Welcome to the iSHARE Developer Portal
Last updated
Last updated
Copyright © 2024 iSHARE Foundation
Version information
This documentation is in line with the iSHARE Trust Framework 2.0.1.
If you are looking for the previous version, you can find .
In the iSHARE technical specifications, both snake_case and camelCase are used interchangeably. With every iteration of updates, the specifications will incrementally be changed to camelCase.
Part of this documentation is formal framework specification
Part of this documentation must be considered part of the formal iSHARE Trust Framework Specification. Where applicable, this is clearly marked.
The iSHARE Trust Framework is a collaborative effort to improve the exchange of data between organisations in and across data spaces. The iSHARE Trust Framework is available .
Technical Approach
Unlike traditional software infrastructures, iSHARE offers a “soft infrastructure” focusing on:
Identification, authentication, and authorization for machine-to-machine (M2M) and human-to-machine (H2M) communication via REST API.
Public Key Infrastructure (PKI) for authentication.
Signed JSON Web Tokens (JWTs) for message integrity.
Data sharing transactions must align with the , each with specific responsibilities and interactions. This portal provides everything needed to technically implement iSHARE in your organisation, including:
How to get started for each role.
All iSHARE technical specifications.
Definitions for all endpoints required per role.
Additional content
If you are looking for additional content before getting started with your implementation, the contains the , try the to understand how iSHARE Trust Framework works technically or make use of the reference implementations and open-source components on .