Ready to explore the dataspace?

Your Data Ecosystem

Discover partners, find data, negotiate contracts, and access information securely

🌌

Explore Space

Discover dataspace participants, view their capabilities, and understand the ecosystem

  • View all participants
  • Check compliance status
  • Browse partner catalogs
📚

Browse Catalog

Explore available datasets from providers with detailed policy information

  • Search datasets
  • View policy constraints
  • Compare offers
🤝

Manage Contracts

Track contract negotiations, view participant information, and monitor progress

  • Active negotiations
  • Participant verification
  • Contract lifecycle
🚀

Monitor Transfers

Track data transfer requests and view delegation evidence validation

  • Transfer status
  • Delegation checks
  • Data access
🎫

iSHARE Framework Compliance Credential

Unlock access to compliance-protected data assets in the dataspace

What is it?

The iSHARE Framework Compliance Credential is a Verifiable Credential that proves your organization is compliant with the iSHARE trust framework. This credential is required to access premium data assets that enforce compliance policies.

Issued by the iSHARE Compliance Issuer
W3C Verifiable Credential format (VC1.0 JWT)
Valid for 1 year from issuance
Stored securely in your EDC Wallet

How to get it?

1

Apply via Onboarding Portal

Submit your organization details and DID at the onboarding portal

2

Admin Review & Approval

Dataspace admin reviews and activates your participant entry

3

Request Credential

Use the participant dropdown to request your compliance credential

4

Access Protected Assets

Browse and negotiate for compliance-protected data offers

Ready to get started?

Join the iSHARE dataspace and unlock access to trusted data exchange.

Understanding the Dataspace

Learn how secure data sharing works in our ecosystem

🌐

What is a Dataspace?

A dataspace is a digital ecosystem where organizations can securely share and access data while maintaining control and compliance. It enables trusted data exchange between participants through standardized protocols and governance frameworks.

Secure data sharing
Standardized protocols
Regulatory compliance
⚙️

How Data Sharing Works

Our dataspace uses a federated architecture where participants maintain sovereignty over their data while enabling controlled sharing through policies and agreements.

🔍Discover available data
🤝Negotiate access terms
🔐Verify authorizations
🔧

Key Technologies

Our dataspace leverages industry standards and protocols to ensure interoperability and trust between participants.

🏗️EDC
🔑iSHARE
📋ODRL
🌐DSP
👤

Your Role in the Ecosystem

As a Service Consumer in our dataspace, you can securely access data from trusted providers to power your applications and services.

💼Business applications
📊Data analytics
🔒Policy-compliant access

Ready to Start Your Data Journey?

Explore the dataspace, discover available data, and establish secure connections with partners.

How Data Sharing Works

1️⃣
Find Partners in the Space to understand who you can work with
2️⃣
Browse Data in Catalogs to see what information is available
3️⃣
Negotiate Contracts to establish terms for data access
4️⃣
Transfer Data securely with automatic compliance checks