SlideShare a Scribd company logo
1 of 46
PEPPOL Architecture overview


Mikkel Hippe Brun
Technical Director @ PEPPOL
Chief Consultant
Danish National IT and Telecom Agency




How to connect workshop
Copenhagen
April 14th 2009
Contents


Goals and vision
The “AS-IS” situation
  Peer-2-peer, Three/Four-corner-models
Business roles and requirements
Initial profiles
  Full profile
  Queued profile
  Lightweight profile
WP8 goals


Solutions architecture – design and
validation
– will focus on design and validation of the
  common specifications and building blocks
  which together will define the technical
  interoperability layer required to provide an
  operational e-business infrastructure.
WP8 vision


Pan European exchange of business
documents between any private company
and any EU governmental institution
should be as easy as sending emails.
WP - Outcomes


An architecture
 – A federated, secure and reliable infrastructure for
   electronic document transport.
Specifications
 – Based on internationally recognized open standards
 – For secure and reliable transport of electronic
   documents.
Software
–   Dual license (EUPL and MPL 1.1 where applicable)
–   Lowering barriers for implementers
–   Provides reference implementations
–   Demonstrates “that it is easy”
Expected benefits


Easy to exchange business documents
Easy to use the PEPPOL infrastructure
Easy for…
– Service providers
   • e.g. banks
   • e.g. Value Added Networks
   • e.g. E-procurement Platform Providers
– Public sector institutions
– Large companies
– SME's
The ”As-is-situation”


Several solutions to the same problem
  National / Regional / Local / Sector specific /
  Public / Private
Much variance complexity and design
  Peer-2-peer
  Three-corner-models
  Four corner-models
  Web-based or based on machine-2-machine
  interaction
Many different business models
The peer-2-peer-model




Characteristics (simplified)
  Agreed upon standards for transport
     open or proprietary
  Perhaps - agreed upon standards for content
  Difficult to match business requirements
The three-corner-model




Characteristics (simplified)
  Proprietary standards (whole stack)
  Service provider lock-in / Limited competition
  Customers may have to connect to more than one
  service provider
The four-corner-model




Characteristics (simplified)
  Agreed upon standards for transport
     open or proprietary
  Perhaps - agreed upon standards for content
  Freedom to choose service provider
High level view
Roles / Actors


We identified 3 distinct roles (with respect to transports)
– Service Provider (SP)
    • An existing e-business network provider with legacy customers
         – e.g. banks
         – e.g. Value Added Networks
         – e.g. E-procurement Platform Providers
    • Service Providers may in addition offer a standardized lightweight access to their
      customers
         – A new role that may be played by existing VANs, Government agencies or private
           sector initiatives
         – Supports (C) using PEPPOL specific interfaces

– Large company or government agency – with hosted services (LC)
    • A company that is willing to install and maintain a gateway with endpoints available
      24x7
– Company or government agency without hosted services (C)
    • A company (of any size) that is not able or interested in connecting directly to
      PEPPOL
Business Requirements

Business concern            Service provider   Large Organization   Company
Business Requirements

Business concern             Service provider   Large Organization   Company
Low cost of entry                                                 
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                       
Other cost of entry                                                     
   (e.g.complexity, contractual,
   etc)
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                       
Other cost of entry                                                     
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                       
Other cost of entry                                                     
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                              
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                       
Other cost of entry                                                     
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                              
Reliability                                                           
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                       
Other cost of entry                                                     
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                              
Reliability                                                           
Integrity                                                             
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                       
Other cost of entry                                                     
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                              
Reliability                                                           
Integrity                                                             
Transport-level non-repudiation                                        
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                       
Other cost of entry                                                     
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                              
Reliability                                                           
Integrity                                                             
Transport-level non-repudiation                                        
Privacy                                                                
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                       
Other cost of entry                                                     
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                              
Reliability                                                           
Integrity                                                             
Transport-level non-repudiation                                        
Privacy                                                                
Trust                                                                  
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                        
Other cost of entry                                                      
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                               
Reliability                                                            
Integrity                                                              
Transport-level non-repudiation                                         
Privacy                                                                 
Trust                                                                   
Avg. latency lower than 5 min.                                           +
                                                                           (tender?)
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                        
Other cost of entry                                                      
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                               
Reliability                                                            
Integrity                                                              
Transport-level non-repudiation                                         
Privacy                                                                 
Trust                                                                   
Avg. latency lower than 5 min.                                           +
                                                                           (tender?)
High volume                                                              
Business Requirements

Business concern                   Service provider   Large Organization   Company
Low cost of entry                                                        
Other cost of entry                                                      
   (e.g.complexity, contractual,
   etc)
Low cost per msg                                                        
Technology comfort zone                                               
Reliability                                                            
Integrity                                                              
Transport-level non-repudiation                                         
Privacy                                                                 
Trust                                                                   
Avg. latency lower than 5 min.                                           +
                                                                           (tender?)
High volume                                                              
Architectural goals


Secure and reliable
Realizable with internet technologies
Federated and scalable
Lower barriers
Leverage investments in existing
infrastructures
Allow existing business models to co-exist
A four-corner-model is needed because…

 The requirements differs a lot between
 service providers and SME’s
   Trust requirement raises the barrier
      The technical solution requires a trusted third party
   Also the “low latency” and “availability”
   requirements raises the barrier
      Requires hosted service with good SLA



 Conclusion:
   No single transport profile matches all the
   requirements. The four-corner-model caters
   for this inherent problem.
Basically a four corner model
However….


All access points must meet a number of requirements:
  Sign roaming agreement
  Meet SLA requirements
  Certificate listed in TSL
  Have full transport interoperability


Every access points are treated equally
  Business model not considered
  Anyone meeting requirements can become an Access Point
Direct connection possible
Roles and transports


                                              SP (e.g. Bank)

                                                                    Company




      Company
                                                               SP

                  SP


Key     Company


                                       Large Company or
                                       government agency


      PEPPOL full profile
      PEPPOL queued profile
      PEPPOL lightweight profile
      Out of Scope / Legacy protocol
Initial thinking on transport profiles
• Full profile
   – High fidelity, guaranteed secure delivery of messages from Access
     Point to Access Point
   – Based on open standards such as WS-*
   – The only “required” profile
• Queued profile
   – High fidelity, guaranteed secure delivery of messages from Access
     Point to Access Point using a message queuing model
   – An optional profile to enable efficient delivery of high volume
     between two VANs
• Lightweight profile
   – A simple low cost profile that enables a disconnected company to
     access stored messages via a PEPPOL Service Provider
   – Analogous to using SMTP Relay and POP3/IMAP
Roles and Transports


                                          PUT


                                                SP PUT
                                                   (e.g. Bank)
                                                                            Company

                                                                 PUT


  Company
                               PUT                               PUT

                   PUT                                                 SP
                   GET
                               PUT
                         PSP
                                                PUT
        Company
Key
      PEPPOL full profile                Large
      PEPPOL queued profile              Company or
      PEPPOL lightweight profile         government
      Out of Scope / Legacy protocol     agency
Message exchange in PEPPOL

• The main questions are:
  – Who, where, why, how?

                                  Why should I trust?


                                       Trust




                           How do I transport my document?
        Sender                                               Receiver



                                                             How do I advertise
      Who can I reach?               Registry                 my capabilities?
     Where can I send my
        document?
Scenario – CA based trust
Scenario – TLS based trust
    PEPPOL infra-
    structure sphere                                Existing
    Existing infra-                              infrastructure
    structure sphere                                 sphere




                                                    PEPPOL
                                                  infrastructure
                                                      sphere                                         Govt.
                                         Message +                                                  agency
                                         SAML token                                       Access
 SME 1                                                                 Trust
                                                                                          Point 4
                                                               Trust               Get
          VAN
                                                              lookup              token

                                               Trusted                                        3rd party
                         Access
                                               Service                                          STS
                         Point 1
                                                 List
                                                          Message +
                                                          SAML token
 Large
company

                       PUT
                                                                                Access
                              PEPPOL                                            Point 3               Large
                                Relay                                                                company
                               Service
         SME 2                                  Access
                                                Point 2
                                                                   Portal
                                                                                          SME 5


                                                                               SME 4
                                                      SME 3
Scenario – STS based trust
Scenario 1: Basic send
                                     Send to
        Country A                  company C –
                                          •
                                     how??Key: CompanyC
                       Invoice           • Doc: Invoice
                                         • Profile: Peppol      PEDRI
                                         • Country: B          Registry   Endpoint:
            Operator                                                      • Access point 2
               1     Company B                                            • http://ap2.de/
Company A


                                                             PEDRI                       This is the area that
                                      Access point,
                                                                                           PEDRI adresses
                                      VAN 1


                                                 Transport properties
                                                 • Secure
                                                 • Reliable
                                                 Profile properties
                                                 • Transport + QoS
                                                                                                        Country B
                                                                                  Access point 2,
                                                                                  Operator 2
                       WS-* over
                       internet      AMQP /                                                                  Operator
                                     WS-* over                                                                  2
                                                                                              Company C                 Public
                                     internet                                                                           agency D

                                           Other
                                           options..
Decentralized registry infrastructure

• 2 central questions:
  – Which registry has information on the recipient?
  – Where can I find the recipient?
                                    Registry
                  Which registry?   locator
                                    service

         Sender                           Register

                                    Service
                  Which endpoint?   registry




• These questions can be answered through
  many different strategies
Registry overview

                          Top level registry



                 Lookup
   Sender                                               Point to

                      Point to

                                   Register & manage

        2nd level registry A                      2nd level registry B

    Operator A                                 Operator B

                                                                    Register
    Replicated
    registries                                                                 Recipient


            Lookup
                                                                           Receive payload


   Sender
                                 Transport layer
Send payload                     - Open standards
                                 - Secure & reliable transport     Recipient
              Sender                                               endpoint
             entry point
Scenario II: Multiple operators
                           Send to Agency D – how??
        Country A
                       Invoice
                                                          • Key: Agency D       PEDRI Registry:
                                                                               Registry • Registry C
            Operator                     Registry A          Endpoint:                   • http://reg.c.de/Key: Agency D
                                                                                                         •
               1     Company B                               • Access point 2
                                                                                                         • Doc: Invoice
Company A                                                    • http://ap2.de/
                                                                                                         • Profile: Peppol


                                          Access point,            PEDRI
                                          VAN 1


                                                      Transport properties                  Registry B
                                                      • Secure
                                                      • Reliable
                                 Access point,        Profile properties                                                           Registry C
                                 national             • Transport + QoS
                                                                                                                 Country B
                                                                                           Access point 2,
                                                                                           Operator 2

                                                                                                                       Operator
                                                                                                                          2
                                                                                                       Company C                   Public
                                                                                                                                   agency D
                                                             Access point 3,
                                                             Operator 3
                                                                                             Company E
                                                                                                                 Operator
                                                                                                                    3
                                                                                                                             Company F
Scenario V – Lightweight Profile
        Country A
                                                                          PEDRI Top-level
                                                      • Key: Company H       Registry
            Operator
               1     Company B                                            Registry:
Company A                                                                 • Registry C
                                                                          • http://reg.c.de/

                                          Access point,            PEDRI
                                          VAN 1

                                                            Transport properties
                                                            • WS-* based


                                                          Endpoint:
                                                                                                               Country B
                                                          • Company H                     Access point 2,
                          PUT Access point 4              • http://compH.de/              Operator 2
                          (PEPPOL service provider)       • PGP key
                                                                                                                    Operator
                                                                                                                       2
            Invoice                                                                                   Company C                     Public
                              Send to
                                                                                                                                    agency D
                            company H –
                              how??                •Bus. key: Company H
              Company G                                                                        Company E
                                                   • Doc: Invoice
                                                                                                               Operator
                                                   • Profile: Peppol
                                                                                Registry C                        3
                                                                                                                            Company F
                                                                                        GET
                                                                                               Company H Register with:
                                                                                                            • Bus. key: Company H
                                                                                                            • Doc: Invoice
                                                                                                            • Profile: Peppol
                                                                               Access point 5
                                                                          (PEPPOL service provider)
Fees for using PEPPOL infrastructure?

 There is no fee associated with sending and receiving
 messages between PEPPOL Access Point
 There may be fees to:
  – Have an entry listed in a registry
  – Use an STS / Certificate Validation Service


However..
 Service providers choose their own business model
Roadmap for PEPPOL Infrastructure


  May 2009 – April 2010 : Construction
  –   May – Hands on workshop for developers
  –   October – New release
  –   January - PEPPOL 2010
  –   February – New release
  –   May 1st – Production
  May 2010 – April 2011 : Pilot
  –   Workshops
  –   Standardization
  –   Aid to pilots
  –   Patches
Summary


PEPPOL offers:
 A pan European registry architecture
  – Business entities, Business processes, Business documents, Transport, Security
    information
 A trust model
 Certificate validation
 Secure and reliable transport
 Specifications
 Reference implementations
 A governance model
http://www.peppol.eu
http://www.peppolinfrastructure.com – WP8 Solution architecture – technical stuff

More Related Content

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

PEPPOL Architecture Overview - Apr. 2009

  • 1. PEPPOL Architecture overview Mikkel Hippe Brun Technical Director @ PEPPOL Chief Consultant Danish National IT and Telecom Agency How to connect workshop Copenhagen April 14th 2009
  • 2. Contents Goals and vision The “AS-IS” situation Peer-2-peer, Three/Four-corner-models Business roles and requirements Initial profiles Full profile Queued profile Lightweight profile
  • 3. WP8 goals Solutions architecture – design and validation – will focus on design and validation of the common specifications and building blocks which together will define the technical interoperability layer required to provide an operational e-business infrastructure.
  • 4. WP8 vision Pan European exchange of business documents between any private company and any EU governmental institution should be as easy as sending emails.
  • 5. WP - Outcomes An architecture – A federated, secure and reliable infrastructure for electronic document transport. Specifications – Based on internationally recognized open standards – For secure and reliable transport of electronic documents. Software – Dual license (EUPL and MPL 1.1 where applicable) – Lowering barriers for implementers – Provides reference implementations – Demonstrates “that it is easy”
  • 6. Expected benefits Easy to exchange business documents Easy to use the PEPPOL infrastructure Easy for… – Service providers • e.g. banks • e.g. Value Added Networks • e.g. E-procurement Platform Providers – Public sector institutions – Large companies – SME's
  • 7. The ”As-is-situation” Several solutions to the same problem National / Regional / Local / Sector specific / Public / Private Much variance complexity and design Peer-2-peer Three-corner-models Four corner-models Web-based or based on machine-2-machine interaction Many different business models
  • 8. The peer-2-peer-model Characteristics (simplified) Agreed upon standards for transport open or proprietary Perhaps - agreed upon standards for content Difficult to match business requirements
  • 9. The three-corner-model Characteristics (simplified) Proprietary standards (whole stack) Service provider lock-in / Limited competition Customers may have to connect to more than one service provider
  • 10. The four-corner-model Characteristics (simplified) Agreed upon standards for transport open or proprietary Perhaps - agreed upon standards for content Freedom to choose service provider
  • 12. Roles / Actors We identified 3 distinct roles (with respect to transports) – Service Provider (SP) • An existing e-business network provider with legacy customers – e.g. banks – e.g. Value Added Networks – e.g. E-procurement Platform Providers • Service Providers may in addition offer a standardized lightweight access to their customers – A new role that may be played by existing VANs, Government agencies or private sector initiatives – Supports (C) using PEPPOL specific interfaces – Large company or government agency – with hosted services (LC) • A company that is willing to install and maintain a gateway with endpoints available 24x7 – Company or government agency without hosted services (C) • A company (of any size) that is not able or interested in connecting directly to PEPPOL
  • 13. Business Requirements Business concern Service provider Large Organization Company
  • 14. Business Requirements Business concern Service provider Large Organization Company Low cost of entry   
  • 15. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc)
  • 16. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg   
  • 17. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone   
  • 18. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone    Reliability   
  • 19. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone    Reliability    Integrity   
  • 20. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone    Reliability    Integrity    Transport-level non-repudiation   
  • 21. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone    Reliability    Integrity    Transport-level non-repudiation    Privacy   
  • 22. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone    Reliability    Integrity    Transport-level non-repudiation    Privacy    Trust   
  • 23. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone    Reliability    Integrity    Transport-level non-repudiation    Privacy    Trust    Avg. latency lower than 5 min.   + (tender?)
  • 24. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone    Reliability    Integrity    Transport-level non-repudiation    Privacy    Trust    Avg. latency lower than 5 min.   + (tender?) High volume   
  • 25. Business Requirements Business concern Service provider Large Organization Company Low cost of entry    Other cost of entry    (e.g.complexity, contractual, etc) Low cost per msg    Technology comfort zone    Reliability    Integrity    Transport-level non-repudiation    Privacy    Trust    Avg. latency lower than 5 min.   + (tender?) High volume   
  • 26. Architectural goals Secure and reliable Realizable with internet technologies Federated and scalable Lower barriers Leverage investments in existing infrastructures Allow existing business models to co-exist
  • 27. A four-corner-model is needed because… The requirements differs a lot between service providers and SME’s Trust requirement raises the barrier The technical solution requires a trusted third party Also the “low latency” and “availability” requirements raises the barrier Requires hosted service with good SLA Conclusion: No single transport profile matches all the requirements. The four-corner-model caters for this inherent problem.
  • 28. Basically a four corner model
  • 29. However…. All access points must meet a number of requirements: Sign roaming agreement Meet SLA requirements Certificate listed in TSL Have full transport interoperability Every access points are treated equally Business model not considered Anyone meeting requirements can become an Access Point
  • 31. Roles and transports SP (e.g. Bank) Company Company SP SP Key Company Large Company or government agency PEPPOL full profile PEPPOL queued profile PEPPOL lightweight profile Out of Scope / Legacy protocol
  • 32. Initial thinking on transport profiles • Full profile – High fidelity, guaranteed secure delivery of messages from Access Point to Access Point – Based on open standards such as WS-* – The only “required” profile • Queued profile – High fidelity, guaranteed secure delivery of messages from Access Point to Access Point using a message queuing model – An optional profile to enable efficient delivery of high volume between two VANs • Lightweight profile – A simple low cost profile that enables a disconnected company to access stored messages via a PEPPOL Service Provider – Analogous to using SMTP Relay and POP3/IMAP
  • 33. Roles and Transports PUT SP PUT (e.g. Bank) Company PUT Company PUT PUT PUT SP GET PUT PSP PUT Company Key PEPPOL full profile Large PEPPOL queued profile Company or PEPPOL lightweight profile government Out of Scope / Legacy protocol agency
  • 34. Message exchange in PEPPOL • The main questions are: – Who, where, why, how? Why should I trust? Trust How do I transport my document? Sender Receiver How do I advertise Who can I reach? Registry my capabilities? Where can I send my document?
  • 35. Scenario – CA based trust
  • 36. Scenario – TLS based trust PEPPOL infra- structure sphere Existing Existing infra- infrastructure structure sphere sphere PEPPOL infrastructure sphere Govt. Message + agency SAML token Access SME 1 Trust Point 4 Trust Get VAN lookup token Trusted 3rd party Access Service STS Point 1 List Message + SAML token Large company PUT Access PEPPOL Point 3 Large Relay company Service SME 2 Access Point 2 Portal SME 5 SME 4 SME 3
  • 37. Scenario – STS based trust
  • 38. Scenario 1: Basic send Send to Country A company C – • how??Key: CompanyC Invoice • Doc: Invoice • Profile: Peppol PEDRI • Country: B Registry Endpoint: Operator • Access point 2 1 Company B • http://ap2.de/ Company A PEDRI This is the area that Access point, PEDRI adresses VAN 1 Transport properties • Secure • Reliable Profile properties • Transport + QoS Country B Access point 2, Operator 2 WS-* over internet AMQP / Operator WS-* over 2 Company C Public internet agency D Other options..
  • 39. Decentralized registry infrastructure • 2 central questions: – Which registry has information on the recipient? – Where can I find the recipient? Registry Which registry? locator service Sender Register Service Which endpoint? registry • These questions can be answered through many different strategies
  • 40. Registry overview Top level registry Lookup Sender Point to Point to Register & manage 2nd level registry A 2nd level registry B Operator A Operator B Register Replicated registries Recipient Lookup Receive payload Sender Transport layer Send payload - Open standards - Secure & reliable transport Recipient Sender endpoint entry point
  • 41. Scenario II: Multiple operators Send to Agency D – how?? Country A Invoice • Key: Agency D PEDRI Registry: Registry • Registry C Operator Registry A Endpoint: • http://reg.c.de/Key: Agency D • 1 Company B • Access point 2 • Doc: Invoice Company A • http://ap2.de/ • Profile: Peppol Access point, PEDRI VAN 1 Transport properties Registry B • Secure • Reliable Access point, Profile properties Registry C national • Transport + QoS Country B Access point 2, Operator 2 Operator 2 Company C Public agency D Access point 3, Operator 3 Company E Operator 3 Company F
  • 42. Scenario V – Lightweight Profile Country A PEDRI Top-level • Key: Company H Registry Operator 1 Company B Registry: Company A • Registry C • http://reg.c.de/ Access point, PEDRI VAN 1 Transport properties • WS-* based Endpoint: Country B • Company H Access point 2, PUT Access point 4 • http://compH.de/ Operator 2 (PEPPOL service provider) • PGP key Operator 2 Invoice Company C Public Send to agency D company H – how?? •Bus. key: Company H Company G Company E • Doc: Invoice Operator • Profile: Peppol Registry C 3 Company F GET Company H Register with: • Bus. key: Company H • Doc: Invoice • Profile: Peppol Access point 5 (PEPPOL service provider)
  • 43. Fees for using PEPPOL infrastructure? There is no fee associated with sending and receiving messages between PEPPOL Access Point There may be fees to: – Have an entry listed in a registry – Use an STS / Certificate Validation Service However.. Service providers choose their own business model
  • 44. Roadmap for PEPPOL Infrastructure May 2009 – April 2010 : Construction – May – Hands on workshop for developers – October – New release – January - PEPPOL 2010 – February – New release – May 1st – Production May 2010 – April 2011 : Pilot – Workshops – Standardization – Aid to pilots – Patches
  • 45. Summary PEPPOL offers: A pan European registry architecture – Business entities, Business processes, Business documents, Transport, Security information A trust model Certificate validation Secure and reliable transport Specifications Reference implementations A governance model
  • 46. http://www.peppol.eu http://www.peppolinfrastructure.com – WP8 Solution architecture – technical stuff

Editor's Notes

  1. TODO perhaps also show company A to AP national to AP3 to Company F
  2. TODO perhaps also show company A to AP national to AP3 to Company F