System monitors, logs, and validates service-to-service interactions for conformance to protocol.
|Is Used By|
|Is Extended By|
|In Acceptance Scenarios||None|
|Technical Notes||This use case deals with verifying that service-to-service interactions follow any established/defined protocols for those interactions. (It is not about policy enforcement.)|
|Primary Service||Federated Facility Services (Virtual Organization) Part 1|
|UC Status||Mapped + Ready|
This information summarizes the Use Case functionality.
System monitors service-to-service interactions within the system, records them for auditing purposes and flags and optionally rejects any invalid interactions.
- Interaction monitor service is operational.
Message is generated by a service for delivery to another service.
- Messages containing service-to-service interactions are routed through an interaction monitor service.
- Note most messages likely represent service-to-service interactions.
- Interaction monitoring service checks each message to see if it is subject to action.
- Possible actions could be Record All, Record Significant, Flag Issues, and Reject Violations.
- The ability to record significant, flag issues, or reject violations only applies to service interactions that are recognizable/analyzable by the interaction monitor service.
- Analysis is typically done by protocol verification.
- If message is subject to action, interaction monitor service applies appropriate policy/governance criteria to determine appropriate action(s).
- Actions could be Record, Flag, or Reject.
- Rejected interactions result in additional activities, depending on policy/governance specifications.
- If a message is subject to one or more actions, each appropriate action is performed in turn, until all possible actions are exhausted or an action labeled as 'final' is encountered.
- If no 'final' action has been encountered, message is forwarded to its (next) destination via data distribution service.
Message has been intercepted, checked for conformance to protocol, acted upon if necessary, and routed to its destination (with minimal delay).
These comments provide additional context (usually quite technical) for editors of the use case.