Skip to main content

Glossary

Core Concepts

TermDefinition
DataspaceAn environment enabling trusted data sharing between participating parties, based on an agreed governance framework, policies, semantic models, standardized protocols, processes, and facilitating services (ISO/IEC 20151).
ParticipantAn organization represented by a software agent (Connector) that actively engages in data sharing within a dataspace. The only technical role in a dataspace.
ConnectorThe software agent that represents a participant in a dataspace. Implements DSP and provides APIs for catalog, negotiation, and transfer management.
TrustA situational, time-bound, purpose-specific assessment of whether another participant can be relied upon for a specific interaction. Established at runtime through claim verification and policy evaluation.

Identity and Trust

TermDefinition
DID (Decentralized Identifier)A self-owned, cryptographically verifiable identifier that doesn't depend on a central registry. Defined by W3C DID Core.
Verifiable Credential (VC)A digitally signed attestation about a credential holder's attributes, issued by a trusted authority. Defined by W3C VC Data Model.
ClaimA verifiable assertion about a participant's attributes (identity, capabilities, certifications), expressed as a credential.
Trust AnchorAn entity whose credentials are accepted as evidence of attributes. Defined within DTFs. Analogous to a certificate authority.
Verifiable Presentation (VP)A cryptographically signed package of one or more VCs, composed by the Identity Hub for presentation to a verifier.

Governance

TermDefinition
DSGA (Dataspace Governance Authority)A functional role responsible for defining and maintaining the governance framework of a dataspace. Defines rules, DTFs, and onboarding requirements. Not a runtime enforcement layer.
DTF (Dataspace Trust Framework)A set of policies, reconciliation mechanisms, and business processes that enable participants to establish trust. Defines accepted trust anchors and credential semantics.
Governance FrameworkThe complete set of technical policies, business rules, and regulations that participants must adhere to. Maintained by the DSGA.
Membership CredentialA VC attesting that an organization is a member of a specific dataspace. Issued after the onboarding process.
Issuer ServiceAn Eclipse EDC component that issues verifiable credentials to participants. Defines credential schemas, manages holders, and maintains revocation/status lists. Operated by DSGAs, CSPs, or external DTF credential issuers.
Registration ServiceA DSGA function that implements the membership application workflow — validating compliance with membership policies and triggering credential issuance upon approval. May be operated by the DSGA, a CSP, or a dedicated onboarding service provider.
Legal OnboardingThe business/legislative phase of joining a dataspace: providing company data, documents, consents, and having membership policies verified by the DSGA or its delegate. Produces an organizational identifier.
Technical OnboardingThe technical phase of joining a dataspace: provisioning infrastructure (connector, identity hub, DID), requesting credentials from the Issuer Service, and activating the participant context.

Protocols

TermDefinition
DSP (Dataspace Protocol)The protocol for catalog discovery, contract negotiation, and transfer coordination between Connectors.
DCP (Decentralized Claims Protocol)The protocol for exchanging and verifying identity material and verifiable credentials between participants.
DPS (Data Plane Signaling)The protocol between Control Plane and Data Plane for managing transfer lifecycle (START, SUSPEND, TERMINATE).
TCK (Technology Compatibility Kit)Automated conformance test suites that verify implementation compliance with DSP and DCP.

Data Sharing

TermDefinition
AssetA data resource that can be shared, described by metadata in the catalog.
Contract OfferAn asset paired with access and contract policies — what a consumer sees in the catalog.
Contract NegotiationThe process where two Connectors evaluate policies against credentials to reach an agreement.
Contract AgreementThe result of a successful negotiation — the machine-enforceable authorization to share data.
Transfer ProcessThe lifecycle of a data transfer, from initiation through execution to completion.
EDR (Endpoint Data Reference)Endpoint coordinates plus an access token, returned by the Data Plane for pull transfers.

Policies

TermDefinition
Access PolicyControls which participants can discover a catalog item based on their attributes.
Contract PolicyDefines what attributes are required to establish a data sharing agreement.
Usage PolicyControls how data can be used after sharing (enforcement varies by data sensitivity).
Membership PolicyDefines the attributes required to join a dataspace.

Architecture

TermDefinition
Control PlaneThe component responsible for trust decisions: catalog publication, contract negotiation, policy evaluation, and transfer coordination. Never touches data.
Data PlaneThe execution layer for data sharing. Moves data using wire protocols after authorization from the Control Plane.
Identity HubThe component managing DIDs, credential storage, and proof composition. Also referred to as the Credential Service.
RedlineA Backend-for-Frontend (BFF) service providing the web portal for participants and operators.
CFM (Connector Fabric Manager)The management plane that provisions participant contexts and automates lifecycle management for multi-tenant deployments.

Multi-Tenant Operations

TermDefinition
Participant ContextA logically isolated runtime context for a participant on shared infrastructure, defined by metadata rather than a separate process. The unit of provisioning and lifecycle management.
CellA homogeneous deployment zone (typically a Kubernetes cluster) that hosts participant runtime contexts.
TenantAn organization (customer) in a managed deployment — the billing entity and support boundary.
Participant ProfileA participant identity context (DID-backed) within a tenant. One tenant can have multiple profiles.
Dataspace ProfilePer-dataspace configuration within a participant: protocol versioning, trust requirements, policy alignment.
Service VirtualizationThe architectural model where shared infrastructure serves many logically isolated participant contexts.

Terminology Mapping

Some terms have different names depending on context:

Operational / API TermIDSA / Standards TermNotes
Credential ServiceIdentity HubSame component; different naming convention
Participant contextParticipant / Software agentEDC operational concept; maps to IDSA "participant" at runtime
CellDeployment zone / clusterEDC-V operational concept
ConnectorSoftware agent / Dataspace ConnectorIDSA Rulebook uses "software agent"
Contract OfferData Contract Offer (DCO)
Contract AgreementData Contract Agreement (DCA)
Management APIAdministration API

Layers

TermDefinition
Technical LayerProtocols and architecture enabling interoperable data sharing. All participants are equal at this layer.
Economic LayerServices, interactions, and business workflows enabling value generation.
Legislative LayerRights, obligations, and regulatory compliance.
Control Plane (of dataspace)Where trust decisions and negotiations happen. Separate from data movement.
Data Plane (of dataspace)Where actual data access and transfer happens. Agnostic to trust logic.
Management PlaneWhere provisioning and lifecycle management happens (CFM). Not in the trust-decision path.