calling an API in Belgium to retrieve some simple piece of information. Redeveloping existing solutions in order to make use of the eDelivery infrastructure cannot be justified.
  
=== Alternative Solution Approaches ===
+
The Commission also recognises the need for a simple, complementary alternative. An interesting development is the piloting of an API approach in ISA<sup>2</sup>. This project investigates new patterns of data access by request and data sharing. The initiative will facilitate design choices on  the legal, organizational, semantic and technical level necessary for setting up APIs. It includes the piloting of such an approach through a combination of the CEF eDelivery  building block and a REST-based  profile (a.k.a. "the APIs approach"). This looks like a promising initiative and an interesting development for the future. At this point in time however, there is no mature BB for DE4A to be used. This is one of the reasons why we recommend the Evidence Lookup as solution direction for the DBA Pilot.
  
 
== Working hypotheses and implementation principles ==
 
== Working hypotheses and implementation principles ==
Line 24: Line 50:
 
|-
 
|-
 
|Orchestration / Choreography
 
|Orchestration / Choreography
|The DC is orchestrating the overall flow. This means  that the (potentially multiple) processes on DP side are child processes of  the process on the DC side.
+
|The DC is orchestrating the overall flow. This means  that the process on DP side is a child processes of  the process on the DC side.
|This is essential for the intermediation pattern.  The DC manages both the interaction with the user and controls the status of all DP evidence retrieval processes.
+
|The DC controls the status of the DP evidence retrieval process. The DC can retain overall control by reacting to responses of the DP (evidence or error) and monitoring the a response is received in a reasonable amount of time (i.e. SLA)
 
|-
 
|-
|Multiple, complementary, overlapping or conflicting  evidence equivalents  
+
|Complementary, overlapping or conflicting  evidence equivalents
|Multi-evidence cases must in principle be supported by the technical system. Deep analysis on whether they are jointly valid or  are contradicting each other is left to the public service provider and not  included as functionality in the cross-border OOP sequence.
+
|Cases of ambiguous evidences must in principle be supported by the technical system. These cases are expected to be rare for lookup, because it is always related to a single Evidence request, single Evidence Type and single DP in contrast to the [[Intermediation Pattern]] that by definition needs to be able to handle multiple Evidence requests to multiple DP in potentially different countries relevant for a single eProcedure.
|It is to be investigated whether the pilot cases and MS combinations of the pilots entail multi-evidence cases at all. If that is not the case, the MVP could be restricted to a single request to single  evidence case.
+
|The DE4A pilot cases appear not to suffer from this issue and the canonical evidence approach also means that this issue is usually resolved at the DP-side.
 
|-
 
|-
 
|Interrupted vs. Uninterrupted exchange
 
|Interrupted vs. Uninterrupted exchange
|Once the OOP sequence is started by receipt of an  explicit request, the whole OOP exchange is handled in an uninterrupted manner, while the user remains waiting for the evidence. This means that any exception during the OOP exchange leads to the termination of this OOP  attempt, potentially to be repeated in a later attempt.
+
|The whole lookup is handled in an uninterrupted manner. This means that any exception during the lookup leads to its termination, potentially to be repeated at a later time as a new attempt.
  
Notwithstanding the possibility for the eProcedure  portal of the DC to offer a “save and resume” functionality, the OOP request itself  needs to be repeated in its entirety upon returning to the eProcedure. In  this way we keep the save and resume entirely in the control of the single  Procedure portal and “simulate” a disrupted procedure case, without the need  to manage persistent process instances across a multitude of highly  independent systems.
+
|
|One example of a disrupted procedure is evidence  that is not readily available in a digital format [..] said to be out of  scope of the SDGR, however appears to be a frequent case for older evidence  that resides still in paper archives. We might consider a subprocess at the  DP that digitizes the requested evidence and informs the user (e.g. via a  direct e-mail) about the evidence now being available in a digital format  [..].
 
 
|-
 
|-
|Explicit request and transitivity between actors
+
|Identity and Record Matching
|After 2023 (with SDGR as legal  basis), the DP does not need to re-validate the explicit user request, they  can rely on the DC to have done so. It is questionable whether this is presently  possible in the Pilots, as the SDGR Article 14 enters into force after the Pilot timeline (Article 39). The assumption is, however, that piloting for  the SDGR is part of the public authority tasks related to the SDGR (i.e. fall  under the application of Article 14 (11)).
+
|From experience on MS-level we see that a reasonably good match can result from the use of the (mandatory) eIDAS attributes. The working hypothesis is that this insight can be generalised to all pilot MSs and that the subject of the lookup can be identified with a similar set data set. This data set can be delivered by the DC as part of the Evidence Request.  
|We need the MS participating in the pilots to  sustain this interpretation that still needs to be validated from a legal  point of view and the limitation that the pilot solution cannot transition to  full production use on grounds of this legal basis, before the full Article  14 of the SDGR enters into force on 12.12. 2023.
+
|The DC must be in possession of the identification data set when requesting the evidence. If the subject is a natural person, then the DC must have a legal basis to transmit the identification data set as it is personal data.
 +
The problem is not relevant for DBA there the subject is a company and the European Unique Identifier for companies (EUID) can be used.  
 
|-
 
|-
|Preview & Approval UI
+
|Encryption Gap
|The preview can be provided, and the user approval  collected, by the DC, prior to the evidence being used in eProcedure. It is  well understood that the data processing of the evidence on the part of the  DC is restricted to providing the preview to the user. This entails the risk  that operators of the receiving competent authority could gain, either by  accident or (disingenuous) intent, access to the evidence data prior to user  authorisation, i.e. for example by using administrator rights on the  underlying ICT infrastructure.
+
|Identical to [[Intermediation Pattern|Intermediation]]: OOP in the public sector does not  require true E2E encryption. The exchange between DR and DP must be encrypted and signed, as well as the transfers (if applicable on national level)  between DR and DE on DC side and DT and DO on DP side (i.e. using the  national OOP layer), but the encryption gap within the systems of the DR and DT is acceptable.
|There are legal, privacy and security concerns with  this hypothesis and there are indications that not all MS are prepared to  accept these. A preview provided by the DC would for instance break the  privacy-by-design principle.
+
|This might not hold for cases where the gateway would be outsourced to a private sector subcontractor, which is not foreseen  for the DE4A pilots.
 
 
It is also noteworthy that the DP does not know  about the outcome of a DC-side preview or would need to be explicitly  informed about it.
 
 
 
The DC has in any case to implement a solution  guaranteeing that “the data included in the preview should not be stored  longer than is technically necessary” (recital 47 SDGR)[3] if the user  decides not to reuse or to submit the data.
 
|-
 
|Identity and Record Matching
 
|From experience on MS-level we see that a reasonably  good match can result from the use of the (mandatory) eIDAS attributes. The  working hypothesis is that this insight can be generalised to all pilot MSs.  Two consequences of this hypothesis are that a) the user does not need to  provide supplementary attributes and b) a second eIDAS authentication at the  DP (potentially multiple DP) is not required.
 
|As the matching based on eIDAS attributes is never  100% it is only considered sufficient from a piloting perspective, where an  unsuccessful match could be dropped from the pilot population.
 
 
 
Most MS consider current examples of implementation  of record matching as insufficiently matured and scalable across all EU MS. A  process has to be defined, for example, to manage the situations where this  automatic matching doesn’t work.
 
 
 
The Intermediation pattern has limitations for catching  these exceptions especially in case of an unsuccessful match at the DP, as no  direct interaction between U and DP is foreseen.
 
|-
 
|Transitivity of user identity
 
|After 12.12.2023, the SDGR and the legal task of the  DC provide the legal basis for the exchange of user or data subject data from  DC to DP. We assume that the development in preparation of the SDGR (i.e.  piloting) is part of the public authorities’ tasks covered by the SDGR (i.e.  Article 14 (11)), hence that the SDGR provides the legal basis for the  pilots.
 
 
 
Adding a GDPR consent in the explicit request is not  a valid legal basis for the case that the identification does include  personal data of other data subjects than the requestor (change of address  for families).
 
|We need the MS participating in the pilots adopting  the intermediation pattern to sustain this interpretation.
 
|-
 
|Hand-on of UI between actors
 
|The DC handles all user interaction of the eProcedure,  including the OOP transfer of evidence, thus foreclosing the need to  hand-over user sessions across MSs.
 
|This means that the pilot cases do not include  additional information, other than included in the initial request and  (mandatory) eIDAS attributes, to be used by the DP.
 
|-
 
|Mandate and Proxy
 
|The mandate and proxy challenge can be resolved by  an extension of the eIDAS node.
 
|The possibility to use results from SEMPER is being  investigated. It will be sought to minimise the real risk that solutions  based on this pattern cannot go production live within the timelines of DE4A,  as it would require an adjustment of the eIDAS Regulation.
 
 
 
Reuse would require establishing formal  relationships between the two parallel pilot projects SEMPER and DE4A.
 
|-
 
|Encryption Gap
 
|OOP in the public sector does not  require true E2E encryption. The exchange between DR and DP must be encrypted and signed, as well as the transfers (if applicable on national level)  between DR and DE on DC side and DT and DO on DP side (i.e. using the  national OOP layer), but the encryption gap within the systems of the DR and DT is acceptable.
 
|This might not hold for cases where the gateway would be outsourced to a private sector subcontractor, which is not foreseen  for the DE4A pilots.
 
 
|-
 
|-
 
|Structured data vs. unstructured data
 
|Structured data vs. unstructured data
|Evidence is handled as structured data. This is not  contradicting the addition of an unstructured or scanned document/certificate as part of the structured data transfer (hybrid approach) for reasons of  legal validity.
+
|Identical to [[Intermediation Pattern|Intermediation]]: Evidence is handled as structured data. This is not  contradicting the addition of an unstructured or scanned document/certificate as part of the structured data transfer (hybrid approach) for reasons of  legal validity as identified as barrier in [https://b0b3923b-028b-4cc4-aa23-7b874a2ae593.filesusr.com/ugd/f739c2_c67cf3f7cdf943a48cf8c14c8b1bf36f.pdf D1.7]: L4: National requirements for original and /or certified copies of evidence.
 
|
 
|
 
|-
 
|-
 
|Automated re-use of data
 
|Automated re-use of data
|Evidence and its use in public service procedures has legal consequences. We assume that automated re-use without premediated harmonization of evidence data definitions is not applicable for the OOP transfer of evidence between MS.
+
|Identical to [[Intermediation Pattern|Intermediation]]: Evidence and its use in public service procedures has legal consequences. We assume that automated re-use without premediated harmonization of evidence data definitions is not applicable for the OOP transfer of evidence between MS.
|
+
|To facilitate automated re-us of data requires establishing canonical evidence definitions. For [[Doing Business Abroad Pilot|DBA]], this is the case.
 
|-
 
|-
 
|Production system and real-life cases
 
|Production system and real-life cases
|With reference to SDGR Article 14(11), pilots based on  the intermediation pattern can interface with productive systems and use  real-life cases (if participants are made aware that they are participating  in a DE4A pilot).
+
|The lookup pattern is not covered by the SDGR [ref] or only as so far as the exchange is allowed under national or Union law. This means that it requires a separate legal basis (see also legal considerations below).
|Pilots considering the intermediation pattern must align  with their participating MS that they accept the interpretation of the  Article 14(11) as legal basis of the pilot even before the full Article 14 of  the SDGR enters into force on 12.12. 2023.
+
|For [[Doing Business Abroad Pilot|DBA]], company registration data is already publicly available which serves a legal basis for the lookup.
 
|-
 
|-
 
|Payment for evidence
 
|Payment for evidence
|In the context of the pilots we assume (at least for  the first pilot iteration) that no payments are required.
+
|In the context of the pilots we assume that no payments are required.
|
+
|This can restrict transition of pilot solutions to production in cases that competent authorities require payment for issuing evidence. As this is often the case for business registers and could impact the exploitation of the [[Doing Business Abroad Pilot|DBA]] results.
 +
|-
 +
|BRIS integration
 +
|A technical re-use or bridge to BRIS is not possible because of differences in scope and accessibility by competent authorities other than business registers. The semantic definitions of BRIS can be largely reused.
 +
|The pilot system for the [[Doing Business Abroad Pilot|DBA]] need to be set-up separate from BRIS.
 +
|-
 +
|Matching evidences between Member States
 +
|The final system should support both harmonized and harmonized evidence type and the architecture is taking account of both bases. In the pilot context, focus will be put on establishing deep semantic interoperability through the definition of canonical evidences
 +
|Heterogeneous, national evidence types do not need to be matched in run-time in the pilots. For all evidence types in DE4A, a canonical form is defined and agreed between the pilot partners.
 +
Each partner needs to implement a transformation from national to canonical evidence.
 +
|-
 +
|Multi-evidence Cases
 +
|The system should support all four multi-evidence cases, which means that an array of evidence types and evidences could be included in a single OOP request/response.
 +
|The second iteration should expand the MVP restriction to a single request to single  evidence cases, which requires an update of the Exchange Information Model. It is likely that piloting would focus on simpler cases to show the inclusion of multiple evidences in a single evidence response.
 +
The multi-evidence cases are likely not relevant for the [https://wiki.de4a.eu/index.php/Doing_Business_Abroad_Pilot Doing Business Abroad Pilot]. Theoretically, the 'Multi Evidence Types'-case could be applied in the second iteration to request e.g. company registration evidence and annual financial statement in a single request.
 
|}
 
|}
 +
 +
== Legal Considerations ==
 +
In terms of legal challenges, the lookup pattern faces the complexity that it is not directly supported by the SDGR. The objective of the lookup pattern is not to transfer evidence in accordance with the SDGR, since evidence transfers under the SDGR are driven (in principle) by an explicit user request. The lookup pattern instead by definition aims to transfer information directly at an authority's request, without any necessary involvement of a user in the specific exchange.
 +
 +
However, this is not necessarily a fundamental problem. If the lookup pattern focuses on information that is publicly available (e.g. in a publicly accessible database or using an open web service or API), then it would be perfectly feasible for an authority to query that database using the lookup pattern. This would be lawful even outside of the context of the SDGR, assuming that the data holder has the legal authority to indeed make the relevant information publicly accessible, and that the data evaluator has the legal authority to request such information without user request (i.e. if there is no legal requirement on them to rely exclusively on information provided by the user). If those two prerequisites are satisfied, the lookup pattern can be piloted in DE4A, without any reliance on the SDGR.
 +
 +
It is worth cautioning for an additional complexity when using the lookup pattern for personal data. The challenge is not the legal basis for personal data processing, which both the data holder and data evaluator should be able to find in their respective legal mandates under national law. Instead, the challenge is transparency: the data evaluator will be using the obtained data under its own legal responsibility, acting as a data controller. This implies that it is legally bound to provide transparency information to the data subject. This will generally only be feasible if there has been direct communication between the data evaluator and the data subject, so that this information can be provided (basically that the lookups will happen, and what the information will be used for). If such direct contact is not legally possible, then lookups of personal data are legally inadvisable
  
 
== Business Process of the Evidence Lookup ==
 
== Business Process of the Evidence Lookup ==
  
=== Business Process Collaboration View ===
+
The Figure below shows the BPMN Business Process Collaboration view of the Evidence Subscription Process, which is either triggered because a [[Subscription and Notification Pattern|Notification]] was interpreted to require an evidence update, or it is triggered by a Public Service procedure that requires an evidence that can be fetched based in bilateral agreement or national or Union law. Please note that this pattern is '''not''' triggered by the user. The Evidence Lookup could therefor also be used in a traditional procedure based on a physical transaction with the user.[[File:Evidence Lookup pattern.png|alt=Evidence Lookup Business Process Collaboration|none|thumb|Evidence Lookup Business Process Collaboration]]As you can see in the Business Process Collaboration view above, the process of looking up an evidence for the first time or looking up a new version of the evidence is essentially identical. These variants have, however, different legal implications and might consequently differ in the authorization aspect of the Evaluate Evidence Request activity. The process is also very similar to the [[Intermediation Pattern]], even though not all activities listed below are equally relevant for all use cases. The Establish Subject Identity activity, for example, is not relevant for all business use-cases that can base identification on a European unique identifier. The DC looks up the correct DP, which might be simplified for pilot purposes, and sends an Evidence request to the DP. The DP checks the request, extracts the evidence and returns the Evidence response that is then saved by the DC.   
The Figure below shows the BPMN Business Process Collaboration view of the Evidence Subscription Process, which is either triggered because a [[Subscription and Notification Pattern|Notification]] was interpreted to require an evidence update, or it is triggered by a Public Service procedure that requires an evidence that can be fetched based in bilater agreement or Union law. Please note that this pattern is '''not''' triggered by the user. The Evidence Lookup could therefor also be used in a traditional procedure based on a physical transaction with the user.[[File:Evidence Lookup pattern.png|alt=Evidence Lookup Business Process Collaboration|none|thumb|Evidence Lookup Business Process Collaboration]]As you can see in the Business Process Collaboration view above, the process of looking up an evidence for the first time or looking up a new version of the evidence is essentially identical. These variants have, however, different legal implications and might consequently differ in the authorization aspect of the Evaluate Evidence Request activity. The process is also very similar to the [[Intermediation Pattern]], even through not all activities listed below are equally relevant for all use cases. The Establish Subject Identity activity, for example, is not relevant for all business use-cases that can base identification on an European unique identifier. The DC looks up the correct DP, which might simplified for pilot purposes, and sends an Evidence request to the DP. The DP checks the request, extracts the evidence and returns the Evidence response that is then saved by the DC.   
 
 
 
=== Activity Table ===
 
 
{| class="wikitable sortable"
 
{| class="wikitable sortable"
 +
|+Business activities of the Lookup pattern
 
|'''Activity /  UC'''
 
|'''Activity /  UC'''
 
|'''Role'''
 
|'''Role'''
Line 110: Line 123:
 
|Service
 
|Service
 
|This step makes sure that the DE always requests the recent version of the Evidence type (cf. canonical evidences); in the evidence update case, for example, the evidence type definitions might have changed since the last lookup.
 
|This step makes sure that the DE always requests the recent version of the Evidence type (cf. canonical evidences); in the evidence update case, for example, the evidence type definitions might have changed since the last lookup.
In cases where the evidence type is not harmonized, the required evidence type (in  terms of the DC country) is translated into equivalent evidence types that are issued in a lawful way in the DP country indicated by the user.  
+
In cases where the evidence type is not harmonized, the required evidence type (in  terms of the DC country) is translated into equivalent evidence types that are issued in a lawful way in the DP country indicated by the user (not in pilot scope).  
 
|-
 
|-
 
|Lookup routing information
 
|Lookup routing information
 
|DR
 
|DR
 
|Service
 
|Service
|The DR retrieves the technical  routing information (e.g. eDelivery rooting identifier or URL of the  webservice provider), based on the evidence type (in terms of DP country) and the issuing competent authority (or geographic scope of authority). Note that the Evidence Lookup is used in DE4A in combination with the [[Subscription and Notification Pattern]], so as long as the subscription and lookup service is provided by the same DC, the participant ID can be assumed to be known and be included in the Evidence update requiement.
+
|The DR retrieves the technical  routing information (e.g. eDelivery rooting identifier), based on the evidence type (in terms of DP country) and the issuing competent authority (or geographic scope of authority). Note that the Evidence Lookup is used in DE4A in combination with the [[Subscription and Notification Pattern]], so as long as the subscription and lookup service is provided by the same DC, the participant ID can be assumed to be known and be included in the Evidence update requirement.
 
|-
 
|-
 
|Request evidence
 
|Request evidence
 
|DR
 
|DR
 
|Service
 
|Service
|The DR encrypts, signs and sends  the evidence request to the identified technical data service interface of the DP. The evidence request must include subject (i.e. company) information that enables  the DP to identify for which subject be issued. Companies already have a European unique identifier available (EUID), which is sufficient identification information.
+
|The DR encrypts, signs and sends  the evidence request to the identified technical data service interface of the DP. The evidence request must include subject (i.e. company) information that enables  the DP to identify for which subject the evidence must be issued. Companies already have a European unique identifier available (EUID), which is sufficient identification information.
 
|-
 
|-
 
|Evaluate evidence request
 
|Evaluate evidence request
 
|DT
 
|DT
 
|Service
 
|Service
|The DT receives and decrypts the request and checks whether the request meets formal requirements and can be accepted. It should be checked whether the requesting competent authority can reasonably and rightfully request that specific type of evidence (The authority check is not piloted in DE4A)
+
|The DT receives and decrypts the request and checks whether the request meets formal requirements and can be accepted. It should be checked whether the requesting competent authority can reasonably and rightfully request that specific type of evidence (The authority check is not piloted in DE4A)
 
|-
 
|-
 
|Establish subject identity
 
|Establish subject identity
 
|DO
 
|DO
 
|Service
 
|Service
|This activity is only relevant in absence of a European unique identidier. The DO matches identification information about the subject (i.e. equivalent to eIDAS mandatory and optional attributes) with the DP country’s records to identify the subject in their systems. This amounts to matching the eIDAS attributes to a national identification number. This is a Data Owner activity, because in a distributed scenario the data transferor might not have a legal basis to do so.  
+
|This activity is only relevant in absence of a European Unique Identifier. The DO matches identification information about the subject (i.e. equivalent to eIDAS mandatory and optional attributes) with the DP country’s records to identify the subject in their systems. This amounts to matching the eIDAS attributes to a national identification number. This is a Data Owner activity, because in a distributed scenario the data transferor might not have a legal basis to do so.
 
|-
 
|-
 
|Communicate non-availability of  OOP
 
|Communicate non-availability of  OOP
 
|DT
 
|DT
 
|Service
 
|Service
|This exception handling activity is only relevant in absence of a European unique identifier: The  DT informs the DR that the subject cannot be identified unequivocally and the system cannot be used to transfer the evidence.
+
|This exception handling activity is only relevant in absence of a European Unique Identifier: The  DT informs the DR that the subject cannot be identified unequivocally and the system cannot be used to transfer the evidence.
 
|-
 
|-
 
|Extract evidence
 
|Extract evidence
Line 145: Line 158:
 
|DT
 
|DT
 
|Service
 
|Service
|Exception handling activity: The  DT informs the DR that the requested evidence cannot be provided or cannot be provided within the agreed SLA.
+
|Exception handling activity: The  DT informs the DR that the requested evidence cannot be provided or cannot be provided within the agreed SLA.
 
|-
 
|-
 
|Establish non-availability of OOP
 
|Establish non-availability of OOP
Line 155: Line 168:
 
At the moment we expect at least  the following reasons for such an exception that should be framed in standard error messages or codes, each one with a corresponding recommendation.
 
At the moment we expect at least  the following reasons for such an exception that should be framed in standard error messages or codes, each one with a corresponding recommendation.
  
* User subject be uniquely identified  – fall-back to another channel (i.e. IMI)
+
* Subject cannot be uniquely identified  – fall-back to another channel (i.e. IMI)
* Evidence not found – Check whether the request specified the correct geographical scope of authority and contact  the DP directly if that was the case
+
* Evidence not found – Check whether the request specified the correct geographical scope of authority and contact  the DP directly if that was the case
 
* Evidence transfer blocked for  legal or authorization reasons – Contact the DP directly
 
* Evidence transfer blocked for  legal or authorization reasons – Contact the DP directly
 
* Evidence is not readily available  in a digital format now. Expected time for the evidence to be available is x  days – return after x days and issue a new evidence request
 
* Evidence is not readily available  in a digital format now. Expected time for the evidence to be available is x  days – return after x days and issue a new evidence request
Line 163: Line 176:
 
|DO
 
|DO
 
|Service
 
|Service
|The DO prepares the extracted evidence to be send as an evidence response. Depending on the level of harmonization of the evidence type this task can differ in complexity. If a canonical evidence definition is agreed, this task includes the translation of the national definitions into the canonical evidence.
+
|The DO prepares the extracted evidence to be sent as an evidence response. Depending on the level of harmonization of the evidence type this task can differ in complexity. If a canonical evidence definition is agreed, as is the case in [[Doing Business Abroad Pilot|DBA]], then this task includes the translation of the national definitions into the canonical evidence.
 
|-
 
|-
 
|Transfer evidence
 
|Transfer evidence
Line 181: Line 194:
 
|}
 
|}
  
=== Process Realisation ===
+
== Process Realisation of the Evidence Lookup ==
  
 
The figure below shows how application services serve the Data Consumer process. The application services are realized by application collaborations.
 
The figure below shows how application services serve the Data Consumer process. The application services are realized by application collaborations.
[[File:Lookup Process Realization - DC.png|alt=|none|frame]]
+
[[File:Lookup Process Realization - DC.png|alt=|none|thumb|Process realization of the Data Consumer]]
The process starts by an external business trigger identifying the neeed for an evidence or update thereof. With he help of the [[Information Desk]] the required cross-border evidence is determined and the relevant routing information is looked up.
+
The process starts by an external business trigger identifying the need for an evidence or update thereof. With the help of the [[Information Desk]] the required cross-border evidence is determined and the relevant routing information is looked up.
  
Next the Evidence can be requested, the request message is encrypted and digitally signed using the [[Trust Architecture]]. The evidence is exchanged using [[Data Logistics]] and can be tracked using [[Evidence Interchange Management]]. The signature of the received message is validated and the message decrypted ([[Trust Architecture]]). Next the evidence can be evaluated by the DC ([[EProcedure Portal]]) and if all is well the public service can be (contunued to be) provided.
+
Next the Evidence can be requested, the request message is encrypted and digitally signed using the [[Trust Architecture]]. The evidence is exchanged using [[Data Logistics]] and can be tracked using [[Evidence Interchange Management]]. The signature of the Evidence response message is validated and the message decrypted ([[Trust Architecture]]). Next the evidence can be evaluated by the DC ([[EProcedure Portal]]) and if all is well the public service can be (or continued to be) provided.
  
The figure below shows how application services serve the Data Provider process. The application services are realized by application collaborations.[[File:Lookup Process Realization - DP.png|alt=|none|frame]]
+
<span style="background:#FFFF00">TODO After discussion with DBA change Req/Evidence matching (eProcedure Portal) to "Assess Evidence" in eProcedure Back-office.</span>
  
The Evidence request is received via [[Data Logistics]] and with the help of [[Trust Architecture]] the DP checks the signature of the request and decrypts it. An Authority check may be performed using the [[Information Desk]] establishing that the DC is allowed to request the evidence type. Next the user identity is established using [[Trust Architecture]]. If this successful the evidence is extracted by [[Evidence Retrieval]] Retrieval and transformed to cannonical form ([[Evidence Portal]]). Various exceptions like non-availability of OOP or the delay or non-availability of evidence are handled by [[Data Logistics]] and [[Evidence Portal]]. If all is well the Evidence response is composed is prepared for transfer ([[Evidence Portal]]), encrypted and digitally signed using [[Trust Architecture]] and ultimately exchanged using [[Data Logistics]].
+
The figure below shows how application services serve the Data Provider process. The application services are realized by application collaborations.[[File:Lookup Process Realization - DP.png|alt=|none|thumb|Process Realization of the Data Provider]]
 +
 
 +
The Evidence request is received via [[Data Logistics]] and with the help of [[Trust Architecture]] the DP checks the signature of the request and decrypts it. An Authority check may be performed using the [[Information Desk]] establishing that the DC is allowed to request the evidence type, which is most likely not in scope of the pilot with a limited number of participants. Next the subject identity is established using [[Trust Architecture]]. If successful, the evidence is extracted by [[Evidence Retrieval]] Retrieval and transformed to canonical form ([[Evidence Portal]]). Various exceptions like non-availability of OOP or the delay or non-availability of evidence are handled by [[Evidence Portal]] and [[Data Logistics]] . If all is well , the Evidence response is composed and prepared for transfer ([[Evidence Portal]]), encrypted and digitally signed using [[Trust Architecture]] and ultimately exchanged using [[Data Logistics]].
 +
 
 +
<span style="background:#FFFF00">TODO as per target architecture (D2.7) it should be eProcedure Back-office communicating with Evidence Interchange Management</span>
  
 
=== Application Collaborations ===
 
=== Application Collaborations ===
Line 208: Line 225:
 
[[EProcedure Portal]]
 
[[EProcedure Portal]]
  
== Attribute Lookup ==
+
== Future Extension: Attribute Lookup Using API ==
TODO
+
As elaborated above an interesting development is a pilot project of ISA<sup>2</sup>. We think this development holds great promise for future cross border data exchange in specific contexts.
  
== EC Important document ISA<sup>2</sup> Action ‘Innovative Public Services’: Piloting a REST API extension of CEF eDelivery, 30/10/2020 v1.1 [1] ==
+
<span style="background:#FFFF00"><<reference in PSA: ISA<sup>2</sup> Action ‘Innovative Public Services’: Piloting a REST API extension of CEF eDelivery, 30/10/2020 v1.1>></span>
API project in ISA<sup>2</sup> Action INNOVATIVE PUBLIC SERVICE
 
 
{| class="wikitable"
 
{| class="wikitable"
 
|Source
 
|Source
Line 225: Line 241:
 
|Develop relevant legal, organizational  and technical artefacts trialled through a combination of the CEF eDelivery  building block with blockchain-based transactions’ log and a REST-based  profile (a.k.a. APIs approach), that support new patterns of data access by  request and data sharing. The initiative will facilitate design choices on  the legal, organizational, semantic and technical level necessary for setting  up APIs.
 
|Develop relevant legal, organizational  and technical artefacts trialled through a combination of the CEF eDelivery  building block with blockchain-based transactions’ log and a REST-based  profile (a.k.a. APIs approach), that support new patterns of data access by  request and data sharing. The initiative will facilitate design choices on  the legal, organizational, semantic and technical level necessary for setting  up APIs.
 
|}
 
|}
The REST-based profile is relevant for DE4A Lookup pattern; however the scope of the API project is wider. The envisaged implementation is an extension of the eDelivery BB.
+
The REST-based profile is relevant for the DE4A Attribute Lookup pattern; however the scope of the API project is (much) wider. The envisaged implementation is an extension of the eDelivery BB. In the next section, we summarize some of the results of that Pilot project, e.g. the business case, the envisaged Light Context and the requirements which were fed in to the activity as well as the legal basis for this data exchange approach. We conclude with an analysis from a DE4A point of view which could act as a checklist of decisions to be made when implementing an API approach for cross-border eGovernment interoperability.  
 
+
=== Business Case ===
Piloting a REST API extension of CEF eDelivery [1] contains a lot of useful information. What follows is an extract.
+
The need for a complementary alternative to eDelivery was identified. The data exchange would operate in a so-called "light context". A BB with a profile to cater for the REST API architectural style primarily addressing different architectures and communication patterns than those already supported by the eDelivery AS4 profile.  
 
 
Lookup Pattern D2.1:
 
 
 
[[File:Lookup.png|thumb|Lookup Pattern|alt=|none]]
 
=== Business need ===
 
A BB with a profile to cater for the REST API architectural style primarily addressing different architectures and communication patterns than those already supported by the eDelivery AS4 profile. The data exchange would operate in a '''light context'''.
 
  
 
=== Light Context ===
 
=== Light Context ===
Line 241: Line 251:
 
* “Low throughput” scenarios
 
* “Low throughput” scenarios
 
* Limitations introduced by sandbox environments
 
* Limitations introduced by sandbox environments
 +
 +
*
  
 
=== Requirements ===
 
=== Requirements ===
Requirements envisaged specification:
+
A number of requirements were drawn up for the envisaged specification:
  
 
* Simple or automatic installation of the software
 
* Simple or automatic installation of the software
Line 253: Line 265:
  
 
=== Legal Basis ===
 
=== Legal Basis ===
Legal basis: carried out under the ISA² action on Innovative Public Services, legal artefacts are also envisaged.
+
Legal basis: the activity is carried out under the ISA² action on Innovative Public Services, legal artefacts are also envisaged.
 +
 
 +
See also Legal Consideration above.
  
=== Analysis - decisions to be made for DE4A ===
+
=== Analysis - Checklist of Required Decisions for Applying API-Approach ===
Things to consider:
+
The analysis of the proposed API-approach for the ISA<sup>2</sup> pilot yields the following list of aspects to be considered when implementing an API approach:
  
* Number of corners, 2 or more (even >4)
+
==== The number of corners to be supported, 2 or more ====
 
The specification/profile could consider a variable number of corners, starting with as few as two and extending the model to support an arbitrary number greater than four (interoperability with other existing protocols and message/data exchange networks).  
 
The specification/profile could consider a variable number of corners, starting with as few as two and extending the model to support an arbitrary number greater than four (interoperability with other existing protocols and message/data exchange networks).  
  
 
# 2-corner – traditional client-server call (proposed for DE4A as simplifying assumption)
 
# 2-corner – traditional client-server call (proposed for DE4A as simplifying assumption)
# 3-corner – a reduced version of the 4-corner where corners C1 and C2 are collapsed into a single corner, C1+2, or corners C2 and C3 are collapsed into a single corner, C2+3
+
# 3-corner – a reduced version of the 4-corner where corners C1 and C2 are collapsed into a single corner, C1+2, or corners C2 and C3 are collapsed into a single corner, C2+3 (examples include a conference call app or sending an email directly via SMTP)
 
# Four corners or more, in particular in the sense of not introducing accidental barriers to interoperability between the REST API profile and other existing protocols and message/data exchange networks is concerned (CEF eDelivery AS4, SDG, X-Road, GAIA-X). The profile should strive to minimise the need for a conformant API to be adapted for use in different such networks.
 
# Four corners or more, in particular in the sense of not introducing accidental barriers to interoperability between the REST API profile and other existing protocols and message/data exchange networks is concerned (CEF eDelivery AS4, SDG, X-Road, GAIA-X). The profile should strive to minimise the need for a conformant API to be adapted for use in different such networks.
* Communication patterns  
+
* The communication patterns to be supported
Various communication patterns can be considered:
+
 
 +
==== Communication patterns ====
 +
Various communication patterns can be considered, e.g.:
  
# Synchronous business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and expects a business response. The http response it receives from C2 contains a business message and completes the exchange) (proposed for as simplifying assumptionDE4A)
+
# Synchronous business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and expects a business response. The http response it receives from C2 contains a business message and completes the exchange) (proposed as a simplifying assumption for DE4A).
 
# Asynchronous business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and expects a business response. The http response it receives from C2 contains no business message, but only an acknowledgment of receipt. The business response will be obtained at a later time, e.g., through a pull or web socket).
 
# Asynchronous business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and expects a business response. The http response it receives from C2 contains no business message, but only an acknowledgment of receipt. The business response will be obtained at a later time, e.g., through a pull or web socket).
# No business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and does not expect a business response. The http response it receives from C2 contains only an acknowledgment of receipt and competes the exchange).
+
# No business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and does not expect a business response. The http response it receives from C2 contains only an acknowledgment of receipt and completes the exchange).
 
# reliable delivery (in a 3-corner model, by enabling retry calls from C2 to C3)
 
# reliable delivery (in a 3-corner model, by enabling retry calls from C2 to C3)
 
# broadcast (in a 3-corner model, by forwarding the call to a list of recipients)
 
# broadcast (in a 3-corner model, by forwarding the call to a list of recipients)
 
# asynchronous send buffer / streaming (send buffer instead of full message)
 
# asynchronous send buffer / streaming (send buffer instead of full message)
 
# correlated calls to transmit multi-part messages
 
# correlated calls to transmit multi-part messages
# etc.
+
 
* Identity
+
==== How to manage identity ====
Direct management of certificates is impractical in a “light context”, alternative authorisation approaches relying on protocols designed for the web/mobile application world are required.
+
Direct management of certificates is impractical in a “light context”, alternative authorisation approaches relying on protocols designed for the web/mobile application world are required instead. There are a number of candidates to be considered. Currently, it is not clear what standard(s) should be supported.
  
 
# OAuth 2.0 / OpenID Connect
 
# OAuth 2.0 / OpenID Connect
Line 285: Line 301:
 
# potentially others (e.g., EU Login)
 
# potentially others (e.g., EU Login)
  
TODO proposal for DE4A
+
==== Transport protocols ====
 
+
An obvious candidate is HTTP/JSON which would also be our recommendation for DE4A, however, there are alternatives, e.g. XML.
* Transport protocols
 
DE4A proposal HTTP/JSON
 
 
#  
 
#  
 
* Integrity & confidentiality
 
TLS (see WP5 recommendation)
 
 
message signing option (TODO DE4A recommendation)
 
* (Q)ERDS = Qualified Electronic Registered Delivery Service
 
DE4A not required
 
 
=== Way forward DE4A ===
 
{| class="wikitable"
 
|+
 
!Alternative
 
!Purpose
 
|-
 
|Intermediation Pattern without user intervention. Simply put, no explicit request from the user and no preview.
 
IM is used but in a simplified form.
 
|Update an evidence type. Request a full evidence.
 
|-
 
|Lookup
 
e.g. DBA uses an existing API to request some attributes
 
|Request attributes.
 
|-
 
|
 
|
 
|}
 
  
== Used by the following use cases ==
+
==== Integrity & confidentiality ====
 +
Here we have a clear recommendation of TLS (<<see WP5 recommendation document: 1.2 or later + strong block cipher>>)
  
[[Use Case "Doing Business in Another Member State" (DBA UC2)|DBA (UC2)]]
+
The message signing option would have to be investigated.
  
== Application collaborations ==
+
==== (Q)ERDS = Qualified Electronic Registered Delivery Service ====
 +
This would not be required for DE4A but implies some interesting use cases.
  
TBD
+
As can be concluded from the above analysis the API approach is definitely more complex than the initially envisage lookup pattern from D2.1 (a simple synchronous request/reply to obtain a few attributes). However it holds promise in the sense that we could leverage existing APIs in the MSs to facilitate cross-border data exchange instead of costly redevelopments to make it fit e the Delivery/AS4 solution.

Latest revision as of 14:58, 2 May 2022

The Lookup pattern is used by the Doing Business Abroad Pilot in Use Case "Doing Business in Another Member State" (DBA UC2).

Functional Variants of the Lookup Pattern

The basic logic of the Lookup pattern is a simple Request-Response interaction between DC and DP without any user involvement. This is only applicable in cases where the exchange has a legal basis and can be executed without explicit request or consent from the User. Its main characteristic is online and near real-time (NRT) use of information. The pattern must be "light weight". DC and DP usually know each other up front and the communication relationship is set up to cover a number of repetitive interactions over time.

We identified two functional variations: the Evidence Lookup and the Attribute Lookup.

Evidence Lookup

This variant is for looking up a complete Evidence. Once is established that a lookup of the evidence is needed, e.g. via a notification from the DP to DC (see for instance the Subscription and Notification Pattern), the evidence can be retrieved in its entirety. This flavour of the Lookup Pattern can also be used for integration in public service (back-office) processes for cases where a legal basis for data sharing exists (e.g. bilateral agreement or publicly available data).

Message Exchange
Request Response
Evidence type ID The evidence in its entirety

Attribute Lookup (i.e., using API)

This variant is for getting updates for specific attribute(s) as well as addressing the need for an API approach. Reusing existing APIs that already exist in MSs and providing a light-weight alternative for eDelivery.

Message Exchange
Request Response
(array of) attribute(s) [canonical of domestic] A partial evidence, i.e., a number of attributes (key/value pairs or a data structure)

Alternative Solution Approaches

Evidence Lookup

It makes sense to reuse what has already been implemented, i.e., the Intermediation Pattern. This way we are leveraging the AS4-infrastructure and message definitions which are already put in place. Because the Lookup Pattern doesn't imply user intervention the Intermediation pattern can be simplified, i.e., no explicit request and no preview and less multiplicity concerns.

This alternative is the proposed solution approach for DBA second iteration.

Attribute Lookup

This flavour of the Lookup Pattern addresses the need for a "light weight" alternative for eDelivery as well as the need for reusing existing APIs in MSs.

One such example in context of our Doing Business Abroad Pilot: The Netherlands is calling an API in Belgium to retrieve some simple piece of information. Redeveloping existing solutions in order to make use of the eDelivery infrastructure cannot be justified.

The Commission also recognises the need for a simple, complementary alternative. An interesting development is the piloting of an API approach in ISA2. This project investigates new patterns of data access by request and data sharing. The initiative will facilitate design choices on the legal, organizational, semantic and technical level necessary for setting up APIs. It includes the piloting of such an approach through a combination of the CEF eDelivery building block and a REST-based profile (a.k.a. "the APIs approach"). This looks like a promising initiative and an interesting development for the future. At this point in time however, there is no mature BB for DE4A to be used. This is one of the reasons why we recommend the Evidence Lookup as solution direction for the DBA Pilot.

Working hypotheses and implementation principles

Table 5: Lookup Pattern working hypotheses and implementation principles
Interdisciplinary Topic Hypothesis / Principle Implications and Limitations
Orchestration / Choreography The DC is orchestrating the overall flow. This means that the process on DP side is a child processes of the process on the DC side. The DC controls the status of the DP evidence retrieval process. The DC can retain overall control by reacting to responses of the DP (evidence or error) and monitoring the a response is received in a reasonable amount of time (i.e. SLA)
Complementary, overlapping or conflicting evidence equivalents Cases of ambiguous evidences must in principle be supported by the technical system. These cases are expected to be rare for lookup, because it is always related to a single Evidence request, single Evidence Type and single DP in contrast to the Intermediation Pattern that by definition needs to be able to handle multiple Evidence requests to multiple DP in potentially different countries relevant for a single eProcedure. The DE4A pilot cases appear not to suffer from this issue and the canonical evidence approach also means that this issue is usually resolved at the DP-side.
Interrupted vs. Uninterrupted exchange The whole lookup is handled in an uninterrupted manner. This means that any exception during the lookup leads to its termination, potentially to be repeated at a later time as a new attempt.
Identity and Record Matching From experience on MS-level we see that a reasonably good match can result from the use of the (mandatory) eIDAS attributes. The working hypothesis is that this insight can be generalised to all pilot MSs and that the subject of the lookup can be identified with a similar set data set. This data set can be delivered by the DC as part of the Evidence Request. The DC must be in possession of the identification data set when requesting the evidence. If the subject is a natural person, then the DC must have a legal basis to transmit the identification data set as it is personal data.

The problem is not relevant for DBA there the subject is a company and the European Unique Identifier for companies (EUID) can be used.

Encryption Gap Identical to Intermediation: OOP in the public sector does not require true E2E encryption. The exchange between DR and DP must be encrypted and signed, as well as the transfers (if applicable on national level) between DR and DE on DC side and DT and DO on DP side (i.e. using the national OOP layer), but the encryption gap within the systems of the DR and DT is acceptable. This might not hold for cases where the gateway would be outsourced to a private sector subcontractor, which is not foreseen for the DE4A pilots.
Structured data vs. unstructured data Identical to Intermediation: Evidence is handled as structured data. This is not contradicting the addition of an unstructured or scanned document/certificate as part of the structured data transfer (hybrid approach) for reasons of legal validity as identified as barrier in D1.7: L4: National requirements for original and /or certified copies of evidence.
Automated re-use of data Identical to Intermediation: Evidence and its use in public service procedures has legal consequences. We assume that automated re-use without premediated harmonization of evidence data definitions is not applicable for the OOP transfer of evidence between MS. To facilitate automated re-us of data requires establishing canonical evidence definitions. For DBA, this is the case.
Production system and real-life cases The lookup pattern is not covered by the SDGR [ref] or only as so far as the exchange is allowed under national or Union law. This means that it requires a separate legal basis (see also legal considerations below). For DBA, company registration data is already publicly available which serves a legal basis for the lookup.
Payment for evidence In the context of the pilots we assume that no payments are required. This can restrict transition of pilot solutions to production in cases that competent authorities require payment for issuing evidence. As this is often the case for business registers and could impact the exploitation of the DBA results.
BRIS integration A technical re-use or bridge to BRIS is not possible because of differences in scope and accessibility by competent authorities other than business registers. The semantic definitions of BRIS can be largely reused. The pilot system for the DBA need to be set-up separate from BRIS.
Matching evidences between Member States The final system should support both harmonized and harmonized evidence type and the architecture is taking account of both bases. In the pilot context, focus will be put on establishing deep semantic interoperability through the definition of canonical evidences Heterogeneous, national evidence types do not need to be matched in run-time in the pilots. For all evidence types in DE4A, a canonical form is defined and agreed between the pilot partners.

Each partner needs to implement a transformation from national to canonical evidence.

Multi-evidence Cases The system should support all four multi-evidence cases, which means that an array of evidence types and evidences could be included in a single OOP request/response. The second iteration should expand the MVP restriction to a single request to single evidence cases, which requires an update of the Exchange Information Model. It is likely that piloting would focus on simpler cases to show the inclusion of multiple evidences in a single evidence response.

The multi-evidence cases are likely not relevant for the Doing Business Abroad Pilot. Theoretically, the 'Multi Evidence Types'-case could be applied in the second iteration to request e.g. company registration evidence and annual financial statement in a single request.

Legal Considerations

In terms of legal challenges, the lookup pattern faces the complexity that it is not directly supported by the SDGR. The objective of the lookup pattern is not to transfer evidence in accordance with the SDGR, since evidence transfers under the SDGR are driven (in principle) by an explicit user request. The lookup pattern instead by definition aims to transfer information directly at an authority's request, without any necessary involvement of a user in the specific exchange.

However, this is not necessarily a fundamental problem. If the lookup pattern focuses on information that is publicly available (e.g. in a publicly accessible database or using an open web service or API), then it would be perfectly feasible for an authority to query that database using the lookup pattern. This would be lawful even outside of the context of the SDGR, assuming that the data holder has the legal authority to indeed make the relevant information publicly accessible, and that the data evaluator has the legal authority to request such information without user request (i.e. if there is no legal requirement on them to rely exclusively on information provided by the user). If those two prerequisites are satisfied, the lookup pattern can be piloted in DE4A, without any reliance on the SDGR.

It is worth cautioning for an additional complexity when using the lookup pattern for personal data. The challenge is not the legal basis for personal data processing, which both the data holder and data evaluator should be able to find in their respective legal mandates under national law. Instead, the challenge is transparency: the data evaluator will be using the obtained data under its own legal responsibility, acting as a data controller. This implies that it is legally bound to provide transparency information to the data subject. This will generally only be feasible if there has been direct communication between the data evaluator and the data subject, so that this information can be provided (basically that the lookups will happen, and what the information will be used for). If such direct contact is not legally possible, then lookups of personal data are legally inadvisable

Business Process of the Evidence Lookup

The Figure below shows the BPMN Business Process Collaboration view of the Evidence Subscription Process, which is either triggered because a Notification was interpreted to require an evidence update, or it is triggered by a Public Service procedure that requires an evidence that can be fetched based in bilateral agreement or national or Union law. Please note that this pattern is not triggered by the user. The Evidence Lookup could therefor also be used in a traditional procedure based on a physical transaction with the user.

Evidence Lookup Business Process Collaboration
Evidence Lookup Business Process Collaboration

As you can see in the Business Process Collaboration view above, the process of looking up an evidence for the first time or looking up a new version of the evidence is essentially identical. These variants have, however, different legal implications and might consequently differ in the authorization aspect of the Evaluate Evidence Request activity. The process is also very similar to the Intermediation Pattern, even though not all activities listed below are equally relevant for all use cases. The Establish Subject Identity activity, for example, is not relevant for all business use-cases that can base identification on a European unique identifier. The DC looks up the correct DP, which might be simplified for pilot purposes, and sends an Evidence request to the DP. The DP checks the request, extracts the evidence and returns the Evidence response that is then saved by the DC.

Business activities of the Lookup pattern
Activity / UC Role Type Description
Determine required cross-border evidence DE Service This step makes sure that the DE always requests the recent version of the Evidence type (cf. canonical evidences); in the evidence update case, for example, the evidence type definitions might have changed since the last lookup.

In cases where the evidence type is not harmonized, the required evidence type (in terms of the DC country) is translated into equivalent evidence types that are issued in a lawful way in the DP country indicated by the user (not in pilot scope).

Lookup routing information DR Service The DR retrieves the technical routing information (e.g. eDelivery rooting identifier), based on the evidence type (in terms of DP country) and the issuing competent authority (or geographic scope of authority). Note that the Evidence Lookup is used in DE4A in combination with the Subscription and Notification Pattern, so as long as the subscription and lookup service is provided by the same DC, the participant ID can be assumed to be known and be included in the Evidence update requirement.
Request evidence DR Service The DR encrypts, signs and sends the evidence request to the identified technical data service interface of the DP. The evidence request must include subject (i.e. company) information that enables the DP to identify for which subject the evidence must be issued. Companies already have a European unique identifier available (EUID), which is sufficient identification information.
Evaluate evidence request DT Service The DT receives and decrypts the request and checks whether the request meets formal requirements and can be accepted. It should be checked whether the requesting competent authority can reasonably and rightfully request that specific type of evidence (The authority check is not piloted in DE4A)
Establish subject identity DO Service This activity is only relevant in absence of a European Unique Identifier. The DO matches identification information about the subject (i.e. equivalent to eIDAS mandatory and optional attributes) with the DP country’s records to identify the subject in their systems. This amounts to matching the eIDAS attributes to a national identification number. This is a Data Owner activity, because in a distributed scenario the data transferor might not have a legal basis to do so.
Communicate non-availability of OOP DT Service This exception handling activity is only relevant in absence of a European Unique Identifier: The DT informs the DR that the subject cannot be identified unequivocally and the system cannot be used to transfer the evidence.
Extract evidence DO Service The DO extracts the requested evidence form their registry and forwards it to the DT.
Communicate non-availability of evidence DT Service Exception handling activity: The DT informs the DR that the requested evidence cannot be provided or cannot be provided within the agreed SLA.
Establish non-availability of OOP DR Service Exception handling activity: The DR catches the negative (non-evidence) response from the DT and establishes the reason in terms of the DC country system and language:

There are potentially several reasons why an OOP transfer of evidence is not available. The DT communicates these reasons to the DR in all cases that the evidence request cannot be fulfilled (i.e. by sending the digitally available evidence within the agreed SLA as described above).

At the moment we expect at least the following reasons for such an exception that should be framed in standard error messages or codes, each one with a corresponding recommendation.

  • Subject cannot be uniquely identified – fall-back to another channel (i.e. IMI)
  • Evidence not found – Check whether the request specified the correct geographical scope of authority and contact the DP directly if that was the case
  • Evidence transfer blocked for legal or authorization reasons – Contact the DP directly
  • Evidence is not readily available in a digital format now. Expected time for the evidence to be available is x days – return after x days and issue a new evidence request
Compose evidence response DO Service The DO prepares the extracted evidence to be sent as an evidence response. Depending on the level of harmonization of the evidence type this task can differ in complexity. If a canonical evidence definition is agreed, as is the case in DBA, then this task includes the translation of the national definitions into the canonical evidence.
Transfer evidence DT Service The DT creates the evidence response message (compliant to agreed message format), encrypts and signs the message and sends it to the DR.
Forward evidence DR Service The DR registers the receipt, decrypts the message and in many cases encrypts the message in a MS specific format to hand it on to the DE.
Evaluate evidence DE Service The DE validates that the evidence conforms to the evidence type requested and stored or updates the evidence. If it is a new evidence that was requested as part of a public service procedure, the availability of the evidence is signalled to the active procedure.

Process Realisation of the Evidence Lookup

The figure below shows how application services serve the Data Consumer process. The application services are realized by application collaborations.

Process realization of the Data Consumer

The process starts by an external business trigger identifying the need for an evidence or update thereof. With the help of the Information Desk the required cross-border evidence is determined and the relevant routing information is looked up.

Next the Evidence can be requested, the request message is encrypted and digitally signed using the Trust Architecture. The evidence is exchanged using Data Logistics and can be tracked using Evidence Interchange Management. The signature of the Evidence response message is validated and the message decrypted (Trust Architecture). Next the evidence can be evaluated by the DC (EProcedure Portal) and if all is well the public service can be (or continued to be) provided.

TODO After discussion with DBA change Req/Evidence matching (eProcedure Portal) to "Assess Evidence" in eProcedure Back-office.

The figure below shows how application services serve the Data Provider process. The application services are realized by application collaborations.

Process Realization of the Data Provider

The Evidence request is received via Data Logistics and with the help of Trust Architecture the DP checks the signature of the request and decrypts it. An Authority check may be performed using the Information Desk establishing that the DC is allowed to request the evidence type, which is most likely not in scope of the pilot with a limited number of participants. Next the subject identity is established using Trust Architecture. If successful, the evidence is extracted by Evidence Retrieval Retrieval and transformed to canonical form (Evidence Portal). Various exceptions like non-availability of OOP or the delay or non-availability of evidence are handled by Evidence Portal and Data Logistics . If all is well , the Evidence response is composed and prepared for transfer (Evidence Portal), encrypted and digitally signed using Trust Architecture and ultimately exchanged using Data Logistics.

TODO as per target architecture (D2.7) it should be eProcedure Back-office communicating with Evidence Interchange Management

Application Collaborations

Information Desk

Evidence Retrieval

Trust Architecture

Data Logistics

Evidence Interchange Management

Evidence Portal

EProcedure Portal

Future Extension: Attribute Lookup Using API

As elaborated above an interesting development is a pilot project of ISA2. We think this development holds great promise for future cross border data exchange in specific contexts.

<<reference in PSA: ISA2 Action ‘Innovative Public Services’: Piloting a REST API extension of CEF eDelivery, 30/10/2020 v1.1>>

Source European Commission
Action Owner CONNECT (DIGIT, JRC).
Objectives &

scope

Develop relevant legal, organizational and technical artefacts trialled through a combination of the CEF eDelivery building block with blockchain-based transactions’ log and a REST-based profile (a.k.a. APIs approach), that support new patterns of data access by request and data sharing. The initiative will facilitate design choices on the legal, organizational, semantic and technical level necessary for setting up APIs.

The REST-based profile is relevant for the DE4A Attribute Lookup pattern; however the scope of the API project is (much) wider. The envisaged implementation is an extension of the eDelivery BB. In the next section, we summarize some of the results of that Pilot project, e.g. the business case, the envisaged Light Context and the requirements which were fed in to the activity as well as the legal basis for this data exchange approach. We conclude with an analysis from a DE4A point of view which could act as a checklist of decisions to be made when implementing an API approach for cross-border eGovernment interoperability.

Business Case

The need for a complementary alternative to eDelivery was identified. The data exchange would operate in a so-called "light context". A BB with a profile to cater for the REST API architectural style primarily addressing different architectures and communication patterns than those already supported by the eDelivery AS4 profile.

Light Context

The term “light context” refers to a set of constraints and circumstances applying to organisations or environments that do not run (in) an enterprise IT data centre (non-limitative):

  • Organisational constraints
  • Hardware and IT infrastructure constraints
  • “Low throughput” scenarios
  • Limitations introduced by sandbox environments

Requirements

A number of requirements were drawn up for the envisaged specification:

  • Simple or automatic installation of the software
  • Minimal or zero configuration that assumes no advanced knowledge of the used technology
  • Minimal operation and maintenance
  • Ease of use with immediate start and no complicated enrolment
  • Reduced requirements on the hardware resource
  • Reduced access privileges on the host

Legal Basis

Legal basis: the activity is carried out under the ISA² action on Innovative Public Services, legal artefacts are also envisaged.

See also Legal Consideration above.

Analysis - Checklist of Required Decisions for Applying API-Approach

The analysis of the proposed API-approach for the ISA2 pilot yields the following list of aspects to be considered when implementing an API approach:

The number of corners to be supported, 2 or more

The specification/profile could consider a variable number of corners, starting with as few as two and extending the model to support an arbitrary number greater than four (interoperability with other existing protocols and message/data exchange networks).

  1. 2-corner – traditional client-server call (proposed for DE4A as simplifying assumption)
  2. 3-corner – a reduced version of the 4-corner where corners C1 and C2 are collapsed into a single corner, C1+2, or corners C2 and C3 are collapsed into a single corner, C2+3 (examples include a conference call app or sending an email directly via SMTP)
  3. Four corners or more, in particular in the sense of not introducing accidental barriers to interoperability between the REST API profile and other existing protocols and message/data exchange networks is concerned (CEF eDelivery AS4, SDG, X-Road, GAIA-X). The profile should strive to minimise the need for a conformant API to be adapted for use in different such networks.
  • The communication patterns to be supported

Communication patterns

Various communication patterns can be considered, e.g.:

  1. Synchronous business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and expects a business response. The http response it receives from C2 contains a business message and completes the exchange) (proposed as a simplifying assumption for DE4A).
  2. Asynchronous business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and expects a business response. The http response it receives from C2 contains no business message, but only an acknowledgment of receipt. The business response will be obtained at a later time, e.g., through a pull or web socket).
  3. No business response (the sending corner (C1) sends a business message to the receiving corner (C2) via an http request and does not expect a business response. The http response it receives from C2 contains only an acknowledgment of receipt and completes the exchange).
  4. reliable delivery (in a 3-corner model, by enabling retry calls from C2 to C3)
  5. broadcast (in a 3-corner model, by forwarding the call to a list of recipients)
  6. asynchronous send buffer / streaming (send buffer instead of full message)
  7. correlated calls to transmit multi-part messages

How to manage identity

Direct management of certificates is impractical in a “light context”, alternative authorisation approaches relying on protocols designed for the web/mobile application world are required instead. There are a number of candidates to be considered. Currently, it is not clear what standard(s) should be supported.

  1. OAuth 2.0 / OpenID Connect
  2. JSON Web Token
  3. SAML
  4. Web authentication
  5. FIDO 2
  6. potentially others (e.g., EU Login)

Transport protocols

An obvious candidate is HTTP/JSON which would also be our recommendation for DE4A, however, there are alternatives, e.g. XML.

Integrity & confidentiality

Here we have a clear recommendation of TLS (<<see WP5 recommendation document: 1.2 or later + strong block cipher>>)

The message signing option would have to be investigated.

(Q)ERDS = Qualified Electronic Registered Delivery Service

This would not be required for DE4A but implies some interesting use cases.

As can be concluded from the above analysis the API approach is definitely more complex than the initially envisage lookup pattern from D2.1 (a simple synchronous request/reply to obtain a few attributes). However it holds promise in the sense that we could leverage existing APIs in the MSs to facilitate cross-border data exchange instead of costly redevelopments to make it fit e the Delivery/AS4 solution.