ORD Access Strategies
This section contains the description and definition of the standardized ORD access strategies. Access strategies address the authentication and authorization aspects that are necessary to successfully retrieve the requested information.
Concretely, they are currently used to describe how ORD related metadata can be accessed from the ORD provider:
- the ORD documents via Access Strategy in the ORD configuration.
- the referenced resource definition files via Access Strategy in the ORD document.
Every access strategy MUST describe how the access is implemented from both ORD provider and the ORD consumer / ORD aggregator side. It is therefore a shared contract between the provider and the consumer that details the necessary steps and conventions.
Access strategies are inspired by the strategy pattern. Since the ORD provider lists the access strategies it supports and the ORD aggregator/consumer knows which access strategies it can make use of, the information can be used to negotiate the choice of strategy at runtime.
Since multiple access strategies can be implemented at the same time, the requirements of different ORD aggregators or ORD consumers can be supported at the same time. For this to work, both sides need to share at least one common supported access strategy.
There may be situations where gaining access to ORD documents is not as simple as executing a sequence of well-defined programmatic remote requests or actions and manual user intervention might be necessary. In such cases it's acceptable to describe an access strategy more freely in terms of what the user has to do by hand.
Access strategies use an Specification ID as identifier. This allows everyone to define their own access strategies locally or centrally.
📄️ Open Access Strategy
Access without mandatory authentication and authorization.
📄️ SAP Business Accelerator Hub Basic Auth v1
Publishing to the SAP Business Accelerator Hub.
📄️ SAP CMP mTLS v1
Publishing to Unified Customer Landscape / SAP BTP System Landscape.