DSR-RFC-02 Resource Access
Resource access can only be performed from the previously registered and fresh attested device.
1. High Level Flow
Policy Decision Point
regularly downloads, verifies, and installs the currently active policy fromPolicy Administration Point
as well as context information fromPolicy Information Point
.TrustClient
requests an attestation from the platform APIs.- Attestation results are transmitted to
Device Management Service (GMS)
in form of Device Attestation Token. Device Registration Service verifies the authenticity and integrity of the attestation and issues the Device Token TrustClient
connects to theeHealth Service
using TLS. Mutual authentication is performed using the client certificate issued in DSR-RFC-01Trust Client
sends theDevice Token
as bearer token bound to mTLS certificate or a OAuth2 Code to the eHealth Service’sPEP
. PEP verifies the authenticity of the Device Token and extracts the device information.PEP
uses device information and other available signals (e.g. HTTP request headers) as input to thePDP
.PDP
applies the policy against the device information and any other input provided to it by thePEP
.- Once
PDP
allowed the access by making the positive decision, thePEP
lets the eHealth Service to continue and provide resources and other functionalities to the client.
2. Flow Details
2.1 Android specifics
2.1.1 Create Android Device Attest
2.1.2 Verify Android Device Attest
2.2 Apple specifics
2.2.1 Create Apple Device Attest
2.2.2 Verify Apple Device Attest
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.
Last modified December 3, 2023: resolved GMS - DMS ambiguity (b371f09)