From b00840ef3a0ad7687375f4277bc53da03e56798b Mon Sep 17 00:00:00 2001 From: SteveLasker Date: Wed, 11 Dec 2024 16:32:38 +0000 Subject: [PATCH] deploy: 3316f1a62569e760eb9cec6e660e7eb43418fe9e --- 404.html | 2 +- contributors/index.html | 2 +- .../app-registrations-api/index.html | 2 +- .../api-reference/assets-api/index.html | 2 +- .../api-reference/attachments-api/index.html | 2 +- developers/api-reference/blobs-api/index.html | 2 +- developers/api-reference/caps-api/index.html | 2 +- .../api-reference/compliance-api/index.html | 2 +- .../api-reference/events-api/index.html | 2 +- .../api-reference/iam-policies-api/index.html | 2 +- .../api-reference/iam-subjects-api/index.html | 2 +- developers/api-reference/index.html | 2 +- .../api-reference/locations-api/index.html | 2 +- .../api-reference/members-api/index.html | 2 +- .../public-assets-api/index.html | 2 +- .../api-reference/tenancies-api/index.html | 2 +- .../3rdparty-verification/index.html | 2 +- .../document-profile/index.html | 2 +- .../index.html | 2 +- developers/developer-patterns/index.html | 2 +- .../massif-blob-offset-tables/index.html | 2 +- .../developer-patterns/namespace/index.html | 2 +- .../navigating-merklelogs/index.html | 2 +- .../developer-patterns/scitt-api/index.html | 2 +- .../software-package-profile/index.html | 2 +- .../developer-patterns/veracity/index.html | 2 +- developers/index.html | 2 +- developers/templates/index.html | 2 +- developers/templates/scitt/index.html | 14 ++++-- developers/templates/vcons/index.html | 15 +++--- developers/yaml-reference/assets/index.html | 2 +- .../yaml-reference/compliance/index.html | 2 +- .../yaml-reference/estate-info/index.html | 2 +- developers/yaml-reference/events/index.html | 2 +- developers/yaml-reference/index.html | 2 +- .../yaml-reference/locations/index.html | 2 +- .../story-runner-components/index.html | 2 +- developers/yaml-reference/subjects/index.html | 2 +- glossary/common-datatrails-terms/index.html | 2 +- glossary/index.html | 2 +- glossary/reserved-attributes/index.html | 2 +- index.html | 2 +- ...d1017db0bd12336a0483612fa066a34339d25aa.js | 46 +++++++++++++++---- .../compliance-policies/index.html | 2 +- .../dropbox-integration/index.html | 2 +- .../grouping-assets-by-location/index.html | 2 +- .../identity-and-access-management/index.html | 2 +- platform/administration/index.html | 2 +- .../index.html | 2 +- .../index.html | 2 +- .../administration/verified-domain/index.html | 2 +- platform/index.html | 2 +- .../overview/advanced-concepts/index.html | 2 +- platform/overview/core-concepts/index.html | 2 +- .../overview/creating-an-asset/index.html | 2 +- .../index.html | 2 +- platform/overview/index.html | 2 +- platform/overview/instaproof/index.html | 2 +- platform/overview/introduction/index.html | 2 +- .../overview/public-attestation/index.html | 2 +- .../index.html | 2 +- .../index.html | 2 +- sales/contactus/index.html | 2 +- sales/index.html | 2 +- support/contactus/index.html | 2 +- support/index.html | 2 +- usecases/authenticity-media-files/index.html | 2 +- usecases/bill-of-materials/index.html | 2 +- usecases/index.html | 2 +- usecases/responsible-ai/index.html | 2 +- usecases/sc-asset-lifecycle/index.html | 2 +- usecases/sc-chain-of-custody/index.html | 2 +- usecases/sc-state-machine/index.html | 2 +- 73 files changed, 126 insertions(+), 89 deletions(-) rename index.min.02cced19d6eb2917a15cee70e828a6758e1b604611b6e071b8a5d634db5d52422dd0bd28b10072f23b3c47d453147848a22ba879a6a6a23d9ff3885c2bbc9e71.js => index.min.20acb356ab8994ad392c49b6e6e943032b51d54dca17ca694ee1140ce45f5d0132fa31ed23b988c6895965adfd1017db0bd12336a0483612fa066a34339d25aa.js (99%) diff --git a/404.html b/404.html index 694f1393b..69a194e47 100644 --- a/404.html +++ b/404.html @@ -5,4 +5,4 @@
\ No newline at end of file +Sign Up
\ No newline at end of file diff --git a/contributors/index.html b/contributors/index.html index d2b89aa75..e3334ea07 100644 --- a/contributors/index.html +++ b/contributors/index.html @@ -5,4 +5,4 @@

Contributors

\ No newline at end of file +Sign Up

Contributors

\ No newline at end of file diff --git a/developers/api-reference/app-registrations-api/index.html b/developers/api-reference/app-registrations-api/index.html index 7e2e74097..bae69c03a 100644 --- a/developers/api-reference/app-registrations-api/index.html +++ b/developers/api-reference/app-registrations-api/index.html @@ -208,4 +208,4 @@ "display_name": "test", "identity": "applications/ffaa0f30-a503-4de7-b085-d857ed34a7cd", "tenant_id": "tenant/fafb2d41-5237-45c7-9740-66d1635f549b" -}
Response ParameterTypeDescription
client_idstringClient ID for use in OIDC client credentials flow
credentialsarrayDescribes a single time-limited secret
custom_claimsobjectCustom claims to add to Application for use in access policies.
display_namestringHuman-readable display name for this Application.
identitystringResource name for the application
rolesarray
tenant_idstringIdentity of the tenant owning this application
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized.
404Returned when the Application does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Verified Replication of the Datatrails Transparency Logs
Assets API →
\ No newline at end of file +}
Response ParameterTypeDescription
client_idstringClient ID for use in OIDC client credentials flow
credentialsarrayDescribes a single time-limited secret
custom_claimsobjectCustom claims to add to Application for use in access policies.
display_namestringHuman-readable display name for this Application.
identitystringResource name for the application
rolesarray
tenant_idstringIdentity of the tenant owning this application
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized.
404Returned when the Application does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Verified Replication of the Datatrails Transparency Logs
Assets API →
\ No newline at end of file diff --git a/developers/api-reference/assets-api/index.html b/developers/api-reference/assets-api/index.html index e4a336714..a9994a7ef 100644 --- a/developers/api-reference/assets-api/index.html +++ b/developers/api-reference/assets-api/index.html @@ -503,4 +503,4 @@ }
Response ParameterTypeDescription
asset_attributesobjectkey value mapping of asset attributes
asset_identitystringidentity of a related asset resource assets/11bf5b37-e0b8-42e0-8dcf-dc8c4aefc000
behaviourstringThe behaviour used to create event. RecordEvidence
block_numberstringnumber of block event was commited on
confirmation_statusstringindicates if the event has been succesfully committed to the blockchain
event_attributesobjectkey value mapping of event attributes
fromstringwallet address for the creator of this event
identitystringidentity of a event resource
merklelog_entryobjectverifiable merkle mmr log entry details
operationstringThe operation represented by the event. Record
principal_acceptedobjectprincipal recorded by the server
principal_declaredobjectprincipal provided by the user
tenant_identitystringIdentity of the tenant the that created this event
timestamp_acceptedstringtime of event as recorded by the server
timestamp_committedstringtime of event as recorded in verifiable storage
timestamp_declaredstringtime of event as declared by the user
transaction_idstringhash of the transaction as a hex string 0x11bf5b37e0b842e08dcfdc8c4aefc000
transaction_indexstringindex of event within commited block
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
402Returned when the user’s quota of Events has been reached.
429Returned when a user exceeds their subscription’s rate limit for requests.

get  /archivist/v2/assets/{uuid}:publicurl

Retrieves the Asset public url

Description: Retrieves the public url for a specific Asset.

{
   "publicurl": "https://app.datatrails.ai/archivist/v2/publicassets/add30235-1424-4fda-840a-d5ef82c4c96f"
-}
Response ParameterTypeDescription
publicurlstring
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to view an Asset.
404Returned when the asset with the id does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← App Registrations API
Attachments API →
\ No newline at end of file +}
Response ParameterTypeDescription
publicurlstring
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to view an Asset.
404Returned when the asset with the id does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← App Registrations API
Attachments API →
\ No newline at end of file diff --git a/developers/api-reference/attachments-api/index.html b/developers/api-reference/attachments-api/index.html index 30b7e11ea..480f4291e 100644 --- a/developers/api-reference/attachments-api/index.html +++ b/developers/api-reference/attachments-api/index.html @@ -104,4 +104,4 @@ "subject": "user-xxxx@example.com", "tenantid": "tenant/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", "timestamp_accepted": "2019-11-07T15:31:49Z" -}
Response ParameterTypeDescription
hashblob hash.
identitystringblob identity.
issuerstringprincipal issuer.
mime_typestringhttp mime type.
scanned_bad_reasonstringif scanned as SCANNED_BAD contains a hint of scan result.
scanned_statusstringstatus of scan.
scanned_timestampstringdate and time when the attachments has been scanned.
sizeintegersize of the blob.
subjectstringprincipal subject.
tenantidstringidentity of the tenant the blob belongs to.
timestamp_acceptedstringdate and time when the request has been received.
ResponsesDescription
200A successful response.
400Returned when the request is badly formed.
404Returned when the underlying system can’t find the asset.

← Assets API
Blobs API →
\ No newline at end of file +}
Response ParameterTypeDescription
hashblob hash.
identitystringblob identity.
issuerstringprincipal issuer.
mime_typestringhttp mime type.
scanned_bad_reasonstringif scanned as SCANNED_BAD contains a hint of scan result.
scanned_statusstringstatus of scan.
scanned_timestampstringdate and time when the attachments has been scanned.
sizeintegersize of the blob.
subjectstringprincipal subject.
tenantidstringidentity of the tenant the blob belongs to.
timestamp_acceptedstringdate and time when the request has been received.
ResponsesDescription
200A successful response.
400Returned when the request is badly formed.
404Returned when the underlying system can’t find the asset.

← Assets API
Blobs API →
\ No newline at end of file diff --git a/developers/api-reference/blobs-api/index.html b/developers/api-reference/blobs-api/index.html index ce530bf6f..1a7676ca9 100644 --- a/developers/api-reference/blobs-api/index.html +++ b/developers/api-reference/blobs-api/index.html @@ -88,4 +88,4 @@ "subject": "user-xxxx@example.com", "tenantid": "tenant/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", "timestamp_accepted": "2019-11-07T15:31:49Z" -}
Response ParameterTypeDescription
hashblob hash.
identitystringblob identity.
issuerstringprincipal issuer.
mime_typestringhttp mime type.
scanned_bad_reasonstringif scanned as SCANNED_BAD contains a hint of scan result.
scanned_statusstringstatus of scan.
scanned_timestampstringdate and time when the attachments has been scanned.
sizeintegersize of the blob.
subjectstringprincipal subject.
tenantidstringidentity of the tenant the blob belongs to.
timestamp_acceptedstringdate and time when the request has been received.
ResponsesDescription
200A successful response.
400Returned when the request is badly formed.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to get the blob metadata.
429Returned when a user exceeds their subscription’s rate limit for requests.
500Returned when the underlying system returns an error.

← Attachments API
Compliance API →
\ No newline at end of file +}
Response ParameterTypeDescription
hashblob hash.
identitystringblob identity.
issuerstringprincipal issuer.
mime_typestringhttp mime type.
scanned_bad_reasonstringif scanned as SCANNED_BAD contains a hint of scan result.
scanned_statusstringstatus of scan.
scanned_timestampstringdate and time when the attachments has been scanned.
sizeintegersize of the blob.
subjectstringprincipal subject.
tenantidstringidentity of the tenant the blob belongs to.
timestamp_acceptedstringdate and time when the request has been received.
ResponsesDescription
200A successful response.
400Returned when the request is badly formed.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to get the blob metadata.
429Returned when a user exceeds their subscription’s rate limit for requests.
500Returned when the underlying system returns an error.

← Attachments API
Compliance API →
\ No newline at end of file diff --git a/developers/api-reference/caps-api/index.html b/developers/api-reference/caps-api/index.html index 83affdd8d..6209c5966 100644 --- a/developers/api-reference/caps-api/index.html +++ b/developers/api-reference/caps-api/index.html @@ -25,4 +25,4 @@ } ] } -

These are the available values for “?service=”:

Caps OpenAPI Docs

API providing caps data for DataTrails APIs

get  /archivist/v1/caps

Returns caps for the given resource

Description: Returns caps for the given resource

ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to access the resource.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Estate Information YAML Runner
\ No newline at end of file +

These are the available values for “?service=”:

Caps OpenAPI Docs

API providing caps data for DataTrails APIs

get  /archivist/v1/caps

Returns caps for the given resource

Description: Returns caps for the given resource

ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to access the resource.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Estate Information YAML Runner
\ No newline at end of file diff --git a/developers/api-reference/compliance-api/index.html b/developers/api-reference/compliance-api/index.html index 9e60a0a06..feadd2f11 100644 --- a/developers/api-reference/compliance-api/index.html +++ b/developers/api-reference/compliance-api/index.html @@ -194,4 +194,4 @@ "event_display_type": "Maintenance Performed", "identity": "compliance_policies/463fab3a-bae5-4349-8f76-f6454da20c9d", "time_period_seconds": 86800 -}
Response ParameterTypeDescription
asset_filterarrayFilter
closing_event_display_typestring
compliance_type
descriptionstring
display_namestring
dynamic_variabilitynumber
dynamic_windowstring
event_display_typestring
identitystring
richness_assertionsarrayFilter
time_period_secondsstring
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to access the requested resource.
404Returned when the asset with the id does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Blobs API
Events API →
\ No newline at end of file +}
Response ParameterTypeDescription
asset_filterarrayFilter
closing_event_display_typestring
compliance_type
descriptionstring
display_namestring
dynamic_variabilitynumber
dynamic_windowstring
event_display_typestring
identitystring
richness_assertionsarrayFilter
time_period_secondsstring
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to access the requested resource.
404Returned when the asset with the id does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Blobs API
Events API →
\ No newline at end of file diff --git a/developers/api-reference/events-api/index.html b/developers/api-reference/events-api/index.html index e7071c940..548c7293a 100644 --- a/developers/api-reference/events-api/index.html +++ b/developers/api-reference/events-api/index.html @@ -632,4 +632,4 @@ }
Response ParameterTypeDescription
asset_attributesobjectkey value mapping of asset attributes
asset_identitystringidentity of a related asset resource assets/11bf5b37-e0b8-42e0-8dcf-dc8c4aefc000
behaviourstringThe behaviour used to create event. RecordEvidence
block_numberstringnumber of block event was commited on
confirmation_statusstringindicates if the event has been succesfully committed to the blockchain
event_attributesobjectkey value mapping of event attributes
fromstringwallet address for the creator of this event
identitystringidentity of a event resource
merklelog_entryobjectverifiable merkle mmr log entry details
operationstringThe operation represented by the event. Record
principal_acceptedobjectprincipal recorded by the server
principal_declaredobjectprincipal provided by the user
tenant_identitystringIdentity of the tenant the that created this event
timestamp_acceptedstringtime of event as recorded by the server
timestamp_committedstringtime of event as recorded in verifiable storage
timestamp_declaredstringtime of event as declared by the user
transaction_idstringhash of the transaction as a hex string 0x11bf5b37e0b842e08dcfdc8c4aefc000
transaction_indexstringindex of event within commited block
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
402Returned when the user’s quota of Events has been reached.
429Returned when a user exceeds their subscription’s rate limit for requests.

get  /archivist/v2/assets/{uuid}:publicurl

Retrieves the Asset public url

Description: Retrieves the public url for a specific Asset.

{
   "publicurl": "https://app.datatrails.ai/archivist/v2/publicassets/add30235-1424-4fda-840a-d5ef82c4c96f"
-}
Response ParameterTypeDescription
publicurlstring
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to view an Asset.
404Returned when the asset with the id does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Compliance API
IAM Policies API →
\ No newline at end of file +}
Response ParameterTypeDescription
publicurlstring
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to view an Asset.
404Returned when the asset with the id does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Compliance API
IAM Policies API →
\ No newline at end of file diff --git a/developers/api-reference/iam-policies-api/index.html b/developers/api-reference/iam-policies-api/index.html index aa84ac7f5..e5241ffd9 100644 --- a/developers/api-reference/iam-policies-api/index.html +++ b/developers/api-reference/iam-policies-api/index.html @@ -637,4 +637,4 @@ } ], "page_token": "eyJhbGciOiJSUzI1NiIsImtpZCI6InN0dW50aWR" -}
Response ParameterTypeDescription
access_policiesarrayDescribes an Access Policy for OBAC
next_page_tokenstringToken to retrieve the next page of results or empty if there are none.
ResponsesDescription
200A successful response.
400Returned when the request is badly formed.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to list the access policy.
404Returned when the identified access policy does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.
500Returned when the underlying storage system returns an error.

← Events API
IAM Subjects API →
\ No newline at end of file +}
Response ParameterTypeDescription
access_policiesarrayDescribes an Access Policy for OBAC
next_page_tokenstringToken to retrieve the next page of results or empty if there are none.
ResponsesDescription
200A successful response.
400Returned when the request is badly formed.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to list the access policy.
404Returned when the identified access policy does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.
500Returned when the underlying storage system returns an error.

← Events API
IAM Subjects API →
\ No newline at end of file diff --git a/developers/api-reference/iam-subjects-api/index.html b/developers/api-reference/iam-subjects-api/index.html index 2f3915d7d..bea170e41 100644 --- a/developers/api-reference/iam-subjects-api/index.html +++ b/developers/api-reference/iam-subjects-api/index.html @@ -161,4 +161,4 @@ "wallet_pub_key": [ "key1" ] -}
Response ParameterTypeDescription
confirmation_status
display_namestringCustomer friendly name for the subject.
identitystringUnique identification for the subject, Relative Resource Name
tenantstringTenent id
tessera_pub_keyarrayOrganisation’s tessara wallet keys (BNF)
wallet_addressarrayOrganisation’s wallet addresses
wallet_pub_keyarrayOrganisation’s public wallet keys (BNF)
ResponsesDescription
200A successful response.
400Returned when the request is badly formed.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to update the subject.
404Returned when the identified subject does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.
500Returned when the underlying storage system returns an error.

← IAM Policies API
Quickstart: SCITT Statements (Preview) →
\ No newline at end of file +}
Response ParameterTypeDescription
confirmation_status
display_namestringCustomer friendly name for the subject.
identitystringUnique identification for the subject, Relative Resource Name
tenantstringTenent id
tessera_pub_keyarrayOrganisation’s tessara wallet keys (BNF)
wallet_addressarrayOrganisation’s wallet addresses
wallet_pub_keyarrayOrganisation’s public wallet keys (BNF)
ResponsesDescription
200A successful response.
400Returned when the request is badly formed.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to update the subject.
404Returned when the identified subject does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.
500Returned when the underlying storage system returns an error.

← IAM Policies API
Quickstart: SCITT Statements (Preview) →
\ No newline at end of file diff --git a/developers/api-reference/index.html b/developers/api-reference/index.html index 7fe48d49e..c0388a31d 100644 --- a/developers/api-reference/index.html +++ b/developers/api-reference/index.html @@ -5,4 +5,4 @@
\ No newline at end of file +Sign Up
\ No newline at end of file diff --git a/developers/api-reference/locations-api/index.html b/developers/api-reference/locations-api/index.html index b0b216805..e98b2cb42 100644 --- a/developers/api-reference/locations-api/index.html +++ b/developers/api-reference/locations-api/index.html @@ -181,4 +181,4 @@ "orgb" ] } -}
Response ParameterTypeDescription
location_identitystringThe location identity in the form: locations/{uuid}
permissionsSubject identities this location is shared with
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to access permissions for the location.
404Returned when the identified location does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Quickstart: SCITT Statements (Preview)
Public Assets API →
\ No newline at end of file +}
Response ParameterTypeDescription
location_identitystringThe location identity in the form: locations/{uuid}
permissionsSubject identities this location is shared with
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user is not authorized to access permissions for the location.
404Returned when the identified location does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Quickstart: SCITT Statements (Preview)
Public Assets API →
\ No newline at end of file diff --git a/developers/api-reference/members-api/index.html b/developers/api-reference/members-api/index.html index 79899a930..b0184bd1a 100644 --- a/developers/api-reference/members-api/index.html +++ b/developers/api-reference/members-api/index.html @@ -96,4 +96,4 @@ } ], "page_token": "eyJhbGciOiJSUzI1NiIsImtpZCI6InN0dW50aWR" -}
Response ParameterTypeDescription
membershipsarrayA users membership to a tenant.
next_page_tokenstringToken to retrieve the next page of results or empty if there are none.
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user does not have permission to access this endpoint.
404Returned when the requested resource does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Public Assets API
Tenancies API →
\ No newline at end of file +}
Response ParameterTypeDescription
membershipsarrayA users membership to a tenant.
next_page_tokenstringToken to retrieve the next page of results or empty if there are none.
ResponsesDescription
200A successful response.
401Returned when the user is not authenticated to the system.
403Returned when the user does not have permission to access this endpoint.
404Returned when the requested resource does not exist.
429Returned when a user exceeds their subscription’s rate limit for requests.

← Public Assets API
Tenancies API →
\ No newline at end of file diff --git a/developers/api-reference/public-assets-api/index.html b/developers/api-reference/public-assets-api/index.html index b47fee3aa..9018b2581 100644 --- a/developers/api-reference/public-assets-api/index.html +++ b/developers/api-reference/public-assets-api/index.html @@ -275,4 +275,4 @@ } ], "next_page_token": "abcd" -}
Response ParameterTypeDescription
eventsarrayThis describes an Event.
next_page_tokenstringToken to retrieve the next page of results or empty if there are none.
ResponsesDescription
200A successful response.
206The number of events exceeds the servers limit. The approximate number of matching results is provided by the x-total-count header, the exact limit is available in the content-range header. The value format is ‘items 0-LIMIT/TOTAL’. Note that x-total-count is always present for 200 and 206 responses. It is the servers best available approximation. Similarly, in any result set, you may get a few more than LIMIT items.

← Locations API
Members API →
\ No newline at end of file +}
Response ParameterTypeDescription
eventsarrayThis describes an Event.
next_page_tokenstringToken to retrieve the next page of results or empty if there are none.
ResponsesDescription
200A successful response.
206The number of events exceeds the servers limit. The approximate number of matching results is provided by the x-total-count header, the exact limit is available in the content-range header. The value format is ‘items 0-LIMIT/TOTAL’. Note that x-total-count is always present for 200 and 206 responses. It is the servers best available approximation. Similarly, in any result set, you may get a few more than LIMIT items.

← Locations API
Members API →
\ No newline at end of file diff --git a/developers/api-reference/tenancies-api/index.html b/developers/api-reference/tenancies-api/index.html index 88636bc12..f65065c7f 100644 --- a/developers/api-reference/tenancies-api/index.html +++ b/developers/api-reference/tenancies-api/index.html @@ -45,4 +45,4 @@ Example Response
{
   "identity": "tenant/add30235-1424-4fda-840a-d5ef82c4c96f",
   "verified_domain": "exampleltd"
-}
Response ParameterTypeDescription
identitystring
verified_domainstring
ResponsesDescription
200A successful response.

← Members API
YAML Runner Components →
\ No newline at end of file +}
Response ParameterTypeDescription
identitystring
verified_domainstring
ResponsesDescription
200A successful response.

← Members API
YAML Runner Components →
\ No newline at end of file diff --git a/developers/developer-patterns/3rdparty-verification/index.html b/developers/developer-patterns/3rdparty-verification/index.html index f3be71ddc..449d8e35c 100644 --- a/developers/developer-patterns/3rdparty-verification/index.html +++ b/developers/developer-patterns/3rdparty-verification/index.html @@ -111,4 +111,4 @@ veracity --tenant $TENANT watch --horizon 180h | veracity replicate-logs --replicadir merklelogs
  • This process guarantees you can’t be misrepresented, any alternate version of events would be provably false.
  • To guarantee continued operation even if DataTrails is prevented from operating, a copy of the DataTrails metadata must be retained.
  • You can reasonably chose to trust DataTrails copy, because, even in the most extreme cases, it is “fail-safe” if DataTrails SaaS storage is compromised, when combined with a replicated verifiable merkle log.
  • ← Massif blob pre-calculated offsets
    App Registrations API →
    \ No newline at end of file + \ No newline at end of file diff --git a/developers/developer-patterns/document-profile/index.html b/developers/developer-patterns/document-profile/index.html index a4675e3fd..89ed57aaf 100644 --- a/developers/developer-patterns/document-profile/index.html +++ b/developers/developer-patterns/document-profile/index.html @@ -17,4 +17,4 @@ } ]
    Asset AttributesMeaningRequirement
    document_hash_valueHash of this version of the documentRequired
    document_hash_algAlgorithm used for hashing. We only officially support SHA-256.Required
    document_statusLabel for filtering and accommodating critical document lifecycle eventsRequired, must be Published
    document_documentAttachment containing this version of the documentOptional
    document_versionVersion string for the this version of the documentOptional

    Withdraw Event

    If a document is no longer required, or if for any reason it is decided that it should no longer be used, then a document can be withdrawn. -Withdrawal is optional and it is usually the final event in the document lifecycle. It can be reversed in DataTrails by publishing a new version.

    Withdraw an entire document (mark that it is no longer considered current.)

    Event AttributesMeaningRequirement
    arc_display_typeTells DataTrails how to interpret EventRequired, must be set to Withdraw
    document_withdrawal_reasonReason why document has been withdrawnOptional, but encouraged
    Asset AttributesMeaningRequirement
    document_statusLabel for filtering and accommodating critical document lifecycle eventsRequired, must be Withdrawn

    ← Namespace
    Software Package Profile →
    \ No newline at end of file +Withdrawal is optional and it is usually the final event in the document lifecycle. It can be reversed in DataTrails by publishing a new version.

    Withdraw an entire document (mark that it is no longer considered current.)

    Event AttributesMeaningRequirement
    arc_display_typeTells DataTrails how to interpret EventRequired, must be set to Withdraw
    document_withdrawal_reasonReason why document has been withdrawnOptional, but encouraged
    Asset AttributesMeaningRequirement
    document_statusLabel for filtering and accommodating critical document lifecycle eventsRequired, must be Withdrawn

    ← Namespace
    Software Package Profile →
    \ No newline at end of file diff --git a/developers/developer-patterns/getting-access-tokens-using-app-registrations/index.html b/developers/developer-patterns/getting-access-tokens-using-app-registrations/index.html index 64680d0aa..9aea49dc8 100644 --- a/developers/developer-patterns/getting-access-tokens-using-app-registrations/index.html +++ b/developers/developer-patterns/getting-access-tokens-using-app-registrations/index.html @@ -97,4 +97,4 @@ "iss": "https://app.datatrails.ai/appidpv1", "aud": "https://app.datatrails.ai/archivist" } -

    ← DataTrails Event vCon Template
    Namespace →
    \ No newline at end of file +

    ← DataTrails Event vCon Template
    Namespace →
    \ No newline at end of file diff --git a/developers/developer-patterns/index.html b/developers/developer-patterns/index.html index 6a280723b..2c3331d5b 100644 --- a/developers/developer-patterns/index.html +++ b/developers/developer-patterns/index.html @@ -5,4 +5,4 @@

    Developer Patterns

    This sub-section of the Developers subject area contains more detailed information on topics that cannot be covered by the API or YAML Runner references.

    You will find articles on common developer tasks and concept guides that are relevant to developers.

    Check out the articles below for more information!


    Getting Access Tokens using App Registrations →
    Namespace →
    Verifying Assets and Events with Simple Hash →
    Navigating the Merkle Logs →
    Massif Blob Offset Tables →
    Document Profile →
    Software Package Profile →

    \ No newline at end of file +Sign Up

    Developer Patterns

    This sub-section of the Developers subject area contains more detailed information on topics that cannot be covered by the API or YAML Runner references.

    You will find articles on common developer tasks and concept guides that are relevant to developers.

    Check out the articles below for more information!


    Getting Access Tokens using App Registrations →
    Namespace →
    Verifying Assets and Events with Simple Hash →
    Navigating the Merkle Logs →
    Massif Blob Offset Tables →
    Document Profile →
    Software Package Profile →

    \ No newline at end of file diff --git a/developers/developer-patterns/massif-blob-offset-tables/index.html b/developers/developer-patterns/massif-blob-offset-tables/index.html index 31b888d47..a06b527aa 100644 --- a/developers/developer-patterns/massif-blob-offset-tables/index.html +++ b/developers/developer-patterns/massif-blob-offset-tables/index.html @@ -127,4 +127,4 @@ } return sum; } -

    ← Navigating the Merkle Log
    Verified Replication of the Datatrails Transparency Logs →
    \ No newline at end of file +

    ← Navigating the Merkle Log
    Verified Replication of the Datatrails Transparency Logs →
    \ No newline at end of file diff --git a/developers/developer-patterns/namespace/index.html b/developers/developer-patterns/namespace/index.html index 052403bf8..364a03d14 100644 --- a/developers/developer-patterns/namespace/index.html +++ b/developers/developer-patterns/namespace/index.html @@ -23,4 +23,4 @@ }

    To use namespace as a variable, such as the date, add the argument to your Bash environment:

     export TEST_NAMESPACE=date
     

    See -TEST_NAMESPACE in our GitHub repository for more information. TEST_NAMESPACE can also be added to your Bash profile to be automatically picked up when testing.

    ← Creating Access Tokens Using a Custom Integration
    Document Profile →
    \ No newline at end of file +TEST_NAMESPACE in our GitHub repository for more information. TEST_NAMESPACE can also be added to your Bash profile to be automatically picked up when testing.

    ← Creating Access Tokens Using a Custom Integration
    Document Profile →
    \ No newline at end of file diff --git a/developers/developer-patterns/navigating-merklelogs/index.html b/developers/developer-patterns/navigating-merklelogs/index.html index a9d22a592..bcddede56 100644 --- a/developers/developer-patterns/navigating-merklelogs/index.html +++ b/developers/developer-patterns/navigating-merklelogs/index.html @@ -417,4 +417,4 @@ Snowflake ID scheme. The DataTrails implementation can be found at nextid.go ↩︎

  • Such a path of hashes is commonly referred to as a “proof”, a “witness”, and an “authentication path”. -A Merkle Tree is sometimes referred to as authenticated data structures or a verifiable data structure. For the purposes of this article, there is no meaningful difference. They are all the same thing. We stick to “verification” and “verifiable data structure” in this article. ↩︎

  • ← Independently verifying DataTrails transparent merkle logs
    Massif blob pre-calculated offsets →
    \ No newline at end of file +A Merkle Tree is sometimes referred to as authenticated data structures or a verifiable data structure. For the purposes of this article, there is no meaningful difference. They are all the same thing. We stick to “verification” and “verifiable data structure” in this article. ↩︎

    ← Independently verifying DataTrails transparent merkle logs
    Massif blob pre-calculated offsets →
    \ No newline at end of file diff --git a/developers/developer-patterns/scitt-api/index.html b/developers/developer-patterns/scitt-api/index.html index 39b3d1dc2..ddb5114c4 100644 --- a/developers/developer-patterns/scitt-api/index.html +++ b/developers/developer-patterns/scitt-api/index.html @@ -82,4 +82,4 @@ curl "https://app.datatrails.ai/archivist/v2/publicassets/-/events?${PARAMS}" \ | jq

    Summary

    The quickstart created a collection of statements for a given artifact. -Over time, as new information is available, authors can publish new statements which verifiers and consumers can benefit from, making decisions specific to their environment.

    There are no limits to the types of additional statements that may be registered, which may include new information related to an AI Model, new vulnerability information, notifications of new versions, end of life (EOL) notifications, or more.

    For more information:

    ← IAM Subjects API
    Locations API →
    \ No newline at end of file +Over time, as new information is available, authors can publish new statements which verifiers and consumers can benefit from, making decisions specific to their environment.

    There are no limits to the types of additional statements that may be registered, which may include new information related to an AI Model, new vulnerability information, notifications of new versions, end of life (EOL) notifications, or more.

    For more information:

    ← IAM Subjects API
    Locations API →
    \ No newline at end of file diff --git a/developers/developer-patterns/software-package-profile/index.html b/developers/developer-patterns/software-package-profile/index.html index be319b745..0d7b37872 100644 --- a/developers/developer-patterns/software-package-profile/index.html +++ b/developers/developer-patterns/software-package-profile/index.html @@ -44,4 +44,4 @@ "public": true }

    Software Package Profile Event Types and Attributes

    Release Event

    A Release is the event used by a Supplier to provide an SBOM for their Software Package in DataTrails.

    The Release attributes tracked in DataTrails should minimally represent the base information required by the NTIA standard and be recorded in two, separate, lists of attributes; Asset Attributes would track details about the latest release of the SBOM at the time of the event creation, the Event Attributes then track details about the release of the SBOM that is being submitted.

    Release Event Attribute Namespace

    The sbom_ prefix is used to designate attributes that are part of the event and asset. Some of these are interpreted by DataTrails and others are guidelines

    NTIA AttributeEvent AttributesMeaningRequirement
    N/Aarc_display_typeTells DataTrails how to interpret EventRequired, must set to Release
    Author Namesbom_authorThe name of the Package AuthorRequired
    Supplier Namesbom_supplierThe name of the Package AuthorRequired
    Component Namesbom_componentThe name of the PackageRequired
    Version Stringsbom_versionThe version of the PackageRequired
    Unique Identifiersbom_uuidA unique identifier for the Package, DataTrails provides a Unique ID per asset but it may be preferred to include an existing internal reference insteadRequired
    N/Asbom_repoLink to the Git Repo of the ComponentOptional
    N/Asbom_release_notesLink to the release notes of the releaseOptional
    N/Asbom_licenseThe licensing used by the component (if specified)Optional
    N/Asbom_exceptionIf included value is always trueOptional
    N/Asbom_vuln_referenceIf this release resolves a specific vulnerability you can highlight a shared Vulnerability reference number(s)Optional
    NTIA AttributeAsset AttributesMeaningRequirement
    Author Namesbom_authorThe name of the Package AuthorRequired
    Supplier Namesbom_supplierThe name of the Package SupplierRequired
    Component Namesbom_component,(arc_display_name if appropriate)The name of the Software PackageRequired
    Version Stringsbom_versionThe version of the Software PackageRequired
    Unique Identifiersbom_uuidA unique identifier for the Package, DataTrails provides a Unique ID per asset but it may be preferred to include an existing internal reference insteadRequired
    N/Asbom_repoLink to the Git Repo of the ComponentOptional
    N/Asbom_release_notesLink to the release notes of the package versionOptional
    N/Asbom_licenseThe licensing used by the component (if specified)Optional
    Exception

    When used in tandem with Release Plan and Accepted events the exception is a useful record of when an emergency has caused a release to be pushed without needing an initial approval or plan.

    Release Plan and Release Accepted

    Release events can be optionally enhanced by using ‘Release Plan’ and ‘Release Accepted’ events alongside them.

    Release Plan events demonstrate an intent to introduce a new release, it should describe which version you want to release and who wants to release it. For example, it could include draft release notes explaining what is being updated and why it should be updated.

    Release Accepted events demonstrate an approval on a Release Plan to go forward, it may be that the plan details a need to introduce a fix for a specific vulnerability and the security team is needed to sign off the release going forward.

    These events are not essential to the process so can be omitted in a standard or minimal deployment but they are actively encouraged. As they should not affect the information about the latest Software Package Release there should be no Asset Attributes included, other NTIA attributes may also not be necessary or not available until release (e.g. Component Hash).

    The Key Attribute that should be recorded is the version of the release that is being planned and accepted.

    Release Plan

    Release Plan Event Attribute Namespace

    The sbom_planned_ prefix is used to designate attributes that are part of the event. Some of these are interpreted by DataTrails and others are guidelines.

    NTIA AttributeEvent AttributesMeaningRequirement
    N/Aarc_display_typeTells DataTrails how to interpret EventRequired, must set to Release Plan
    Component Namesbom_planned_componentThe planned name of the PackageRequired
    Version Stringsbom_planned_versionThe planned version of the PackageRequired
    N/Asbom_planned_referenceA reference number for the plan (such as internal change request number)Required
    N/Asbom_planned_dateThe planned release dateRequired
    N/Asbom_planned_captainThe planned Release Captain (a common term for someone who is responsible for performing a Release; someone like an Owner in Agile serves a different purpose but may also be used if appropriate). This is mandatory as it describes who should be responsible for the releaseRequired
    Author Namesbom_planned_authorThe planned name of the Package AuthorOptional
    Supplier Namesbom_planned_supplierThe planned name of the Package SupplierOptional
    Component Hashsbom_planned_hashThe planned hash of the component files/installation (per version)Optional
    Unique Identifiersbom_planned_uuidThe planned unique identifier for the Package, DataTrails provides a Unique ID per asset but it may be preferred to include an existing internal reference insteadOptional
    N/Asbom_planned_licenseIf there is an intended change to the license this may be neededOptional
    N/Asbom_planned_vuln_referenceIf this release intends to resolve a specific vulnerability you can highlight a shared Vulnerability reference number(s)Optional

    Release Accepted Event

    Release Accepted Event Attribute Namespace

    The sbom_accepted_ prefix is used to designate attributes that are part of the event. Some of these are interpreted by DataTrails and others are guidelines.

    NTIA AttributeEvent AttributesMeaningRequirement
    N/Aarc_display_typeTells DataTrails how to interpret EventRequired, must set to Release Accepted
    Component Namesbom_accepted_componentThe accepted name of the PackageRequired
    Version Stringsbom_accepted_versionThe accepted version of the PackageRequired
    N/Asbom_accepted_referenceThe reference number of the associated planRequired
    N/Asbom_accepted_dateThe accepted release dateRequired
    N/Asbom_accepted_captainThe accepted Release Captain (a common term for someone who is responsible for performing a Release; someone like an Owner in Agile serves a different purpose but may also be used if appropriate). This is mandatory as it describes who should be responsible for the releaseRequired
    N/Asbom_accepted_approverDescribes who has accepted the planRequired
    Author Namesbom_accepted_authorThe accepted name of the Package AuthorOptional
    Supplier Namesbom_accepted_supplierThe accepted name of the Package SupplierOptional
    Component Hashsbom_accepted_hashThe accepted hash of the component files/installation (per version)Optional
    Unique Identifiersbom_accepted_uuidThe accepted unique identifier for the Package, DataTrails provides a Unique ID per asset but it may be preferred to include an existing internal reference insteadOptional
    N/Asbom_accepted_vuln_referenceIf this release intends to resolve a specific vulnerability you can highlight a shared Vulnerability reference number(s)Optional

    Patch Event

    Patches are often supplied to customer in an Out-Of-Band procedure to address critical bugs or vulnerabilities, usually with a short-term turnaround that can be outside the normal release cadence.

    It is typically expected a Patch should contain its own SBOM separate to the Primary SBOM.

    Patch Event Attribute Namespace

    The sbom_patch_ prefix is used to designate attributes that are part of the event. Some of these are interpreted by DataTrails and others are guidelines.

    NTIA AttributeEvent AttributesMeaningRequirement
    N/Aarc_display_typeTells DataTrails how to interpret EventRequired, must set to Patch
    Component Namesbom_patch_target_componentThe component the Patch targetsRequired
    Version Stringsbom_patch_versionThe version string of the PatchRequired
    Author Namesbom_patch_authorThe name of the Patch AuthorRequired
    Supplier Namesbom_patch_supplierThe name of the Patch SupplierRequired
    Component Hashsbom_patch_hashThe hash of the Patch files/installation (per version)Required
    Unique Identifiersbom_patch_uuidThe accepted unique identifier for the Package, DataTrails provides a Unique ID per asset but it may be preferred to include an existing internal reference insteadRequired
    N/Asbom_patch_target_versionThe version of the component the patch is targeted/built fromRequired
    N/Asbom_patch_repoLink to the Git Repo/Fork/Branch of the Component (if different to the latest release repo)Optional
    N/Asbom_patch_licenseThe licensing used by the component (if specified and different to the latest release license)Optional
    N/Asbom_patch_vuln_referenceIf this patch resolves a specific vulnerability you can highlight a shared Vulnerability reference numberOptional

    Vulnerability Disclosure and Update

    These Event types are used for vulnerability management. -The first is to disclose knowledge of a vulnerability and the second is to update the status of the vulnerability after investigation is complete.

    Vulnerability Disclosure Event Attribute Namespace

    The vuln_ prefix is used to designate attributes that are part of the event. All of these are interpreted by DataTrails.

    Vulnerability Disclosure

    Event AttributesMeaningRequirement
    arc_display_typeTells DataTrails how to interpret EventRequired, must set to Vulnerability Disclosure
    vuln_nameFriendly Name for the VulnerabilityRequired
    vuln_referenceReference Number (e.g. internal tracking number), useful when there may be multiple updates to a vulnerability during an investigation and for referencing when a particular release is expected to solve a vulnerabilityRequired
    vuln_idSpecific ID of Vulnerability (e.g CVE-2018-0171)Required
    vuln_categoryType of Vulnerability (e.g. CVE)Required
    vuln_severitySeverity of Vulnerability (e.g. HIGH)Required
    vuln_statusWhether the Vulnerability actually affects your component or is being investigated (e.g Known_not_affected)Required
    vuln_authorAuthor of Vulnerability DisclosureRequired
    vuln_target_componentAffected ComponentRequired
    vuln_target_versionAffected Version(s)Required

    Vulnerability Update

    Event AttributesMeaningRequirement
    arc_display_typeTells DataTrails how to interpret EventRequired, must set to Vulnerability Update
    vuln_nameFriendly Name for the VulnerabilityRequired
    vuln_referenceReference Number (e.g. internal tracking number), useful when there may be multiple updates to a vulnerability during an investigation and for referencing when a particular release is expected to solve a vulnerabilityRequired
    vuln_idSpecific ID of Vulnerability (e.g CVE-2018-0171)Required
    vuln_categoryType of Vulnerability (e.g. CVE)Required
    vuln_severitySeverity of Vulnerability (e.g. HIGH)Required
    vuln_statusWhether the Vulnerability actually affects your component or is being investigated (e.g Known_not_affected)Required
    vuln_authorAuthor of Vulnerability DisclosureRequired
    vuln_target_componentAffected ComponentRequired
    vuln_target_versionAffected Version(s)Required

    EOL Event

    EOL Event Attribute Namespace

    The sbom_eol_ prefix is used to designate attributes that are part of the event. All of these are interpreted by DataTrails.

    An event to mark the Package as End of Life.

    NTIA AttributeEvent AttributesMeaningRequirement
    N/Aarc_display_typeTells DataTrails how to interpret EventRequired, must set to EOL
    Component Namesbom_eol_target_componentThe component the EOL targetsRequired
    Version Stringsbom_eol_target_versionThe version string affected by the EOLRequired
    Author Namesbom_eol_authorThe name of the EOL AuthorRequired
    Unique Identifiersbom_eol_uuidThe accepted unique identifier for the Package, DataTrails provides a Unique ID per asset but it may be preferred to include an existing internal reference insteadRequired
    N/Asbom_eol_target_dateThe date on which the EOL will be activeRequired

    ← Document Profile
    Independently verifying DataTrails transparent merkle logs →
    \ No newline at end of file +The first is to disclose knowledge of a vulnerability and the second is to update the status of the vulnerability after investigation is complete.

    Vulnerability Disclosure Event Attribute Namespace

    The vuln_ prefix is used to designate attributes that are part of the event. All of these are interpreted by DataTrails.

    Vulnerability Disclosure

    Event AttributesMeaningRequirement
    arc_display_typeTells DataTrails how to interpret EventRequired, must set to Vulnerability Disclosure
    vuln_nameFriendly Name for the VulnerabilityRequired
    vuln_referenceReference Number (e.g. internal tracking number), useful when there may be multiple updates to a vulnerability during an investigation and for referencing when a particular release is expected to solve a vulnerabilityRequired
    vuln_idSpecific ID of Vulnerability (e.g CVE-2018-0171)Required
    vuln_categoryType of Vulnerability (e.g. CVE)Required
    vuln_severitySeverity of Vulnerability (e.g. HIGH)Required
    vuln_statusWhether the Vulnerability actually affects your component or is being investigated (e.g Known_not_affected)Required
    vuln_authorAuthor of Vulnerability DisclosureRequired
    vuln_target_componentAffected ComponentRequired
    vuln_target_versionAffected Version(s)Required

    Vulnerability Update

    Event AttributesMeaningRequirement
    arc_display_typeTells DataTrails how to interpret EventRequired, must set to Vulnerability Update
    vuln_nameFriendly Name for the VulnerabilityRequired
    vuln_referenceReference Number (e.g. internal tracking number), useful when there may be multiple updates to a vulnerability during an investigation and for referencing when a particular release is expected to solve a vulnerabilityRequired
    vuln_idSpecific ID of Vulnerability (e.g CVE-2018-0171)Required
    vuln_categoryType of Vulnerability (e.g. CVE)Required
    vuln_severitySeverity of Vulnerability (e.g. HIGH)Required
    vuln_statusWhether the Vulnerability actually affects your component or is being investigated (e.g Known_not_affected)Required
    vuln_authorAuthor of Vulnerability DisclosureRequired
    vuln_target_componentAffected ComponentRequired
    vuln_target_versionAffected Version(s)Required

    EOL Event

    EOL Event Attribute Namespace

    The sbom_eol_ prefix is used to designate attributes that are part of the event. All of these are interpreted by DataTrails.

    An event to mark the Package as End of Life.

    NTIA AttributeEvent AttributesMeaningRequirement
    N/Aarc_display_typeTells DataTrails how to interpret EventRequired, must set to EOL
    Component Namesbom_eol_target_componentThe component the EOL targetsRequired
    Version Stringsbom_eol_target_versionThe version string affected by the EOLRequired
    Author Namesbom_eol_authorThe name of the EOL AuthorRequired
    Unique Identifiersbom_eol_uuidThe accepted unique identifier for the Package, DataTrails provides a Unique ID per asset but it may be preferred to include an existing internal reference insteadRequired
    N/Asbom_eol_target_dateThe date on which the EOL will be activeRequired

    ← Document Profile
    Independently verifying DataTrails transparent merkle logs →
    \ No newline at end of file diff --git a/developers/developer-patterns/veracity/index.html b/developers/developer-patterns/veracity/index.html index 6b5371b4c..1fa0a0882 100644 --- a/developers/developer-patterns/veracity/index.html +++ b/developers/developer-patterns/veracity/index.html @@ -102,4 +102,4 @@

    The value returned is the hash stored at that node:

    26c7061166187363dd156f4f5f1f517a39323af3c70d572de28c5206de160ec2
     

    Leaf nodes in the merkle log contain the hash of the event data (plus some metadata, see this article) while -intermediate nodes hash together the content of their left and right children.

    ← Software Package Profile
    Navigating the Merkle Log →
    \ No newline at end of file +intermediate nodes hash together the content of their left and right children.

    ← Software Package Profile
    Navigating the Merkle Log →
    \ No newline at end of file diff --git a/developers/index.html b/developers/index.html index ef6cd58bd..d6b8cdd34 100644 --- a/developers/index.html +++ b/developers/index.html @@ -5,4 +5,4 @@

    Developers

    If you are a developer who is looking to easily add provenance to their data, this section is for you.
    You may be building a new application or looking for a way to add functionality to something that you already use every day.

    The DataTrails REST API, python SDK, or the YAML runner provide a simple way for you to integrate a provenance layer into your existing data platform so that you do not need to change the way that your users work.

    Check out the sub-sections below for more information!

    Developer Patterns →
    Go here for information on setting up an App Registration, requesting an Access Token together with other developer concepts and user profile descriptions.

    API Reference →
    The DataTrails REST API endpoint examples and definitions can be found here.

    YAML Runner Reference →
    The YAML reference contains information and examples for those who work with YAML files and would prefer to use this method to access the API.

    Additional resources are available from our Python SDK and the Python Samples.

    \ No newline at end of file +Sign Up

    Developers

    If you are a developer who is looking to easily add provenance to their data, this section is for you.
    You may be building a new application or looking for a way to add functionality to something that you already use every day.

    The DataTrails REST API, python SDK, or the YAML runner provide a simple way for you to integrate a provenance layer into your existing data platform so that you do not need to change the way that your users work.

    Check out the sub-sections below for more information!

    Developer Patterns →
    Go here for information on setting up an App Registration, requesting an Access Token together with other developer concepts and user profile descriptions.

    API Reference →
    The DataTrails REST API endpoint examples and definitions can be found here.

    YAML Runner Reference →
    The YAML reference contains information and examples for those who work with YAML files and would prefer to use this method to access the API.

    Additional resources are available from our Python SDK and the Python Samples.

    \ No newline at end of file diff --git a/developers/templates/index.html b/developers/templates/index.html index 0b5b18eca..6e4fd95bd 100644 --- a/developers/templates/index.html +++ b/developers/templates/index.html @@ -7,4 +7,4 @@
    \ No newline at end of file +Other templates are more generic, providing a baseline for getting started.

    Check out the articles below for more information:

    Creating DataTrails Events for vCons→
    Creating SCITT Entries on the DataTrails Platform →
    \ No newline at end of file diff --git a/developers/templates/scitt/index.html b/developers/templates/scitt/index.html index 510955474..5e5356f35 100644 --- a/developers/templates/scitt/index.html +++ b/developers/templates/scitt/index.html @@ -9,7 +9,7 @@ Developer Patterns
  • SCITT vCon Template

    Register SCITT Signed Statements for vCon Updates

    vCons safely and securely carry conversations from the network elements that create them to the applications that analyze them, enabling responsible management of the most personal of data. +YAML Runner Reference

    SCITT vCon Template

    Register SCITT Signed Statements for vCon Updates

    vCons safely and securely carry conversations from the network elements that create them to the applications that analyze them, enabling responsible management of the most personal of data. Recording the current state of a vCon on a SCITT Transparency Service secures the integrity and inclusion of the vCon from tampering or deleting a specific version.

    This template provides a standard set of COSE Headers and mapping to vCons, providing integrity and inclusion protection while mitigating potential PII concerns.

    The Supply Chain Integrity, Transparency and Trust (SCITT) initiative is a set of IETF standards for managing the compliance and auditability of goods and services across end-to-end supply chains. SCITT supports the ongoing verification of goods and services where the authenticity of entities, evidence, policy, and artifacts can be assured and the actions of entities can be guaranteed to be authorized, non-repudiable, immutable, and auditable.

    The following provides a template for securing a vCon with a SCITT Signed Statement.

    Version

    Template Version 0.2.0

    vCon Signed Statement Example

    The following example highlights a typical SCITT Signed Statement, based on a vCon:

    COSE Hash Envelope and @@ -65,6 +65,7 @@ 0: 'timestamp_declared": '2024-05-07T16:33:29.004994', 0: 'vcon_operation": 'vcon_create', 0: 'vcon_draft_version": '01', + 0: 'scitt_draft_version": '10' ] 15: { / CWT Claims / 1: 'example.com', / Issuer / @@ -84,7 +85,8 @@ "conserver_link_version": "0.2.0", "timestamp_declared": "2024-05-07T16:33:29.004994", "vcon_operation": "vcon_create", - "vcon_draft_version": "01" + "vcon_draft_version": "01", + "scitt_draft_version": "10" }

    The link type as named under the conserver links folder.

    While optional, this value is useful for tracing and debugging, knowing the source of the statement, long after troubleshooting or auditing may be needed.

    For the SCITT Conserver Link, this value would be scitt

    vCons are processed by workflow pipelines that run multiple steps. @@ -141,9 +143,11 @@ All entries related to the same vCon version (updated_at | hash), should likely be considered equal in timing.

    vcon_operation (REQUIRED)

    A SCITT Signed Statement should be created for each completed vCon operation. For every creation and update to a vCon, a SCITT Statement would seal the vCon, recording it on the ledger for inclusion and verification. The defined lifecycle events of a vCon will likely evolve with the standard. -For now, the vcon_operation (string) is the placeholder.

    vcon_draft_version (REQUIRED)

    IETF Draft version, providing interoperable stability within a draft version. +For now, the vcon_operation (string) is the placeholder.

    vcon_draft_version (REQUIRED)

    IETF vCon Draft version, providing interoperable stability within a draft version. This document is aligned with -draft version 01

    Verifying vCons

    DataTrails provides several APIs for verifying the integrity and inclusion of changes to a vCons history. +draft version 01

    scitt_draft_version (REQUIRED)

    IETF SCITT Draft version, providing interoperable stability within a draft version. +This document is aligned with +draft version 01

    Verifying vCons

    DataTrails provides several APIs for verifying the integrity and inclusion of changes to a vCons history. These changes are being proposed to the SCITT Reference API (SCRAPI).

    We’ll also explore specific vCon scenarios, such as consent and revocation validation.

    Retrieving All vCon Events

    For each important operation performed on a vCon, a SCITT Signed Statement should be recorded.

    To align with SCITT semantics, the vcon_uuid is set to the DataTrails subject event attribute. (event_attributes.subject)

    To query the history of SCITT Signed Statements for a given vCon, use the following:

    • For bash/curl commands, configure the .datatrails/bearer-token.txt using the DataTrails Creating Access Tokens developer docs.

    • Query the collection of SCITT Signed Statements, using the subject attribute. Set the VCON env variable to the vcon_uuid

      DATATRAILS_EVENTS_URL="https://app.datatrails.ai/archivist/v2/assets/-/events"
      @@ -174,4 +178,4 @@
       curl -g -X GET -H "@$HOME/.datatrails/bearer-token.txt" \
         "$DATATRAILS_EVENTS_URL?event_attributes.subject=vcon://$VCON&principal_declared.issuer=https://app.datatrails.ai/appidpv1&principal_declared.subject=$PRINCIPAL" \
         | jq
      -

    More Info:

    \ No newline at end of file +

    More Info:

    \ No newline at end of file diff --git a/developers/templates/vcons/index.html b/developers/templates/vcons/index.html index a92304946..36d87850d 100644 --- a/developers/templates/vcons/index.html +++ b/developers/templates/vcons/index.html @@ -9,7 +9,7 @@ Developer Patterns
  • DataTrails Event vCon Template

    Securing vCons with DataTrails Events

    vCons safely and securely carry conversations from the network elements that create them to the applications that analyze them, enabling responsible management of the most personal of data. +YAML Runner Reference

    DataTrails Event vCon Template

    Securing vCons with DataTrails Events

    vCons safely and securely carry conversations from the network elements that create them to the applications that analyze them, enabling responsible management of the most personal of data. Recording the current state of a vCon on DataTrails secures the integrity and inclusion of the vCon from tampering or deleting a specific version.

    Version

    Template Version 0.2.0

    vCon Event Example

    The following provides a template for how to secure a vCon on DataTrails.

    The following example highlights a typical DataTrails Event, based on a vCon:

    {
       "operation": "Record",
    @@ -25,10 +25,11 @@
         "subject": "vcon://bbba043b-xxxx-xxxx-xxxx-ac3ddd0303af",
         "timestamp_declared": "2024-05-07T16:33:29.004994",
         "vcon_operation": "vcon_create",
    -    "vcon_draft_version": "01"
    +    "vcon_draft_version": "01",
    +    "scitt_draft_version": "10"
       }
     }
    -

    DataTrails Event to SCITT Mapping

    The following DataTrails Event attributes map to a SCITT Signed Statement:

    DataTrails AttributeSCITT
    arc_display_type
    conserver_linkmetamap.conserver_link
    conserver_link_namemetamap.conserver_link_name
    conserver_link_versionmetamap.conserver_link_version
    payloadprotected-header.payload
    payload_hash_algprotected-header.payload_hash_alg
    payload_pre_image_content_typeprotected-header.payload_pre_image_content_type
    subjectprotected-header.cwt-claims.subject
    timestamp_declaredmetamap.timestamp_declared
    vcon_draft_versionmetamap.vcon_draft_version
    vcon_operationmetamap.vcon_operation

    arc_display_type (REQUIRED)

    Default within DataTrails to categorize events. +

    DataTrails Event to SCITT Mapping

    The following DataTrails Event attributes map to a SCITT Signed Statement:

    DataTrails AttributeSCITT
    arc_display_type
    conserver_linkmetamap.conserver_link
    conserver_link_namemetamap.conserver_link_name
    conserver_link_versionmetamap.conserver_link_version
    payloadprotected-header.payload
    payload_hash_algprotected-header.payload_hash_alg
    payload_pre_image_content_typeprotected-header.payload_pre_image_content_type
    subjectprotected-header.cwt-claims.subject
    timestamp_declaredmetamap.timestamp_declared
    vcon_draft_versionmetamap.vcon_draft_version
    vcon_operationmetamap.vcon_operation
    scitt_draft_versionmetamap.scitt_draft_version

    arc_display_type (REQUIRED)

    Default within DataTrails to categorize events. arc_display_type is also the default means to configure permissions for which type of events a client may view and/or edit.

    For simplicity in configuring permissions, this property is a duplicate of the vcon_operation but could vary in advanced scenarios.

    The link type as named under the conserver links folder.

    While optional, this value is useful for tracing and debugging, knowing the source of the statement, long after troubleshooting or auditing may be needed.

    For the @@ -96,9 +97,11 @@ All entries related to the same vCon version (updated_at | hash), should likely be considered equal in timing.

    vcon_operation (REQUIRED)

    A DataTrails Event should be created for each completed vCon operation. For every creation and update to a vCon, a SCITT Statement would seal the vCon, recording it on the ledger for inclusion and verification. The defined lifecycle events of a vCon will likely evolve with the standard. -For now, the vcon_operation (string) is the placeholder.

    vcon_draft_version (REQUIRED)

    IETF Draft version, providing interoperable stability within a draft version. +For now, the vcon_operation (string) is the placeholder.

    vcon_draft_version (REQUIRED)

    IETF vCon Draft version, providing interoperable stability within a draft version. This document is aligned with -draft version 01

    Verifying vCons

    DataTrails provides several APIs for verifying the integrity and inclusion of changes to a vCons history.

    We’ll also explore specific vCon scenarios, such as consent and revocation validation.

    Retrieving All vCon Events

    For each important operation performed on a vCon, a DataTrails Event (SCITT Signed Statement) should be recorded.

    To align with SCITT semantics, the vcon_uuid is set to the DataTrails subject event attribute. (event_attributes.subject)

    To query the history of DataTrails Events for a given vCon, use the following:

    • For bash/curl commands, configure the .datatrails/bearer-token.txt using the DataTrails +draft version 01

      scitt_draft_version (REQUIRED)

      IETF SCITT Draft version, providing interoperable stability within a draft version. +This document is aligned with +draft version 01

      Verifying vCons

      DataTrails provides several APIs for verifying the integrity and inclusion of changes to a vCons history.

      We’ll also explore specific vCon scenarios, such as consent and revocation validation.

      Retrieving All vCon Events

      For each important operation performed on a vCon, a DataTrails Event (SCITT Signed Statement) should be recorded.

      To align with SCITT semantics, the vcon_uuid is set to the DataTrails subject event attribute. (event_attributes.subject)

      To query the history of DataTrails Events for a given vCon, use the following:

      • For bash/curl commands, configure the .datatrails/bearer-token.txt using the DataTrails Creating Access Tokens developer docs.

      • Query the collection of DataTrails Events, using the subject attribute. Set the VCON env variable to the vcon_uuid

        DATATRAILS_EVENTS_URL="https://app.datatrails.ai/archivist/v2/assets/-/events"
         VCON="bbba043b-d1aa-4691-8739-ac3ddd0303af"
        @@ -128,4 +131,4 @@
         curl -g -X GET -H "@$HOME/.datatrails/bearer-token.txt" \
           "$DATATRAILS_EVENTS_URL?event_attributes.subject=vcon://$VCON&principal_declared.issuer=https://app.datatrails.ai/appidpv1&principal_declared.subject=$PRINCIPAL" \
           | jq
        -

      More Info:

    \ No newline at end of file +

    More Info:

    \ No newline at end of file diff --git a/developers/yaml-reference/assets/index.html b/developers/yaml-reference/assets/index.html index 294a4c701..170831785 100644 --- a/developers/yaml-reference/assets/index.html +++ b/developers/yaml-reference/assets/index.html @@ -84,4 +84,4 @@ description: Wait for all Assets in the wipp namespace to be confirmed attrs: arc_namespace: wipp -

    ← YAML Runner Components
    Events YAML Runner →
    \ No newline at end of file +

    ← YAML Runner Components
    Events YAML Runner →
    \ No newline at end of file diff --git a/developers/yaml-reference/compliance/index.html b/developers/yaml-reference/compliance/index.html index ac1c6b9c3..6faa158a9 100644 --- a/developers/yaml-reference/compliance/index.html +++ b/developers/yaml-reference/compliance/index.html @@ -30,4 +30,4 @@ description: Check Compliance of EV pump 1. report: true asset_label: ev pump 1 -

    ← Subjects YAML Runner
    Estate Information YAML Runner →
    \ No newline at end of file +

    ← Subjects YAML Runner
    Estate Information YAML Runner →
    \ No newline at end of file diff --git a/developers/yaml-reference/estate-info/index.html b/developers/yaml-reference/estate-info/index.html index d7a7b508f..626a58546 100644 --- a/developers/yaml-reference/estate-info/index.html +++ b/developers/yaml-reference/estate-info/index.html @@ -14,4 +14,4 @@ - step: action: COMPOSITE_ESTATE_INFO description: Estate Info Report -

    ← Compliance Policies YAML Runner
    Caps API →
    \ No newline at end of file +

    ← Compliance Policies YAML Runner
    Caps API →
    \ No newline at end of file diff --git a/developers/yaml-reference/events/index.html b/developers/yaml-reference/events/index.html index a11283d59..d1568f271 100644 --- a/developers/yaml-reference/events/index.html +++ b/developers/yaml-reference/events/index.html @@ -90,4 +90,4 @@ arc_display_type: open asset_attrs: arc_display_type: door -

    ← Assets YAML Runner
    Locations YAML Runner →
    \ No newline at end of file +

    ← Assets YAML Runner
    Locations YAML Runner →
    \ No newline at end of file diff --git a/developers/yaml-reference/index.html b/developers/yaml-reference/index.html index afb35ad60..1ee64c493 100644 --- a/developers/yaml-reference/index.html +++ b/developers/yaml-reference/index.html @@ -5,4 +5,4 @@
    \ No newline at end of file +Sign Up
    \ No newline at end of file diff --git a/developers/yaml-reference/locations/index.html b/developers/yaml-reference/locations/index.html index b6fa440f7..b9da7fb40 100644 --- a/developers/yaml-reference/locations/index.html +++ b/developers/yaml-reference/locations/index.html @@ -44,4 +44,4 @@ print_response: true attrs: director: John Smith -

    ← Events YAML Runner
    Subjects YAML Runner →
    \ No newline at end of file +

    ← Events YAML Runner
    Subjects YAML Runner →
    \ No newline at end of file diff --git a/developers/yaml-reference/story-runner-components/index.html b/developers/yaml-reference/story-runner-components/index.html index ea2b670d5..3b7e426aa 100644 --- a/developers/yaml-reference/story-runner-components/index.html +++ b/developers/yaml-reference/story-runner-components/index.html @@ -24,4 +24,4 @@ --client-id <your-client-id> \ --client-secret <your-client-secret> \ <path-to-yaml-file> -

    ← Tenancies API
    Assets YAML Runner →
    \ No newline at end of file +

    ← Tenancies API
    Assets YAML Runner →
    \ No newline at end of file diff --git a/developers/yaml-reference/subjects/index.html b/developers/yaml-reference/subjects/index.html index efdfa9dba..740c54281 100644 --- a/developers/yaml-reference/subjects/index.html +++ b/developers/yaml-reference/subjects/index.html @@ -91,4 +91,4 @@ print_response: true subject_label: A subject `` -

    ← Locations YAML Runner
    Compliance Policies YAML Runner →
    \ No newline at end of file +

    ← Locations YAML Runner
    Compliance Policies YAML Runner →
    \ No newline at end of file diff --git a/glossary/common-datatrails-terms/index.html b/glossary/common-datatrails-terms/index.html index 49fef417e..cdd3bd653 100644 --- a/glossary/common-datatrails-terms/index.html +++ b/glossary/common-datatrails-terms/index.html @@ -8,4 +8,4 @@

    Common DataTrails Terms

    Select a term for more information.

    TermDefinition
    ABACAttribute-Based Access Control; policy that allows you to grant fine-grain access to members of your Tenancy
    access policygrants chosen Asset and Event access to stakeholders
    actorperson/machine/software integration that created a particular entry on the provenance record
    administratoruser with permission to see all Asset and Event information within a Tenancy, and to grant access to other users
    anchoredSimple Hash events are committed to the blockchain by hashing them in batches. The hash recorded on the chain is called the anchor
    asseta DataTrails Asset is an entry in your tenancy, which has a collection of attributes that describes its current state and a complete life history of Events
    asset attributeskey-value pairs that represent information about an Asset
    asset IDthe permanent unique identifier for an Asset, under which all provenance information (Events) can be found
    audit traila formal record of activities (Events) that are made against a piece of data (an Asset)
    bearer tokenaccess token for DataTrails API; created using Custom Integration credentials
    behaviorsdetail what class of events in an Asset lifecycle you might wish to record
    compliance policyuser-defined rule sets that Assets can be tested against
    custom integrationclient ID and client secret credentials that are used to access the DataTrails API. Formerly known as an App Registration
    document hashcryptographic ‘fingerprint’ of a file or document that proves it is unmodified
    document statuswhen dealing with Document profile Assets in DataTrails you can attach certain lifecycle stage metadata to them such as ‘Draft’, ‘Published’, or ‘Withdrawn’ in order to properly convey whether or not someone checking provenance of the document should rely on a particular version
    eventtracks key moments of an Asset lifecycle; details of Who Did What When to an Asset
    event attributeskey-value pairs that represent information about an Event
    event IDunique identifier for an entry in the provenance record that means it can be shared and found later
    event typeevents in DataTrails are labeled with a ’type’ that signify what kind of evidence they relate to, for instance a ‘Publish’ event on a document, or a ‘Shipping’ event on physical goods. Event types can be very useful for defining access control rules as well as filtering the audit trail for specific kinds of information
    integrationbuilt-in API functionality that allows DataTrails to connect to third party products such as Dropbox
    leafa leaf is the term used for a node in the Merkle tree. It is labeled with a hash of the data block that it contains. Each leaf is stored in a massif
    linked foldera folder that has been selected to be linked to DataTrails during the configuration of an Integration
    massifthe Merkle log is divided into massifs each of which stores the verification data for a fixed number of leaves
    Merkle logthe Merkle log is the name for the verifiable data structure that is used by DataTrails to store the Event transaction data. It is append only and is based on a type of Merkle tree that is built from multiple massifs
    Merkle Mountain Range (MMR)As the massifs grow and multiply, the structure is called a Merkle Mountain Range (MMR) representing the multiple peaks. Its key characteristic is that previously added values, and also the organization of those values, does not change as new entries are appended to the log
    metadatastructured information about a file. In DataTrails this metadata is recorded in the Asset and Event attributes
    OBACOrganization-Based Access Control; policy allows sharing with the Administrator of another organization
    operationclass of Event being recorded
    organizationany entity with a distinct DataTrails account who publishes or verifies provenance information on the platform
    principal_acceptedthe actual user principal information belonging to the credential used to access the DataTrails REST interface
    principal_declaredan optional user-supplied value that tells who performed an Event
    proof mechanismmethod by which information on the DataTrails tamper evident ledger can be verified
    provenancethe version and ownership history of a piece of data. With DataTrails this is an immutable audit trail to prove Who Did What When to any piece of data
    public assetAssets that can be used to publicly assert data, accessible by URL without the need for a DataTrails account
    selectoridentifying attribute the Yaml Runner will use to check if your Asset exists already before attempting to create it
    simple hashProof Mechanism that commits information to the DataTrails blockchain in batches; value can confirm that information in the batch has not changed
    tenancyan organization’s private area within DataTrails, containing Asset and Event data
    tenant display namedisplayed only within own Tenancy for easy identification and switching
    tenant_acceptedthe time an event was actually received on the DataTrails REST interface
    tenant_committedthe time an event was confirmed distributed to all DLT nodes in the value chain
    tenant_declaredan optional user-supplied value that tells when an Event happened
    transactionfinal commitment of data to the Distributed Ledger Technology so that it is sealed and cannot be modified, tampered or erased
    unlinked foldera folder that has not been selected to be linked to DataTrails during the configuration or reconfiguration of an Integration
    verified domaintenancy name visible to others in place of the tenancy ID when viewing the Asset Overview of a public Asset or a shared private Asset. Must be verified by the DataTrails team
    verified organizationan organization which has paid to have their domain verified and displayed in place of their tenancy ID in Instaproof results and in the Asset Overview
    versionwhen dealing with Document profile Assets in DataTrails you can differentiate ‘final’ or ‘published’ versions of a document from other provenance information such as reviews or downloads

    \ No newline at end of file +Glossary

    Common DataTrails Terms

    Select a term for more information.

    TermDefinition
    ABACAttribute-Based Access Control; policy that allows you to grant fine-grain access to members of your Tenancy
    access policygrants chosen Asset and Event access to stakeholders
    actorperson/machine/software integration that created a particular entry on the provenance record
    administratoruser with permission to see all Asset and Event information within a Tenancy, and to grant access to other users
    anchoredSimple Hash events are committed to the blockchain by hashing them in batches. The hash recorded on the chain is called the anchor
    asseta DataTrails Asset is an entry in your tenancy, which has a collection of attributes that describes its current state and a complete life history of Events
    asset attributeskey-value pairs that represent information about an Asset
    asset IDthe permanent unique identifier for an Asset, under which all provenance information (Events) can be found
    audit traila formal record of activities (Events) that are made against a piece of data (an Asset)
    bearer tokenaccess token for DataTrails API; created using Custom Integration credentials
    behaviorsdetail what class of events in an Asset lifecycle you might wish to record
    compliance policyuser-defined rule sets that Assets can be tested against
    custom integrationclient ID and client secret credentials that are used to access the DataTrails API. Formerly known as an App Registration
    document hashcryptographic ‘fingerprint’ of a file or document that proves it is unmodified
    document statuswhen dealing with Document profile Assets in DataTrails you can attach certain lifecycle stage metadata to them such as ‘Draft’, ‘Published’, or ‘Withdrawn’ in order to properly convey whether or not someone checking provenance of the document should rely on a particular version
    eventtracks key moments of an Asset lifecycle; details of Who Did What When to an Asset
    event attributeskey-value pairs that represent information about an Event
    event IDunique identifier for an entry in the provenance record that means it can be shared and found later
    event typeevents in DataTrails are labeled with a ’type’ that signify what kind of evidence they relate to, for instance a ‘Publish’ event on a document, or a ‘Shipping’ event on physical goods. Event types can be very useful for defining access control rules as well as filtering the audit trail for specific kinds of information
    integrationbuilt-in API functionality that allows DataTrails to connect to third party products such as Dropbox
    leafa leaf is the term used for a node in the Merkle tree. It is labeled with a hash of the data block that it contains. Each leaf is stored in a massif
    linked foldera folder that has been selected to be linked to DataTrails during the configuration of an Integration
    massifthe Merkle log is divided into massifs each of which stores the verification data for a fixed number of leaves
    Merkle logthe Merkle log is the name for the verifiable data structure that is used by DataTrails to store the Event transaction data. It is append only and is based on a type of Merkle tree that is built from multiple massifs
    Merkle Mountain Range (MMR)As the massifs grow and multiply, the structure is called a Merkle Mountain Range (MMR) representing the multiple peaks. Its key characteristic is that previously added values, and also the organization of those values, does not change as new entries are appended to the log
    metadatastructured information about a file. In DataTrails this metadata is recorded in the Asset and Event attributes
    OBACOrganization-Based Access Control; policy allows sharing with the Administrator of another organization
    operationclass of Event being recorded
    organizationany entity with a distinct DataTrails account who publishes or verifies provenance information on the platform
    principal_acceptedthe actual user principal information belonging to the credential used to access the DataTrails REST interface
    principal_declaredan optional user-supplied value that tells who performed an Event
    proof mechanismmethod by which information on the DataTrails tamper evident ledger can be verified
    provenancethe version and ownership history of a piece of data. With DataTrails this is an immutable audit trail to prove Who Did What When to any piece of data
    public assetAssets that can be used to publicly assert data, accessible by URL without the need for a DataTrails account
    selectoridentifying attribute the Yaml Runner will use to check if your Asset exists already before attempting to create it
    simple hashProof Mechanism that commits information to the DataTrails blockchain in batches; value can confirm that information in the batch has not changed
    tenancyan organization’s private area within DataTrails, containing Asset and Event data
    tenant display namedisplayed only within own Tenancy for easy identification and switching
    tenant_acceptedthe time an event was actually received on the DataTrails REST interface
    tenant_committedthe time an event was confirmed distributed to all DLT nodes in the value chain
    tenant_declaredan optional user-supplied value that tells when an Event happened
    transactionfinal commitment of data to the Distributed Ledger Technology so that it is sealed and cannot be modified, tampered or erased
    unlinked foldera folder that has not been selected to be linked to DataTrails during the configuration or reconfiguration of an Integration
    verified domaintenancy name visible to others in place of the tenancy ID when viewing the Asset Overview of a public Asset or a shared private Asset. Must be verified by the DataTrails team
    verified organizationan organization which has paid to have their domain verified and displayed in place of their tenancy ID in Instaproof results and in the Asset Overview
    versionwhen dealing with Document profile Assets in DataTrails you can differentiate ‘final’ or ‘published’ versions of a document from other provenance information such as reviews or downloads

    \ No newline at end of file diff --git a/glossary/index.html b/glossary/index.html index 80c63ab75..0db50f0b3 100644 --- a/glossary/index.html +++ b/glossary/index.html @@ -5,4 +5,4 @@

    Glossary

    Select an option to to find out more about the terms used by DataTrails.

    • Common DataTrails Terms: A list of terms used by DataTrails.
    • Reserved Attributes: A list of Asset attributes that are used by the DataTrails platform and have a specific purpose.

    \ No newline at end of file +Sign Up

    Glossary

    Select an option to to find out more about the terms used by DataTrails.

    • Common DataTrails Terms: A list of terms used by DataTrails.
    • Reserved Attributes: A list of Asset attributes that are used by the DataTrails platform and have a specific purpose.

    \ No newline at end of file diff --git a/glossary/reserved-attributes/index.html b/glossary/reserved-attributes/index.html index 825cb0d2f..78c6ab159 100644 --- a/glossary/reserved-attributes/index.html +++ b/glossary/reserved-attributes/index.html @@ -10,4 +10,4 @@

    Reserved Attributes

    Reserved attributes are asset attributes that are used by the DataTrails platform and have a specific purpose. All reserved attributes have the arc_ prefix.

    Select an attribute to see an example of it in use.

    Asset Attributes

    AttributeMeaning
    arc_descriptionbrief description of Asset or Event being recorded
    arc_display_namefriendly name identifier for Assets, Events, and policies
    arc_display_typeclassification of the type of Asset being traced that can be used for grouping or access control
    arc_home_location_identityphysical location to which an Asset nominally ‘belongs’. NOT related to the Asset’s position in space. For that, use arc_gis_* (below)
    arc_primary_imagean image attachment that will display as the thumbnail of an Asset

    Event Attributes

    AttributeMeaning
    arc_correlation_valuelinks Events together for evaluation in Compliance Policies
    arc_gis_lattags the Event as having happened at a particular latitude. Used in the DataTrails UI for mapping
    arc_gis_lngtags the Event as having happened at a particular longitude. Used in the DataTrails UI for mapping
    arc_descriptionbrief description of the Event being recorded
    arc_display_typeclassification of the type of Event being performed that can be used for grouping or access control
    arc_primary_imagean image attachment that will display as the thumbnail of the Event

    \ No newline at end of file +Glossary

    Reserved Attributes

    Reserved attributes are asset attributes that are used by the DataTrails platform and have a specific purpose. All reserved attributes have the arc_ prefix.

    Select an attribute to see an example of it in use.

    Asset Attributes

    AttributeMeaning
    arc_descriptionbrief description of Asset or Event being recorded
    arc_display_namefriendly name identifier for Assets, Events, and policies
    arc_display_typeclassification of the type of Asset being traced that can be used for grouping or access control
    arc_home_location_identityphysical location to which an Asset nominally ‘belongs’. NOT related to the Asset’s position in space. For that, use arc_gis_* (below)
    arc_primary_imagean image attachment that will display as the thumbnail of an Asset

    Event Attributes

    AttributeMeaning
    arc_correlation_valuelinks Events together for evaluation in Compliance Policies
    arc_gis_lattags the Event as having happened at a particular latitude. Used in the DataTrails UI for mapping
    arc_gis_lngtags the Event as having happened at a particular longitude. Used in the DataTrails UI for mapping
    arc_descriptionbrief description of the Event being recorded
    arc_display_typeclassification of the type of Event being performed that can be used for grouping or access control
    arc_primary_imagean image attachment that will display as the thumbnail of the Event

    \ No newline at end of file diff --git a/index.html b/index.html index d1baa2394..9a7ec3d29 100644 --- a/index.html +++ b/index.html @@ -5,4 +5,4 @@
    \ No newline at end of file +Sign Up
    \ No newline at end of file diff --git a/index.min.02cced19d6eb2917a15cee70e828a6758e1b604611b6e071b8a5d634db5d52422dd0bd28b10072f23b3c47d453147848a22ba879a6a6a23d9ff3885c2bbc9e71.js b/index.min.20acb356ab8994ad392c49b6e6e943032b51d54dca17ca694ee1140ce45f5d0132fa31ed23b988c6895965adfd1017db0bd12336a0483612fa066a34339d25aa.js similarity index 99% rename from index.min.02cced19d6eb2917a15cee70e828a6758e1b604611b6e071b8a5d634db5d52422dd0bd28b10072f23b3c47d453147848a22ba879a6a6a23d9ff3885c2bbc9e71.js rename to index.min.20acb356ab8994ad392c49b6e6e943032b51d54dca17ca694ee1140ce45f5d0132fa31ed23b988c6895965adfd1017db0bd12336a0483612fa066a34339d25aa.js index a7e0390b8..7e02189a8 100644 --- a/index.min.02cced19d6eb2917a15cee70e828a6758e1b604611b6e071b8a5d634db5d52422dd0bd28b10072f23b3c47d453147848a22ba879a6a6a23d9ff3885c2bbc9e71.js +++ b/index.min.20acb356ab8994ad392c49b6e6e943032b51d54dca17ca694ee1140ce45f5d0132fa31ed23b988c6895965adfd1017db0bd12336a0483612fa066a34339d25aa.js @@ -101,6 +101,7 @@ SCITT supports the ongoing verification of goods and services where the authenti 0: 'timestamp_declared": '2024-05-07T16:33:29.004994', 0: 'vcon_operation": 'vcon_create', 0: 'vcon_draft_version": '01', + 0: 'scitt_draft_version": '10' ] 15: { / CWT Claims / 1: 'example.com', / Issuer / @@ -135,7 +136,8 @@ There is "conserver_link_version": "0.2.0", "timestamp_declared": "2024-05-07T16:33:29.004994", "vcon_operation": "vcon_create", - "vcon_draft_version": "01" + "vcon_draft_version": "01", + "scitt_draft_version": "10" }

    The link type as named under the conserver links folder.

    @@ -207,9 +209,13 @@ For every creation and update to a vCon, a SCITT Statement would seal the vCon, The defined lifecycle events of a vCon will likely evolve with the standard. For now, the vcon_operation (string) is the placeholder.

    vcon_draft_version (REQUIRED)

    -

    IETF Draft version, providing interoperable stability within a draft version. +

    IETF vCon Draft version, providing interoperable stability within a draft version. This document is aligned with draft version 01

    +

    scitt_draft_version (REQUIRED)

    +

    IETF SCITT Draft version, providing interoperable stability within a draft version. +This document is aligned with +draft version 01

    Verifying vCons

    DataTrails provides several APIs for verifying the integrity and inclusion of changes to a vCons history. These changes are being proposed to the SCITT Reference API (SCRAPI).

    @@ -299,7 +305,8 @@ Recording the current state of a vCon on DataTrails secures the integrity and in "subject": "vcon://bbba043b-xxxx-xxxx-xxxx-ac3ddd0303af", "timestamp_declared": "2024-05-07T16:33:29.004994", "vcon_operation": "vcon_create", - "vcon_draft_version": "01" + "vcon_draft_version": "01", + "scitt_draft_version": "10" } }

    DataTrails Event to SCITT Mapping

    @@ -356,6 +363,10 @@ Recording the current state of a vCon on DataTrails secures the integrity and in vcon_operation metamap.vcon_operation + +scitt_draft_version +metamap.scitt_draft_version +

    arc_display_type (REQUIRED)

    @@ -457,9 +468,13 @@ For every creation and update to a vCon, a SCITT Statement would seal the vCon, The defined lifecycle events of a vCon will likely evolve with the standard. For now, the vcon_operation (string) is the placeholder.

    vcon_draft_version (REQUIRED)

    -

    IETF Draft version, providing interoperable stability within a draft version. +

    IETF vCon Draft version, providing interoperable stability within a draft version. This document is aligned with draft version 01

    +

    scitt_draft_version (REQUIRED)

    +

    IETF SCITT Draft version, providing interoperable stability within a draft version. +This document is aligned with +draft version 01

    Verifying vCons

    DataTrails provides several APIs for verifying the integrity and inclusion of changes to a vCons history.

    We’ll also explore specific vCon scenarios, such as consent and revocation validation.

    @@ -24143,6 +24158,7 @@ SCITT supports the ongoing verification of goods and services where the authenti 0: 'timestamp_declared": '2024-05-07T16:33:29.004994', 0: 'vcon_operation": 'vcon_create', 0: 'vcon_draft_version": '01', + 0: 'scitt_draft_version": '10' ] 15: { / CWT Claims / 1: 'example.com', / Issuer / @@ -24177,7 +24193,8 @@ There is "conserver_link_version": "0.2.0", "timestamp_declared": "2024-05-07T16:33:29.004994", "vcon_operation": "vcon_create", - "vcon_draft_version": "01" + "vcon_draft_version": "01", + "scitt_draft_version": "10" }

    The link type as named under the conserver links folder.

    @@ -24249,9 +24266,13 @@ For every creation and update to a vCon, a SCITT Statement would seal the vCon, The defined lifecycle events of a vCon will likely evolve with the standard. For now, the vcon_operation (string) is the placeholder.

    vcon_draft_version (REQUIRED)

    -

    IETF Draft version, providing interoperable stability within a draft version. +

    IETF vCon Draft version, providing interoperable stability within a draft version. This document is aligned with draft version 01

    +

    scitt_draft_version (REQUIRED)

    +

    IETF SCITT Draft version, providing interoperable stability within a draft version. +This document is aligned with +draft version 01

    Verifying vCons

    DataTrails provides several APIs for verifying the integrity and inclusion of changes to a vCons history. These changes are being proposed to the SCITT Reference API (SCRAPI).

    @@ -24341,7 +24362,8 @@ Recording the current state of a vCon on DataTrails secures the integrity and in "subject": "vcon://bbba043b-xxxx-xxxx-xxxx-ac3ddd0303af", "timestamp_declared": "2024-05-07T16:33:29.004994", "vcon_operation": "vcon_create", - "vcon_draft_version": "01" + "vcon_draft_version": "01", + "scitt_draft_version": "10" } }

    DataTrails Event to SCITT Mapping

    @@ -24398,6 +24420,10 @@ Recording the current state of a vCon on DataTrails secures the integrity and in vcon_operation metamap.vcon_operation + +scitt_draft_version +metamap.scitt_draft_version +

    arc_display_type (REQUIRED)

    @@ -24499,9 +24525,13 @@ For every creation and update to a vCon, a SCITT Statement would seal the vCon, The defined lifecycle events of a vCon will likely evolve with the standard. For now, the vcon_operation (string) is the placeholder.

    vcon_draft_version (REQUIRED)

    -

    IETF Draft version, providing interoperable stability within a draft version. +

    IETF vCon Draft version, providing interoperable stability within a draft version. This document is aligned with draft version 01

    +

    scitt_draft_version (REQUIRED)

    +

    IETF SCITT Draft version, providing interoperable stability within a draft version. +This document is aligned with +draft version 01

    Verifying vCons

    DataTrails provides several APIs for verifying the integrity and inclusion of changes to a vCons history.

    We’ll also explore specific vCon scenarios, such as consent and revocation validation.

    diff --git a/platform/administration/compliance-policies/index.html b/platform/administration/compliance-policies/index.html index 5fb9e03fe..d9dc91b4c 100644 --- a/platform/administration/compliance-policies/index.html +++ b/platform/administration/compliance-policies/index.html @@ -234,4 +234,4 @@ "next_page_token": "", "compliant_at": "2024-01-17T10:16:12Z" } -

    ← Dropbox Integration
    Grouping Assets by Location →
    \ No newline at end of file +

    ← Dropbox Integration
    Grouping Assets by Location →
    \ No newline at end of file diff --git a/platform/administration/dropbox-integration/index.html b/platform/administration/dropbox-integration/index.html index 9193cfdc3..653f1c0f4 100644 --- a/platform/administration/dropbox-integration/index.html +++ b/platform/administration/dropbox-integration/index.html @@ -15,4 +15,4 @@ Publish Event in the provenance metadata record for that file.
    The result is that the auditable provenance record for your files begins at the moment that you link a folder and that an immutable audit trail for each file automatically grows as the files are modified.

    You are free, at any time, to link and unlink a folder at all levels of your folder tree using the instructions at Editing the list of Linked folders

    Please also see our FAQ for more information.

    Note: During configuration, when you link a folder in the UI we will automatically link any subfolders too. Similarly, if you unlink a folder in the UI we will automatically unlink any subfolders.

    If you create a subfolder in Dropbox after the integration has been set up it will be automatically added to the linked folder list. If you delete a subfolder or move it to an unlinked location it will be automatically removed from the linked folder list.

    If a folder is unlinked for any reason, such by as direct configuration or by being moved, the Audit Trail will stop. Relinking the folder will restart the Audit Trail but we cannot recover any Events that happened while the folder was unlinked.

    Note: DataTrails masks the file path and replaces the filename with the Asset ID in the public Asset view that is returned by Instaproof. This is intentional so that private information cannot be accidentally released via the Instaproof search results.
    Knowledge of the filename is not needed to prove provenance because Instaproof will attest and verify the content of a file even if the filename has been changed.
    The permissioned view that is seen by an administrator who is logged into a tenancy will show the file name and the file path.

    Connecting DataTrails to Dropbox

    1. Select Settings or Integrations from the side bar and then the Integrations tab
      Settings
    2. Select Dropbox and then Proceed.
      Proceed
      If you are already logged into Dropbox on the device that you are using to set up the integration then you will proceed directly to step 3.
      If you are not logged in then Dropbox will ask you to authenticate.
      Log in to Dropbox
    3. DataTrails now asks for permission to see metadata for your files and folders. Click Allow to give DataTrails permission to access your Dropbox Folders.
      Select Allow
    4. Select the Dropbox folder that you wish to link to DataTrails and then click Confirm. The contents of this folder and all its subfolders will be added to DataTrails as public Document Profile Assets.
      Select folder and Confirm
    5. You will see a success message. Dropbox will be connected and the selected folders will be linked.
      Success!
      Click on an icon on the right to edit the connection or to disconnect.
      Configuration icons on the right
    6. Check the Asset Overview to see your Dropbox files.
      Assets
      Remember: The filenames of the Dropbox files are masked using the format xxx…

    Editing the list of Linked folders

    1. Select the File icon in DataTrails
      File icon on the right
    2. You will see the list of available folders. Select a folder to link or deselect a folder to unlink and then click Confirm
      Reconfigure folders and Confirm

    Disconnecting DataTrails from Dropbox

    To disconnect DataTrails and Dropbox you have the option to disconnect using both applications.

    1. Select the Disconnect icon in DataTrails
      Disconnect Dropbox
      You will see a warning message.
      Disconnect Warning
      This means that this specific tenancy will no longer be used for provenance. You would do this if you no longer want to use a connected tenancy while continuing to use other connected tenancies.
    2. If you also want to disconnect in Dropbox, log in to Dropbox, select your account and then Settings followed by the Apps tab. Select DataTrails and then Disconnect
      Disconnect DataTrails
      You would disconnect in Dropbox if you no longer wish to use DataTrails for provenance. This will remove access permissions for all your tenancies and should be done after you have disconnected all your individual tenancies in DataTrails.

    This is how to connect and disconnect DataTrails and Dropbox, it is that simple! Please see our -FAQ for more information.

    ← Managing External Access to Your Tenant
    Compliance Policies →
    \ No newline at end of file +FAQ for more information.

    ← Managing External Access to Your Tenant
    Compliance Policies →
    \ No newline at end of file diff --git a/platform/administration/grouping-assets-by-location/index.html b/platform/administration/grouping-assets-by-location/index.html index ea8cdb688..d7a9476b8 100644 --- a/platform/administration/grouping-assets-by-location/index.html +++ b/platform/administration/grouping-assets-by-location/index.html @@ -211,4 +211,4 @@ } }
    Note - The Event must be recorded against the appropriate assets/<asset-id> when the curl command is executed. -See Step 4 here for more details.
    Note - You need to include the full locations/<location-id> reference as using only the UUID will not be recognized.

  • In the following screenshot, note the location of our Asset has been updated

    Completed update of Asset Location

  • ← Compliance Policies
    \ No newline at end of file +See Step 4 here for more details.
    Note - You need to include the full locations/<location-id> reference as using only the UUID will not be recognized.

  • In the following screenshot, note the location of our Asset has been updated

    Completed update of Asset Location

  • ← Compliance Policies
    \ No newline at end of file diff --git a/platform/administration/identity-and-access-management/index.html b/platform/administration/identity-and-access-management/index.html index d35191325..7856bb5a4 100644 --- a/platform/administration/identity-and-access-management/index.html +++ b/platform/administration/identity-and-access-management/index.html @@ -31,4 +31,4 @@ Verified Domain.

    1. Navigate to Settings on the sidebar and select Tenancy.
      Enter your SSO configuration, then select SAVE ENTERPRISE SSO CONFIG. Saving your configuration may take a moment.

      Configure SSO

      NOTE: To retrieve the necessary data for the configuration form, your IDP must be configured to be compatible with DataTrails. Enter the information below.

      Login URI:

      https://app.datatrails.ai/login
       

      Callback URL:

      https://b2carchivistprod3.b2clogin.com/b2carchivistprod3.onmicrosoft.com/oauth2/authresp
       

    2. Now that your details are saved, return to the DataTrails sign-in screen. Select the Single Sign-On option

      Single Sign-On

    3. Enter your -Verified Domain Name

      Verified Domain
      You will be sent to the identity provider you configured earlier to log-in, then redirected back to DataTrails.

    ← Public Attestation
    Verified Domain →
    \ No newline at end of file +Verified Domain Name
    Verified Domain
    You will be sent to the identity provider you configured earlier to log-in, then redirected back to DataTrails.

    ← Public Attestation
    Verified Domain →
    \ No newline at end of file diff --git a/platform/administration/index.html b/platform/administration/index.html index dfba27712..98dc323aa 100644 --- a/platform/administration/index.html +++ b/platform/administration/index.html @@ -5,4 +5,4 @@
    \ No newline at end of file +Sign Up
    \ No newline at end of file diff --git a/platform/administration/sharing-access-inside-your-tenant/index.html b/platform/administration/sharing-access-inside-your-tenant/index.html index 55f0d260f..0eb4f0de5 100644 --- a/platform/administration/sharing-access-inside-your-tenant/index.html +++ b/platform/administration/sharing-access-inside-your-tenant/index.html @@ -115,4 +115,4 @@ -H "Content-type: application/json" \ -d "@/path/to/jsonfile" \ https://app.datatrails.ai/archivist/iam/v1/access_policies -

  • Check the Asset is appropriately shared

    Mandy should only be allowed to see the Asset’s name, type, image, length, and weight attributes.

    Mandy's view as a Non-Administrator

    For comparison with our Administrator, Jill who can see everything:

    Jill's view as a Administrator

  • We can see that Mandy can only view the Attributes specified in the policy.

    Our Administrator, Jill, can see every detail associated with the Asset.

    ← Verified Domain
    Managing External Access to Your Tenant →
    \ No newline at end of file +

  • Check the Asset is appropriately shared

    Mandy should only be allowed to see the Asset’s name, type, image, length, and weight attributes.

    Mandy's view as a Non-Administrator

    For comparison with our Administrator, Jill who can see everything:

    Jill's view as a Administrator

  • We can see that Mandy can only view the Attributes specified in the policy.

    Our Administrator, Jill, can see every detail associated with the Asset.

    ← Verified Domain
    Managing External Access to Your Tenant →
    \ No newline at end of file diff --git a/platform/administration/sharing-access-outside-your-tenant/index.html b/platform/administration/sharing-access-outside-your-tenant/index.html index 21049a94a..c70c4568a 100644 --- a/platform/administration/sharing-access-outside-your-tenant/index.html +++ b/platform/administration/sharing-access-outside-your-tenant/index.html @@ -121,4 +121,4 @@ -d "@/path/to/jsonfile" \ https://app.datatrails.ai/archivist/iam/v1/access_policies

  • Once complete, check the Asset is shared appropriately; Mandy should only be able to see the Name, Type and an Image of the container as well as the Asset’s custom weight and length attributes.

    Mandy's view as an Administrator of the External Organization
    By comparison, our Administrator, Jill, can see the full details of the Asset:
    Jill's view as an Administrator

  • If Mandy wishes to share what she can to Non-Administrators within her organization, it is her responsibility to create an ABAC Policy as she would any other Asset she has access to.

    There are many possible fine-grained controls and as such ABAC and OBAC Policy Creation is an extensive topic. To find out more, head over to the -IAM Policies API Reference.

  • ← Managing Internal Access to Your Tenant
    Dropbox Integration →
    \ No newline at end of file +IAM Policies API Reference.

    ← Managing Internal Access to Your Tenant
    Dropbox Integration →
    \ No newline at end of file diff --git a/platform/administration/verified-domain/index.html b/platform/administration/verified-domain/index.html index 1ec4d2765..2174b3abd 100644 --- a/platform/administration/verified-domain/index.html +++ b/platform/administration/verified-domain/index.html @@ -11,4 +11,4 @@ Tenant Display Name. Tenant display names are internal, appearing only within your own Tenancy, and are not visible to anyone you share with. A verified domain name must be set by the DataTrails team, and will be visible to actors outside your Tenancy.

    Why is it important to verify my organization’s domain?

    Getting your organization’s domain verified indicates that you are who you say you are. This helps close the trust gap inherent to information sharing between organizations or with the public.

    Without domain verification, the Organization is noted as the publisher’s Tenant ID. Verifying your domain not only shows that this information comes from a legitimate actor on behalf of the organization, but also replaces the Tenant ID with your domain name so consumers can more easily identify the publishing organization. For example, someone attesting information on behalf of DataTrails would have datatrails.ai.

    Organization without Verified Domain
    Organization with Verified Domain
    Note: You do not see the badge if you are logged into DataTrails.
    Organization seen when logged in

    How can I get my organization’s domain verified?

    The DataTrails team is happy to help you obtain your verified domain badge. Please contact support@datatrails.ai from an email address which includes the domain you wish to verify. For example, email us from @datatrails.ai to verify the datatrails.ai domain. We will send you a confirmation email to make sure that the details are correct.

    In order to protect our user community, it is important for us to verify that the person making the request is authorized to do so by the owner of the domain. We will carry out some internal checks based on the information that we have been given and we may request further evidence from you to prove that you own or control the domain in question. Typically, this will be in the form of public company information or domain registration records. Please be prepared to share this evidence with us.

    Checking the Verified Domain of an External Organization

    If an organization has a verified domain with DataTrails, it will be displayed when you view a Public Asset they have published. You may also retrieve this information via the API if you know the organization’s Tenant ID.

    curl -v -X GET \
          -H "@$HOME/.datatrails/bearer-token.txt" \
          https://app.datatrails.ai/archivist/v1/tenancies/{uuid}:publicinfo
    -

    ← Identity and Access Management
    Managing Internal Access to Your Tenant →
    \ No newline at end of file +

    ← Identity and Access Management
    Managing Internal Access to Your Tenant →
    \ No newline at end of file diff --git a/platform/index.html b/platform/index.html index 6e8633dd3..8c76d7093 100644 --- a/platform/index.html +++ b/platform/index.html @@ -5,4 +5,4 @@

    Platform

    If you are new to DataTrails, this is the place to start.

    The foundations of understanding the DataTrails platform are explained in the Overview. This will introduce the main concepts and take you through registering the first Events of your Audit Trail.

    The Administration section will show you how to manage your Tenancy and control access to the Events you create.

    Check out the sub-sections below for more information!

    Overview →
    Core concepts and tasks
    Administration →
    Create users, set access rights and share Events
    \ No newline at end of file +Sign Up

    Platform

    If you are new to DataTrails, this is the place to start.

    The foundations of understanding the DataTrails platform are explained in the Overview. This will introduce the main concepts and take you through registering the first Events of your Audit Trail.

    The Administration section will show you how to manage your Tenancy and control access to the Events you create.

    Check out the sub-sections below for more information!

    Overview →
    Core concepts and tasks
    Administration →
    Create users, set access rights and share Events
    \ No newline at end of file diff --git a/platform/overview/advanced-concepts/index.html b/platform/overview/advanced-concepts/index.html index 079dbec3b..4dc2be0c1 100644 --- a/platform/overview/advanced-concepts/index.html +++ b/platform/overview/advanced-concepts/index.html @@ -152,4 +152,4 @@ }

    Once applied the GIS coordinates on Events are immutable.

    That’s it

    These are all the basics of DataTrails. With this knowledge you can now jump straight into the API or try other topics on the -DataTrails Platform.

    ← Core Concepts
    Creating an Asset →
    \ No newline at end of file +DataTrails Platform.

    ← Core Concepts
    Creating an Asset →
    \ No newline at end of file diff --git a/platform/overview/core-concepts/index.html b/platform/overview/core-concepts/index.html index 8fd1bcf7d..1b0ae7afd 100644 --- a/platform/overview/core-concepts/index.html +++ b/platform/overview/core-concepts/index.html @@ -18,4 +18,4 @@ Public View which is visible to everyone. The purpose of this view is to allow anyone to verify that the document that they are using is genuine and has not been altered. When the document Audit Trail is combined with Instaproof a user of your data can easily find out which version of a document they have and confirm that it is genuine.

    The Golden Thread

    Putting all these concepts together, it is possible to create a Golden Thread of evidence that makes up the Data Trails Audit Trail. -This has many use cases relating to content authenticity but can also be applied to supply chain integrity and standards compliance, or fact anything where stakeholders need transparency and trust.

    The Golden Thread

    ← Introduction
    Advanced Concepts →
    \ No newline at end of file +This has many use cases relating to content authenticity but can also be applied to supply chain integrity and standards compliance, or fact anything where stakeholders need transparency and trust.

    The Golden Thread

    ← Introduction
    Advanced Concepts →
    \ No newline at end of file diff --git a/platform/overview/creating-an-asset/index.html b/platform/overview/creating-an-asset/index.html index 20459c0af..202c9a2d2 100644 --- a/platform/overview/creating-an-asset/index.html +++ b/platform/overview/creating-an-asset/index.html @@ -153,4 +153,4 @@ -H "@$HOME/.datatrails/bearer-token.txt" \ https://app.datatrails.ai/archivist/v2/assets?attributes.arc_display_name=My%20First%20Container Here we see all details entered: The extended attributes and a history of Events recorded on the Asset.

    Note: After registration, Assets cannot be updated using the asset creation screens but an Asset’s Asset Attributes can be updated as part of an Event.

    For more information on creating Events, -click here.

    The first Event will always be the Asset Creation. In the next section, we will cover how to create your own Events for your Asset.

    ← Advanced Concepts
    Creating an Event Against an Asset →
    \ No newline at end of file +click here.

    The first Event will always be the Asset Creation. In the next section, we will cover how to create your own Events for your Asset.

    ← Advanced Concepts
    Creating an Event Against an Asset →
    \ No newline at end of file diff --git a/platform/overview/creating-an-event-against-an-asset/index.html b/platform/overview/creating-an-event-against-an-asset/index.html index ba9d4784e..12d93b1a4 100644 --- a/platform/overview/creating-an-event-against-an-asset/index.html +++ b/platform/overview/creating-an-event-against-an-asset/index.html @@ -153,4 +153,4 @@ -H "@$HOME/.datatrails/bearer-token.txt" \ https://app.datatrails.ai/archivist/v2/assets/<asset-id>/events/<event-id> Please see the -Administration section for information on how to manage your assets

    In the next section we look at a specific type of Asset, the Document Profile Asset.

    ← Creating an Asset
    Registering a Document Profile Asset →
    \ No newline at end of file +Administration section for information on how to manage your assets

    In the next section we look at a specific type of Asset, the Document Profile Asset.

    ← Creating an Asset
    Registering a Document Profile Asset →
    \ No newline at end of file diff --git a/platform/overview/index.html b/platform/overview/index.html index f755a4cc6..a911a0260 100644 --- a/platform/overview/index.html +++ b/platform/overview/index.html @@ -5,4 +5,4 @@
    \ No newline at end of file +Sign Up
    \ No newline at end of file diff --git a/platform/overview/instaproof/index.html b/platform/overview/instaproof/index.html index 93088f3a9..569b2afac 100644 --- a/platform/overview/instaproof/index.html +++ b/platform/overview/instaproof/index.html @@ -12,4 +12,4 @@ Document Profile more more information.

    Using the Instaproof UI

    1. Using the sidebar, select Instaproofand then drag a document into the search area

      Instaproof Search Area

    2. Document not found
      If the document that you are verifying has not been found, you will see a red response banner.

      Document Not Found
      The possible reasons for this outcome are:

      • The document owner has not registered the document in their DataTrails tenancy
      • The document owner has not published this version of the document as an event
      • The document has been modified since it was registered with DataTrails


      In all cases you should contact the document owner to find out whether your document version can be trusted.

    3. Document Found

      Note: In this screenshot we are using the file greenfrog.jpg which can be downloaded from our Instaproof Samples page.
      If the document has been registered with DataTrails, you will see a green response banner together with a list of all the matching Document Profile Assets. This means that the version of the document that you have has a verifiable provenance record and an immutable audit trail.
      Document Found

    At the top of the image you can see the document that was checked and found on Instaproof.

    Note: We don’t need to access your document to find its provenance, everything that you see in the Instaproof results is held locally and was recorded by the document owner when the document was registered or events were recorded.

    You can check additional documents by dragging them on top of this area.

    Some of the results may be from verified organizations and others from unverified members of the DataTrails community. All results contribute something to the provenance and life history of this document.

    A Verified Organization has a verified domain associated with their DataTrails account. This helps to confirm the identity of the document source and is likely the thing to look for if you want ‘official’ provenance records. A Verified Domain can be used to link an identity (such as a company or a brand name) to a DataTrails Tenancy.

    The Other Results results are those from from unverified DataTrails accounts - other members of the DataTrails community who have made claims or observations about the document you’re interested in.

    While they may seem less ‘official’ than verified account results, they may still be useful to you. The identity of all users making attestations in DataTrails is checked, recorded, and immutable, even if they are not (yet) associated with a verified domain name.

    What Do the Instaproof Results Mean?

    Immutable Audit Trail

    Click on a result to see details of the document history. You will see the Event details of the version that matches your document on the right with a partial view of the Asset details for the latest version on the left. Close the Event details to see the full Asset details view.

    Asset Details Tab

    The Asset details tab shows the information about the asset attributes. -Includes the current version, the organization, and Verified Domain badge, if applicable.

    Public attestation and visibility - Public means that the document is publicly accessible using the public URL. Permissioned means that it is private and requires shared access to be enabled for a user to be able to view it.

    Type - For Document Profile Assets this will always be ‘Document’.

    Description - an optional description of the Asset

    Attributes - This drop down section contains any custom attributes that were added to the asset.

    Versions - the published versions of the document

    Note: The share button allows you to access and copy the permissioned and public (if enabled) links for the asset to share with other users. Private links are for logged in users with permissions assigned in an Access Policy, Public links are for everyone.
    Share Links

    The Event History tab shows the full history of Events including custom Events, new Versions and Withdraw Events.

    Click on the tab and select an Event to view the details.

    Event History Overview Tab

    The Overview information about the Event

    Event Identity - The Event ID will always be of the format ‘publicassets/<asset_id>/events/<event_id>’ for public assets or ‘assets/<asset_id>/events/<event_id>’ for private assets.

    Asset Identity - the ID of the parent Asset for this Event.

    Transaction - This link contains the details of the Event transaction.

    Transaction Details

    Type - For Document Profile Events this will always be ‘Publish’

    Document changes - The version and document hash for new version Events. There is no data here for custom Events.

    The Event attributes and Asset attributes tabs contain information about any custom attributes that were added or modified as part this Event.

    ← Registering an Event Against a Document Profile Asset
    Public Attestation →
    \ No newline at end of file +Includes the current version, the organization, and Verified Domain badge, if applicable.

    Public attestation and visibility - Public means that the document is publicly accessible using the public URL. Permissioned means that it is private and requires shared access to be enabled for a user to be able to view it.

    Type - For Document Profile Assets this will always be ‘Document’.

    Description - an optional description of the Asset

    Attributes - This drop down section contains any custom attributes that were added to the asset.

    Versions - the published versions of the document

    Note: The share button allows you to access and copy the permissioned and public (if enabled) links for the asset to share with other users. Private links are for logged in users with permissions assigned in an Access Policy, Public links are for everyone.
    Share Links

    The Event History tab shows the full history of Events including custom Events, new Versions and Withdraw Events.

    Click on the tab and select an Event to view the details.

    Event History Overview Tab

    The Overview information about the Event

    Event Identity - The Event ID will always be of the format ‘publicassets/<asset_id>/events/<event_id>’ for public assets or ‘assets/<asset_id>/events/<event_id>’ for private assets.

    Asset Identity - the ID of the parent Asset for this Event.

    Transaction - This link contains the details of the Event transaction.

    Transaction Details

    Type - For Document Profile Events this will always be ‘Publish’

    Document changes - The version and document hash for new version Events. There is no data here for custom Events.

    The Event attributes and Asset attributes tabs contain information about any custom attributes that were added or modified as part this Event.

    ← Registering an Event Against a Document Profile Asset
    Public Attestation →
    \ No newline at end of file diff --git a/platform/overview/introduction/index.html b/platform/overview/introduction/index.html index 3244dfb35..5d4ce7c6f 100644 --- a/platform/overview/introduction/index.html +++ b/platform/overview/introduction/index.html @@ -8,4 +8,4 @@ Sign Up

    Introduction

    Welcome to DataTrails

    DataTrails provides Provenance as a Service to prove the origins and trustworthiness of the data that powers your applications.

    DataTrails enables enterprises to build trust in data such as documents, images and AI models by ensuring that you know the origin and history of the data that you are using. -This can also be applied to multi-party data such as software and supply chain artifacts allowing you to make sure that processes are fit for purpose to comply with IT controls, corporate policies, and government regulations.

    DataTrails permanently records evidence into an Immutable Audit Trail to bring a superior level of trust in data for faster, confident decisions with lower business risk by combining:

    • Metadata Governance - Empower the right people in organizations to set, enforce, and execute detailed sharing policies for provenance metadata.

    • Authenticated Provenance - Deliver full traceability on all internal and external data sources to speed and assure digital decisions.

    • Continuous Accountability - Instantly auditable evidence “Proves Who Did What When” for any shared data to speed audit and root cause investigations.

    • Persistent Integrity - Create a complete, unbroken, and permanent record of shared Event transactions, delivering continuous assurance for faster digital decisions.

    DataTrails delivers assured metadata in a single line of code in a way that makes recording and auditing the full lifecycle of data simple. Any authorized participant (including a user, a software agent or an endpoint device) can register the Events that they are involved in.

    Users of the data can see a full picture of the data’s origin and history and by understanding Who Did What When, human actors and software/AI systems can make stronger real-time judgments about the trustworthiness of your data.

    DataTrails Functionality

    \ No newline at end of file +This can also be applied to multi-party data such as software and supply chain artifacts allowing you to make sure that processes are fit for purpose to comply with IT controls, corporate policies, and government regulations.

    DataTrails permanently records evidence into an Immutable Audit Trail to bring a superior level of trust in data for faster, confident decisions with lower business risk by combining:

    DataTrails delivers assured metadata in a single line of code in a way that makes recording and auditing the full lifecycle of data simple. Any authorized participant (including a user, a software agent or an endpoint device) can register the Events that they are involved in.

    Users of the data can see a full picture of the data’s origin and history and by understanding Who Did What When, human actors and software/AI systems can make stronger real-time judgments about the trustworthiness of your data.

    DataTrails Functionality

    Core Concepts →
    \ No newline at end of file diff --git a/platform/overview/public-attestation/index.html b/platform/overview/public-attestation/index.html index 4b3d055bc..5bf4ff08e 100644 --- a/platform/overview/public-attestation/index.html +++ b/platform/overview/public-attestation/index.html @@ -66,4 +66,4 @@ Assets API

    ← Instaproof
    Identity and Access Management →
    \ No newline at end of file +

    ← Instaproof
    Identity and Access Management →
    \ No newline at end of file diff --git a/platform/overview/registering-a-document-profile-asset/index.html b/platform/overview/registering-a-document-profile-asset/index.html index f77bbf691..e221c48ba 100644 --- a/platform/overview/registering-a-document-profile-asset/index.html +++ b/platform/overview/registering-a-document-profile-asset/index.html @@ -187,4 +187,4 @@ https://app.datatrails.ai/archivist/v2/assets?attributes.arc_display_name=My%20First%20Document

    Here we see all details entered: The extended attributes and a history of Events recorded on the Document.

    Note: To update the details of your Asset after it has been created, you must create an Event containing Asset Attributes that conform to the Document Profile.

    For more information on creating Events, -click here.

    The first Event in the Event History will always be the Document Registration. In the next section, we will cover how to create your own Events for your Document.

    ← Creating an Event Against an Asset
    Registering an Event Against a Document Profile Asset →
    \ No newline at end of file +click here.

    The first Event in the Event History will always be the Document Registration. In the next section, we will cover how to create your own Events for your Document.

    ← Creating an Event Against an Asset
    Registering an Event Against a Document Profile Asset →
    \ No newline at end of file diff --git a/platform/overview/registering-an-event-against-a-document-profile-asset/index.html b/platform/overview/registering-an-event-against-a-document-profile-asset/index.html index 835850aff..7842d954d 100644 --- a/platform/overview/registering-an-event-against-a-document-profile-asset/index.html +++ b/platform/overview/registering-an-event-against-a-document-profile-asset/index.html @@ -183,4 +183,4 @@

    To view the details of the Event you just created for My First Document, use:

    curl -v -X GET \
          -H "@$HOME/.datatrails/bearer-token.txt" \
          https://app.datatrails.ai/archivist/v2/assets/<asset-id>/events/<event-id>
    -

    ← Registering a Document Profile Asset
    Instaproof →
    \ No newline at end of file +

    ← Registering a Document Profile Asset
    Instaproof →
    \ No newline at end of file diff --git a/sales/contactus/index.html b/sales/contactus/index.html index 04a94ce93..eaff57561 100644 --- a/sales/contactus/index.html +++ b/sales/contactus/index.html @@ -5,4 +5,4 @@
    \ No newline at end of file +Sign Up
    \ No newline at end of file diff --git a/sales/index.html b/sales/index.html index 342a37215..86003eb5d 100644 --- a/sales/index.html +++ b/sales/index.html @@ -5,4 +5,4 @@
    \ No newline at end of file +Sign Up
    \ No newline at end of file diff --git a/support/contactus/index.html b/support/contactus/index.html index 60cf10dab..811ff9e2e 100644 --- a/support/contactus/index.html +++ b/support/contactus/index.html @@ -5,4 +5,4 @@

    Contact Us

    For any queries please contact support@datatrails.ai

    \ No newline at end of file +Sign Up

    Contact Us

    For any queries please contact support@datatrails.ai

    \ No newline at end of file diff --git a/support/index.html b/support/index.html index 77cab88a7..df42d88c1 100644 --- a/support/index.html +++ b/support/index.html @@ -5,4 +5,4 @@
    \ No newline at end of file +Sign Up
    \ No newline at end of file diff --git a/usecases/authenticity-media-files/index.html b/usecases/authenticity-media-files/index.html index 2921af026..48f45b7ef 100644 --- a/usecases/authenticity-media-files/index.html +++ b/usecases/authenticity-media-files/index.html @@ -9,4 +9,4 @@ Use Cases

    Authenticity of Media and Files

    Assurance with DataTrails

    A very simple yet powerful pattern for using DataTrails is the Authenticity pattern. This is a good choice when dealing with data or documents where trust, integrity and authenticity are more important than secrecy. This could be data that is shared between business partners or more simply the relationship between creators and consumers of digital media.

    The DataTrails platform separates data from its provenance metadata. By recording the metadata in the DataTrails platform it becomes an irrefutable record of the origin, provenance, integrity and authenticity of the media asset. When the data is updated a corresponding Event updates the metadata in DataTrails to build an immutable audit trail of the history of that data.

    Together with fine-grained attribute based access controls the platform provides a trust and visibility layer to support trusted data sharing and provides evidence to resolve contested scenarios.

    Both private and public stakeholders can verify that what they see on their screen is authentic and and has not been tampered with.

    Example 1: Digital Media

    The obvious example of a piece of digital media is a photographic image but it equally applies to graphical images and also sound and video recordings.

    A provenance history helps to establish the authenticity and integrity of digital media content. It allows users to verify that the content that they are consuming or sharing is genuine and has not been tampered with or manipulated. In an era of declining trust in digital media caused by an increased awareness of misinformation, AI, and deepfakes, understanding the provenance of digital media is crucial for restoring trust and credibility.

    Digital media provenance ensures transparency, trustworthiness, and accountability benefiting both content creators and consumers.

    Considerations

    Media Origin: The provenance record helps with attributing credit to the original creators of digital media. It enables content creators to protect their intellectual property rights and ensures they receive appropriate recognition for their work.

    Consumers of the media can check the origin and history of the media to give confidence that the media is authentic and if it has been processed.

    Versions: Changes are recorded as Events. The immutable audit trail provided by DataTrails records the history of the media allowing users to verify that it contains no unofficial changes.

    Example 2: Evidential Documents

    There are a great many documents that serve as evidence in formal discussions: shipping manifests; pictures of a traffic accident; statements of account; education diplomas; contracts. DataTrails adds strong integrity to any document to allow easy verification.

    It is rare for a document to remain unchanged during it’s lifetime. Some documents are expected to go though many versions while others change much less frequently.

    The -Document Profile pattern is a suggested set of attributes for Assets and Events for recording the life cycle of a document.

    Considerations

    Track Documents: Create a very simple Asset structure with minimal attributes to identify the document and additional attributes to store the key metadata, such as a hash of the document.

    Collections: If the document is strongly related to another one, consider adding and tracking them all as Events against a single Asset record.

    Versions: If the document is a new version of something already stored in DataTrails, then use Events to replace the document’s metadata with the updated version. Any authorized stakeholder fetching the Asset record will automatically get the most up-to-date version, and prior versions can be retrieved if necessary from the Event history.

    Access: For each asset record, it is possible to choose if you want to share that publicly by creating a Public Asset, or with a select group of “friendly” associates by creating a Private asset that is protected by an Access Policy. By sharing publicly, your trail will be verifiable on our Instaproof service by anyone without the need for a DataTrails account.

    \ No newline at end of file +Document Profile pattern is a suggested set of attributes for Assets and Events for recording the life cycle of a document.

    Considerations

    Track Documents: Create a very simple Asset structure with minimal attributes to identify the document and additional attributes to store the key metadata, such as a hash of the document.

    Collections: If the document is strongly related to another one, consider adding and tracking them all as Events against a single Asset record.

    Versions: If the document is a new version of something already stored in DataTrails, then use Events to replace the document’s metadata with the updated version. Any authorized stakeholder fetching the Asset record will automatically get the most up-to-date version, and prior versions can be retrieved if necessary from the Event history.

    Access: For each asset record, it is possible to choose if you want to share that publicly by creating a Public Asset, or with a select group of “friendly” associates by creating a Private asset that is protected by an Access Policy. By sharing publicly, your trail will be verifiable on our Instaproof service by anyone without the need for a DataTrails account.

    ← Responsible AI
    Supply Chain: Process Governance and Modelling →
    \ No newline at end of file diff --git a/usecases/bill-of-materials/index.html b/usecases/bill-of-materials/index.html index 405e0ba0b..24d822a6a 100644 --- a/usecases/bill-of-materials/index.html +++ b/usecases/bill-of-materials/index.html @@ -11,4 +11,4 @@ NTIA SBOM Proof of Concept the need for strong stakeholder community management and a trusted SBOM data sharing mechanism which protects the interests of all parties.

    The DataTrails Software Package profile is a set of suggested Asset and Event attributes that offers a solution to this sharing and distribution problem: vendors retain control of their proprietary information and release processes while customers have assured and reliable visibility into their digital supply chain risks with reliable access to current and historical SBOM data for the components they rely on.

    As an Asset, a Software Package may hold many different SBOMs over its lifecycle representing the introduction of new releases and versions of the Software Package. Each ‘Release’ is recorded as an Event to capture the known SBOM at the time.

    If a particular Software Package has constituent components composed of other Software Package Assets this would be tracked within the SBOM of the component Supplied Software Package, ensuring full traceability across the Supply Chain.

    Considerations

    Key to any successful DataTrails integration is keeping the number of Asset attributes manageable and meaningful. Do not add every entry in the SBOM as an Asset attribute. Instead, preserve Asset attributes to carry essential metadata such as final build hashes and assured current versions, and put the full details of each released version in attachments and Events.

    Note: There are good standards for storing and exchanging SBOM data such as SWID/ISO/IEC 19770-2:2015, Cyclone DX, and -SPDX. DataTrails recommends adopting standard data formats wherever possible, as these vastly improve interoperability and utility of the data exchanged between DataTrails participants.

    SBOM as a living document: As a vendor, try to model each final software product as an Asset, and releases/updates to that software product as Events on that Asset. That way, a single Asset history contains all the patch versions of a pristine build standard.

    Link to real assets: In reality, not every machine is going to be patched and running identical versions of software, and certainly not the most up-to-date one. As a user of devices, try to link the SBOM from your vendor to the device by having Asset attributes for the Asset Identity of the vendor-published SBOM and the version installed on the device. That way it is easy to find devices that need attention following an SBOM update.

    Access Policies: Always try to avoid proliferating Access Policies and make as few as possible with clear user populations and access rights. Typically, very few parties need to update the SBOM record, but many people will need to read it.

    Remember that DataTrails is a shared evidence platform. It is there to help share and publish the SBOM and create the trust and transparency that is demanded of modern systems, to ensure the security of the digital supply chain.

    ← Supply Chain: Chain of Custody
    \ No newline at end of file +SPDX. DataTrails recommends adopting standard data formats wherever possible, as these vastly improve interoperability and utility of the data exchanged between DataTrails participants.

    SBOM as a living document: As a vendor, try to model each final software product as an Asset, and releases/updates to that software product as Events on that Asset. That way, a single Asset history contains all the patch versions of a pristine build standard.

    Link to real assets: In reality, not every machine is going to be patched and running identical versions of software, and certainly not the most up-to-date one. As a user of devices, try to link the SBOM from your vendor to the device by having Asset attributes for the Asset Identity of the vendor-published SBOM and the version installed on the device. That way it is easy to find devices that need attention following an SBOM update.

    Access Policies: Always try to avoid proliferating Access Policies and make as few as possible with clear user populations and access rights. Typically, very few parties need to update the SBOM record, but many people will need to read it.

    Remember that DataTrails is a shared evidence platform. It is there to help share and publish the SBOM and create the trust and transparency that is demanded of modern systems, to ensure the security of the digital supply chain.

    ← Supply Chain: Chain of Custody
    \ No newline at end of file diff --git a/usecases/index.html b/usecases/index.html index a96e886bd..a0b4bac0e 100644 --- a/usecases/index.html +++ b/usecases/index.html @@ -7,4 +7,4 @@

    Use Cases

    DataTrails is a powerful and flexible platform enabling users to record Who Did What & When to any content. To get the best out of the DataTrails it is important to model your real-world assets and business processes efficiently into DataTrails Assets and -Events.

    The three most common patterns are:

    • Authenticity and Attestation: proving the state of documents and data at a point in time. Also known as ‘Provenance’.
    • Bill of Materials: tracing the contents and composition of assets.
    • State Machine and Supply Chains: following the progress of an asset as it moves through a business process or lifecycle states.

    These are laid out in more detail here:


    \ No newline at end of file +Events.

    The three most common patterns are:

    These are laid out in more detail here:

    Authenticity of Media and Files →
    Bill of Materials →
    Responsible AI →
    Supply Chain: Asset Lifecycle →
    Supply Chain: Chain of Custody →
    Supply Chain: Process Governance and Modelling →

    \ No newline at end of file diff --git a/usecases/responsible-ai/index.html b/usecases/responsible-ai/index.html index b02ad18ea..4638756d3 100644 --- a/usecases/responsible-ai/index.html +++ b/usecases/responsible-ai/index.html @@ -8,4 +8,4 @@ Sign Up

    Responsible AI

    As AI technologies become more common the need for trust in AI increases at a greater rate. There is a need to trust the AI model, the dataset that trains the AI machine, the statements about governance and compliance made by the AI vendor before you can trust the output of the AI machine.

    Responsible AI includes an ethical and legal viewpoint to ensure that AI works for the good of society, fundamental to this is Trust and Transparency.

    As consumers of the AI model:

    • We need to be certain that an AI machine is making decisions that are no worse than those that would be made by a trained and competent human.
    • We need to know that it has been trained on ‘good’ data, not ‘bad’ data.
    • We need to know that the system has been designed to be compliant with the correct standards and policies.
    • We need to know that it will not misuse our personal information.
    • We need to know that the system is being developed and improved to those same standards.

    Above all, we don’t want to take the vendors word for it, they need to prove it!

    DataTrails empowers this by providing an immutable lineage record (the data trail) for all aspects of the AI machine which supports responsible and ethical governance, coupled with transparency and traceability of the training data and output analysis. Together these enhance the explainability and interpretability of the AI machine’s output which results in trust and efficient decision making by the user whether that user is a human or another AI machine.

    Opportunities for Transparency

    RAG: Retrieval Augmented Generation
    SHAP: SHapley Additive exPlanations
    LIME: Local Interpretable Model-agnostic Explanations

    Considerations

    Policy and Standards Compliance: A set of Asset attributes can be created to record the baseline compliance of the AI system. This can include internal policies such as Bias, Discrimination and Copyright statements or external policies such as GDPR and other legal frameworks. Any policy changes or changes in compliance status can be recorded as an Event to build the immutable record of compliance over time.

    The AI Model and the Training Data: The versions of the AI process model, the AI machine software and of the Training datasets could also be recorded as Asset attributes. Other things to include could be changes to the Training model and any manual Training decisions that influence the output of the AI machine. -Recording updates as Events will transparently record the version history of the working components of the AI system as it is developed and improved.

    Access Policies: Use Access policies to enable fine-grained control over access to the data. Access Policies provide stakeholders with the transparent access to the untampered provenance record that they need to be able to make decisions and gain trust in the system.

    \ No newline at end of file +Recording updates as Events will transparently record the version history of the working components of the AI system as it is developed and improved.

    Access Policies: Use Access policies to enable fine-grained control over access to the data. Access Policies provide stakeholders with the transparent access to the untampered provenance record that they need to be able to make decisions and gain trust in the system.

    Authenticity of Media and Files →
    \ No newline at end of file diff --git a/usecases/sc-asset-lifecycle/index.html b/usecases/sc-asset-lifecycle/index.html index 93dfd1eab..a99f8adc4 100644 --- a/usecases/sc-asset-lifecycle/index.html +++ b/usecases/sc-asset-lifecycle/index.html @@ -6,4 +6,4 @@

    Supply Chain: Asset Lifecycle

    Tracking the lifecycle of physical Assets

    Tracking and tracing the lifecycle of physical Assets - from IoT Devices (embedded sensors, handheld equipment) to a whole distribution depot - is a key strength of DataTrails. The ability to collect and examine the entire life history of critical Assets - their provenance - is crucial to building secure and trustworthy systems.

    This also applies to digital assets such as software applications, equipment firmware, images and documents. Every item involved in the supply chain has a lifecycle.

    Asset lifecycle tracing

    Knowing what state an asset is in, whether or not it is compliant with organizational policy, and whether it needs any attention right now can help a connected system run smoothly. This eliminates the mundane in lifecycle management and allows expert resources to focus only on those parts of the estate that need attention.

    Asset Lifecycle

    Considerations

    Build the Asset over time: The Asset lifecycle covers its entire life, from design and build to procurement and use, and finally disposal. During this time the Asset evolves and develops new properties and characteristics which are not necessarily foreseeable at creation time. DataTrails supports the addition of new properties at any time in the lifecycle so there is no need to design and fill in everything up-front. Start with a simple - even empty - Asset and let DataTrails track and trace the new properties as they naturally occur.

    Verify and confirm security data: For digital Assets, a lot of the effort spent on lifecycle management will be spent on software and firmware management. DataTrails’s ‘Witness Statement’ approach to creating Asset histories enables statements of intent to be recorded alongside ground truths. For example, a claimed software update next to a digitally signed platform attestation proving that it was done.

    Access Policies: Always try to avoid proliferating Access Policies and make as few as possible with clear user populations and access rights. Generally, all parties will need read access to all the Events in the Asset history but it may be convenient to restrict Event write access to mirror real-world approvers and actors.

    \ No newline at end of file +Use Cases

    Supply Chain: Asset Lifecycle

    Tracking the lifecycle of physical Assets

    Tracking and tracing the lifecycle of physical Assets - from IoT Devices (embedded sensors, handheld equipment) to a whole distribution depot - is a key strength of DataTrails. The ability to collect and examine the entire life history of critical Assets - their provenance - is crucial to building secure and trustworthy systems.

    This also applies to digital assets such as software applications, equipment firmware, images and documents. Every item involved in the supply chain has a lifecycle.

    Asset lifecycle tracing

    Knowing what state an asset is in, whether or not it is compliant with organizational policy, and whether it needs any attention right now can help a connected system run smoothly. This eliminates the mundane in lifecycle management and allows expert resources to focus only on those parts of the estate that need attention.

    Asset Lifecycle

    Considerations

    Build the Asset over time: The Asset lifecycle covers its entire life, from design and build to procurement and use, and finally disposal. During this time the Asset evolves and develops new properties and characteristics which are not necessarily foreseeable at creation time. DataTrails supports the addition of new properties at any time in the lifecycle so there is no need to design and fill in everything up-front. Start with a simple - even empty - Asset and let DataTrails track and trace the new properties as they naturally occur.

    Verify and confirm security data: For digital Assets, a lot of the effort spent on lifecycle management will be spent on software and firmware management. DataTrails’s ‘Witness Statement’ approach to creating Asset histories enables statements of intent to be recorded alongside ground truths. For example, a claimed software update next to a digitally signed platform attestation proving that it was done.

    Access Policies: Always try to avoid proliferating Access Policies and make as few as possible with clear user populations and access rights. Generally, all parties will need read access to all the Events in the Asset history but it may be convenient to restrict Event write access to mirror real-world approvers and actors.

    \ No newline at end of file diff --git a/usecases/sc-chain-of-custody/index.html b/usecases/sc-chain-of-custody/index.html index 66b69b25d..d854819cd 100644 --- a/usecases/sc-chain-of-custody/index.html +++ b/usecases/sc-chain-of-custody/index.html @@ -6,4 +6,4 @@

    Supply Chain: Chain of Custody

    Tracking the Chain of Custody

    “Multi-party business processes” and “Asset lifecycle tracing” are examples of a more general pattern: Supply Chain Handling.

    The ‘State Machine’ and ‘Lifecycle Tracing’ pattens are very similar, but the former puts a greater emphasis on modeling and tracing the Events while the latter concentrates more on the evolving state of the Assets. Combining these concepts makes it possible to easily trace complex multi-party supply chains without stakeholders having to adapt to each other’s ways of working. Everyone participates on their own terms using their own tools and processes, and DataTrails bridges the gap to make data available where it is needed.

    The Chain of Custody is a documented record of the people or entities that physically or digitally handle a product as it moves from constituent parts to the end customer.

    By combining all three, to complete the Supply Chain, DataTrails allows you to:

    • Enable global visibility to all stakeholders
    • Provide continuous data assurance for accessibility, integrity and resilience
    • Integrate with physical items and devices in a platform agnostic way
    • Comply with internal and external regulatory standards
    • Use defined and continuously improving process

    Chain of Custody

    The DataTrails platform records who did what when (and where when appropriate) to build an immutable and auditable account of the entire history of an product as it passes through the supply chain. This is the Data Trail.

    The platform allows multi-party sharing and visibility of supply chain data which empowers trusted data exchange and verification. Supply chain partners have a single source of truth that gives them confidence that decisions are made by the right people, at the right step of the process, using the right data and with confidence that the data is the correct version and is untampered.

    It also provides proof of the ownership and operational status of both digital and physical assets and enhances statements of compliance and quality assurance.

    Chain of Custody

    Considerations

    Custom Attributes: A core set of attributes can be created specifically to suit each asset and event type. DataTrails has the flexibility to allow these to be modified as the business needs develop over time. They are not set in stone.

    GIS position information: Make good use of the arc_gis_* attributes of Events in order to trace Where Who Did What When. Remember that physical environment can make a lot of difference to the virtual security of your Assets.

    Access Policies 1: Always try to avoid proliferating Access Policies and make as few as possible with clear user populations and access rights. Nonetheless, complete supply chain operations are complex and thought must be given to Access Policy configuration to account for changes of custody.

    Access Policies 2: Consider how far up or down the supply chain visibility should be offered. For example, a customer/operator should be able to see manufacturing data but the manufacturer may or may not be entitled to see usage data.

    \ No newline at end of file +Use Cases

    Supply Chain: Chain of Custody

    Tracking the Chain of Custody

    “Multi-party business processes” and “Asset lifecycle tracing” are examples of a more general pattern: Supply Chain Handling.

    The ‘State Machine’ and ‘Lifecycle Tracing’ pattens are very similar, but the former puts a greater emphasis on modeling and tracing the Events while the latter concentrates more on the evolving state of the Assets. Combining these concepts makes it possible to easily trace complex multi-party supply chains without stakeholders having to adapt to each other’s ways of working. Everyone participates on their own terms using their own tools and processes, and DataTrails bridges the gap to make data available where it is needed.

    The Chain of Custody is a documented record of the people or entities that physically or digitally handle a product as it moves from constituent parts to the end customer.

    By combining all three, to complete the Supply Chain, DataTrails allows you to:

    Chain of Custody

    The DataTrails platform records who did what when (and where when appropriate) to build an immutable and auditable account of the entire history of an product as it passes through the supply chain. This is the Data Trail.

    The platform allows multi-party sharing and visibility of supply chain data which empowers trusted data exchange and verification. Supply chain partners have a single source of truth that gives them confidence that decisions are made by the right people, at the right step of the process, using the right data and with confidence that the data is the correct version and is untampered.

    It also provides proof of the ownership and operational status of both digital and physical assets and enhances statements of compliance and quality assurance.

    Chain of Custody

    Considerations

    Custom Attributes: A core set of attributes can be created specifically to suit each asset and event type. DataTrails has the flexibility to allow these to be modified as the business needs develop over time. They are not set in stone.

    GIS position information: Make good use of the arc_gis_* attributes of Events in order to trace Where Who Did What When. Remember that physical environment can make a lot of difference to the virtual security of your Assets.

    Access Policies 1: Always try to avoid proliferating Access Policies and make as few as possible with clear user populations and access rights. Nonetheless, complete supply chain operations are complex and thought must be given to Access Policy configuration to account for changes of custody.

    Access Policies 2: Consider how far up or down the supply chain visibility should be offered. For example, a customer/operator should be able to see manufacturing data but the manufacturer may or may not be entitled to see usage data.

    \ No newline at end of file diff --git a/usecases/sc-state-machine/index.html b/usecases/sc-state-machine/index.html index becb0458a..e15c1af72 100644 --- a/usecases/sc-state-machine/index.html +++ b/usecases/sc-state-machine/index.html @@ -6,4 +6,4 @@

    Supply Chain: Process Governance and Modelling

    Tracking multi-stakeholder business processes

    A common pattern for tracking an Asset lifecycle is the State Machine pattern for Multi-party business processes. This is a good choice for multi-stakeholder process modelling, particularly where the order of operations is important or activities are triggered by actions of partners. Tracing multi-stakeholder business processes in DataTrails not only ensures transparency and accountability among parties, but is also faster and more reliable than typical cross-organization data sharing and process management involving phone calls and spreadsheets.

    Modelling such systems in DataTrails can help to rapidly answer questions like “are my processes running smoothly?”, “do I need to act?”, and “has this asset been correctly managed?”. In audit situations, the Asset histories also allow stakeholders to look back in time and ask “who knew what at the time? Could process violations have been detected earlier?”

    Multi-party change management and approvals

    This pattern uses a purely virtual Asset to represent a policy or process and coordinate movement through that process, complete with multi-party inputs and approvals. The emphasis here is on Events rather than Asset attributes: What Happened? Who Was There? What evidence was used to decide to move to the next sage of the process?

    Process Governance

    Considerations

    Map the business process: DataTrails is here to support business operations, not disturb them. Try to define one Event type for each stage of the process, so decisions and artifacts can be recorded naturally and completely during normal operations. In a mature business, there may be formal documents such as a Process Map (PM), Business Process Model (BPM) or Universal Modeling Language description of the process, its steps, and its approvers. Use this as a base if it is available.

    Record decisions clearly: Future decisions will depend on the evidence of past ones. Make sure that all relevant information is recorded in Event records in the right format for the intended consumer: if decisions are made by humans, rich attachments are a good option. If software or AI are involved, then Event attributes are often a stronger choice.

    Access Policies: Always try to avoid proliferating Access Policies and make as few as possible with clear user populations and access rights. Generally, all parties will need read access to all the Events in a Trail history, but it may be convenient to restrict Event write access to mirror real-world approvers and actors.

    \ No newline at end of file +Use Cases

    Supply Chain: Process Governance and Modelling

    Tracking multi-stakeholder business processes

    A common pattern for tracking an Asset lifecycle is the State Machine pattern for Multi-party business processes. This is a good choice for multi-stakeholder process modelling, particularly where the order of operations is important or activities are triggered by actions of partners. Tracing multi-stakeholder business processes in DataTrails not only ensures transparency and accountability among parties, but is also faster and more reliable than typical cross-organization data sharing and process management involving phone calls and spreadsheets.

    Modelling such systems in DataTrails can help to rapidly answer questions like “are my processes running smoothly?”, “do I need to act?”, and “has this asset been correctly managed?”. In audit situations, the Asset histories also allow stakeholders to look back in time and ask “who knew what at the time? Could process violations have been detected earlier?”

    Multi-party change management and approvals

    This pattern uses a purely virtual Asset to represent a policy or process and coordinate movement through that process, complete with multi-party inputs and approvals. The emphasis here is on Events rather than Asset attributes: What Happened? Who Was There? What evidence was used to decide to move to the next sage of the process?

    Process Governance

    Considerations

    Map the business process: DataTrails is here to support business operations, not disturb them. Try to define one Event type for each stage of the process, so decisions and artifacts can be recorded naturally and completely during normal operations. In a mature business, there may be formal documents such as a Process Map (PM), Business Process Model (BPM) or Universal Modeling Language description of the process, its steps, and its approvers. Use this as a base if it is available.

    Record decisions clearly: Future decisions will depend on the evidence of past ones. Make sure that all relevant information is recorded in Event records in the right format for the intended consumer: if decisions are made by humans, rich attachments are a good option. If software or AI are involved, then Event attributes are often a stronger choice.

    Access Policies: Always try to avoid proliferating Access Policies and make as few as possible with clear user populations and access rights. Generally, all parties will need read access to all the Events in a Trail history, but it may be convenient to restrict Event write access to mirror real-world approvers and actors.

    \ No newline at end of file