Skip to main content

ORD Access Strategies

This section contains the description and definition of the standardized ORD access strategies. Access strategies address the authentication and authorization aspects that are necessary to successfully retrieve the requested information.

Concretely, they are currently used to describe how ORD related metadata can be accessed from the ORD provider:

Every access strategy MUST describe how the access is implemented from both ORD provider and the ORD consumer / ORD aggregator side. It is therefore a shared contract between the provider and the consumer that details the necessary steps and conventions.

Access strategies are inspired by the strategy pattern. Since the ORD provider lists the access strategies it supports and the ORD aggregator/consumer knows which access strategies it can make use of, the information can be used to negotiate the choice of strategy at runtime.

Since multiple access strategies can be implemented at the same time, the requirements of different ORD aggregators or ORD consumers can be supported at the same time. For this to work, both sides need to share at least one common supported access strategy.

There may be situations where gaining access to ORD documents is not as simple as executing a sequence of well-defined programmatic remote requests or actions and manual user intervention might be necessary. In such cases it's acceptable to describe an access strategy more freely in terms of what the user has to do by hand.