Choosing the Discovery Model Martin Forsberg

Slides:



Advertisements
Similar presentations
Directory and Trust Services (D&TS) Define an Abstract Model Purpose: Document a common terminology that the group can use between the various tracks Identify.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Defining a federated messaging and trust infrastructure for secure and reliable exchange of data Kenneth Bengtsson OASIS Business Document Exchange (BDX)
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Understanding and Leveraging MU2 Optional Transports Paul M. Tuten, PhD Senior Consultant, ONC Leader, Implementation Geographies Workgroup, Direct Project.
A ‘Connect’ Protocol for B2B Making B2B Connections as easy as ‘friending’ someone… or easier.
Networks QUME 185 Introduction to Computer Applications.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
PEPPOL is an EU co-funded project CIP-ICT PSP-2007 No PEPPOL Workshop – SMP and Identifiers Martin Forsberg, Ecru Consulting Mikael.
Technical access point forum Agency for Public Management and eGovernment Steinar Cook, Erlend K. Bergheim, Olav A. Kristiansen Oslo, 11 th November 2015.
1 Overview of the Hub Concept & Prototype for Secure Method of Information Exchange (SMIE) April 2013 Prepared by NZ & USA.
PEPPOL is an EU co-funded project CIP-ICT PSP-2007 No OpenPEPPOL Transport Infrastructure Rome Sven Rasmusen Danish Agency.
Supports the development & implementation of a IPPC Global ePhyto Hub to: Utilize modern Cloud technology. Ensure there is a secure folder for each countries’
# # 0089CB # 00283C HEXRGB # COLOUR PALETTE TEXT COLOUR HEXRGB # FFFFFF 255 # # BFBFBF.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
PEPPOL is an EU co-funded project CIP-ICT PSP-2007 No TICC PoACC Joint meeting
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
PEPPOL is owned by OpenPEPPOL AISBL PEPPOL – eProcurement in Europe André Hoddevik Secretary General, OpenPEPPOL AISBL, Belgium Head of e-procurement.
1 OASIS BDX TC - March BDX Technical Committee Addressing Mechanism or BDX Technical Committee Addressing Mechanism or "how do I find where to send.
Generalizing Metadata Services URLs Dale Moberg. Metadata Services Parts L,M, and N of PEPPOL describe a solution for finding out about capabilities and.
Key management issues in PGP
01/09/17 Architecture.
Chapter 5 Network and Transport Layers
IP Telephony (VoIP).
Resource subscription using DDS in oneM2M
Efficient and secure transborder exchange of patient data
Project Management: Messages
Mechanisms of Interfederation
Mobile IP.
Module 8: Networking Services
e-Health Platform End 2 End encryption
Peer-to-peer networking
The Domain Policy DDDS Application
Distribution and components
THE STEPS TO MANAGE THE GRID
Mobility And IP Addressing
Working at a Small-to-Medium Business or ISP – Chapter 7
Net 323: NETWORK Protocols
Client-Server Interaction
Subject Name: Computer Communication Networks Subject Code: 10EC71
Working at a Small-to-Medium Business or ISP – Chapter 7
XML Based Interoperability Components
PEPPOL the new frontier in EDI
EDelivery Tutorial How can CEF help you set-up your eDelivery infrastructure? November 2016.
Working at a Small-to-Medium Business or ISP – Chapter 7
Goals Introduce the Windows Server 2003 family of operating systems
The Globus Toolkit™: Information Services
X-Road as a Platform to Exchange MyData
Project Information Management Jiwei Ma
CEF eDelivery Digital Service Infrastructure
e-CODEX Requirements II Discovery
EC (DG SANTE) The eHealth DSI
e-Invoicing – e-Ordering 20/11/2008
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
AbbottLink™ - IP Address Overview
PKI (Public Key Infrastructure)
Peer-to-peer networking
Data Communications and Networks
Support for syntaxes (UBL and UN/CEFACT) Nicosia October 30, 2017
Grid Computing Software Interface
eIDAS-enabled Student Mobility
Presentation transcript:

Choosing the Discovery Model Martin Forsberg 29 November 2016

What I will talk about A short introduction to the (former) challenges in electronic business Different approaches on how to solve the issues (unsuccessfully) The CEF eDelivery Discovery Model/PEPPOL approach Demonstration – registration of an Access point and a company in PEPPOL Consequences for the users Scalability of the infrastructure Technical specifications Q&A

How it used to work… Buyer Seller Buyer Seller Buyer Seller Buyer Seller Buyer Seller Bilaterally agreed configuration of format, protocol, security In-house IT-solutions Each new connection => a project

How it used to work… Central hub takes care of the routing Hub service Buyer Seller Buyer Seller Hub service Hub service Buyer Seller Buyer Seller Hub service Buyer Seller Central hub takes care of the routing Buyer and seller becomes customers of the hub Business partners must use the same hub

How it used to work… Collaboration agreements Buyer Seller Service Provider Service Provider Buyer Seller Buyer Seller Service Provider Service Provider Buyer Seller Service Provider Buyer Seller Service providers acting on behalf of the buyer or seller Have collaboration-agreements defining SLA, technical details… End point (addressing)-information stored by the service provider or the issuer

A typical set up Service Provider Buyer Seller Service Provider 1. The Buyer asks the Seller to send e-invoices 1. Which Service Provider 2. Party Identities 3. Format standard, versions, receiver specific rules 4. Sometimes also technical addresses (ftp/http) Seller 5. The Buyer requests from his Service Provider to configure a routing ($$) Service Provider 2. The Seller needs to know the addressing information from the Buyer 3. The Seller requests from his Service Provider to configure a routing ($$) 4. Hopefully the Service Providers interconnect/ collaborate

Typical problems we see today Complex process to connect new business partners Very costly to configure new connections Hard to know which format/standard is used for messages Almost impossible to connect cross-border in a rational way All service providers don’t collaborate Very costly to change service provider

Attempts to solve the problems on routing/addressing in the 4-corner model Require the issuer to provide all the information to the service provider List of receivers in a file format shared/copied by all Service Providers Central database with all address-information Common issues: Single point of failure Old information In-complete information Commercial trust-issues

PEPPOL SML SMP SMP DNS Internet AP The role of the AP (Access Point) is to send and receive messages in a secure and reliable way, on behalf of the Participants. The AP is essentially a simple which is often offered together with other value added services by a Service Provider. SML The role of the SML (Service Metadata Locator) is to manage the resource records of the participants and SMPs (Service Metadata Publisher) in the DNS (Domain Name System). The SML is usually a centralised component in an eDelivery Messaging Infrastructure. SMP Once the sender discovers the address of the receiver’s SMP, it is able to retrieve the needed information (i.e. metadata) about the receiver. With such information, the message can be sent. The SMP is usually a distributed component in an eDelivery Messaging Infrastructure. Seller Participant C1 C4 Participant Buyer ORIGINAL SENDER FINAL RECIPIENT SML (centralised) Access Point Provider C2 C3 Access Point Provider DNS Access Point Access Point Internet SMP SMP

Transport Infrastructure Agreements (TIA) openPEPPOL AISBL The Access Point Provider and the Service Metadata Publisher Provider must sign a contract with openPEPPOL (or any of the PEPPOL Authorities) Agreements defines responsibilities, expectations, service levels and more Only providers who have signed the agreements can participate in the network (controlled by digital certificates on a communication level) Community Agreement PEPPOL-Authorities (SE, IT, BE NL, UK, NO, DK…) Provider Agreement Service providers

Discovery models Static Dynamic CEF eDelivery + + PROS & CONS - - In a Static Service Location model the IP address and related attributes are static. The IP address of all the Access Points in the network are stored on a central location for the other Access Points to reference. To send a message, the sending Access Point looks a the static list of IP addresses on the networks’ Domain Name System (DNS) to locate the Access Point of the receiver. Dynamic Service Location enables the sending AP to dynamically discover the IP address and capabilities of the receiver. Instead of looking at a static list of IP addresses, the sender consults a Service Metadata Publisher (SMP) where information about every participant in the data exchange network is kept up to date. As at any point in time there can be several SMPs, every participant must be given a unique ID that must be published by the Service Metadata Locator (SML) on the network’s Domain Name System (DNS). By knowing this URL, the sender is able to dynamically locate the right SMP and therefore the right receiver. High speed as there is no overhead processing + + More automated and flexible PROS & CONS - Slower speed, as some overhead processing is required - Less flexible, change of irrelevant references

Dynamic discovery in detail Phase 1: Registration Dynamic discovery in detail SML The role of the SML (Service Metadata Locator) is to manage the resource records of the participants and SMPs (Service Metadata Publisher) in the DNS (Domain Name System). The SML is usually a centralised component in an eDelivery Messaging Infrastructure. SMP Once the sender discovers the address of the receiver’s SMP, it is able to retrieve the needed information (i.e. metadata) about the receiver. With such information, the message can be sent. The SMP is usually a distributed component in an eDelivery Messaging Infrastructure. Seller Participant C1 C4 Participant Buyer ORIGINAL SENDER FINAL RECIPIENT STEP 3. REGISTER PARTICIPANT SML (centralised) Access Point Provider C2 C3 Access Point Provider DNS Access Point Access Point STEP 2. CREATE PARTICIPANT Internet SMP SMP ADMINISTRATOR STEP 1. SUBMIT METADATA

Dynamic discovery in detail Phase 2: Operations Dynamic discovery in detail SML The role of the SML (Service Metadata Locator) is to manage the resource records of the participants and SMPs (Service Metadata Publisher) in the DNS (Domain Name System). The SML is usually a centralised component in an eDelivery Messaging Infrastructure. SMP Once the sender discovers the address of the receiver’s SMP, it is able to retrieve the needed information (i.e. metadata) about the receiver. With such information, the message can be sent. The SMP is usually a distributed component in an eDelivery Messaging Infrastructure. Seller Participant C1 C4 Participant Buyer STEP 1. SUBMIT STEP 5. DELIVER ORIGINAL SENDER FINAL RECIPIENT SML (centralised) Access Point Provider C2 C3 Access Point Provider STEP 2. LOOKUP DNS Access Point SEND STEP 4. SEND RECEIVE Access Point MESSAGE EXCHANGE PROTOCOL ACKNOWLEDGE Internet SMP SMP STEP 3. RETRIEVE METADATA

DEMO! I’m going to register a new access point Create a new Participant Publish in the SML/SMP Make a look-up https://my.galaxygw.com/#/login

Service Metadata Example The Participant’s identifier Type of supported message Type of message Type of transport protocol to use for this message Technical endponit/address for which the message should be sent

Consequences for the users Scenario - Known business partner A participant registered in the PEPPOL Infrastructure is visible as a receiver by everybody. The SML/SMP is open for queries. Only certified and approved Access points can send messages in the infrastructure Receiving Access points are not allowed to refuse an incoming message if it comes from a certified Access point Participants must implement routines for handling new connections! Seller Participant C1 C4 Participant Buyer FINAL RECIPIENT ORIGINAL SENDER SML (centralised) Access Point Provider C2 C3 Access Point Provider DNS Access Point SEND RECEIVE Access Point MESSAGE EXCHANGE PROTOCOL ACKNOWLEDGE Internet SMP SMP

Consequences for the users Scenario – Unknown business partner A participant registered in the PEPPOL Infrastructure is visible as a receiver by everybody. The SML/SMP is open for queries. Only certified and approved Access points can send messages in the infrastructure Receiving Access points are not allowed to refuse an incoming message if it comes from a certified Access point Participants must implement routines for handling new connections! Seller Participant C1 C4 Participant Buyer FINAL RECIPIENT ORIGINAL SENDER SML (centralised) Access Point Provider C2 C3 Access Point Provider DNS Access Point SEND RECEIVE Access Point MESSAGE EXCHANGE PROTOCOL ACKNOWLEDGE Internet SMP SMP

Scalability of the infrastructure The discovery mechanism is using DNS, well known for stability and performance The only central service, the SML, is for administration of the participants, not the message flow itself

Specifications used in PEPPOL http://www.peppol.eu/ressource-library/technical-specifications/infrastructure-resources

Specifications used in PEPPOL & CEF eDelivery https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/eDelivery+Services

Summary Automatic discovery is necessary for mass-use of electronic business A common collaboration agreement and security structure The service metadata contains all you need to know to dynamically connect and exchange messages Necessary to implement routines for handling new business partners No roaming fees or discrimination of participants allowed Standardized specification

Find out more on CEF Digital Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology CEF-BUILDING-BLOCKS@ec.europa.eu ec.europa.eu/cefdigital