[{"data":1,"prerenderedAt":262},["ShallowReactive",2],{"blog-post-blog_de-souveraener-datenaustausch-mit-catena-x":3},{"id":4,"title":5,"body":6,"cover":247,"date":248,"description":249,"draft":250,"extension":251,"meta":252,"navigation":253,"path":254,"seo":255,"stem":256,"tags":257,"__hash__":261},"blog_de\u002Fde\u002Fblog\u002Fsouveraener-datenaustausch-mit-catena-x.md","Souveräner Datenaustausch mit Catena-X",{"type":7,"value":8,"toc":242},"minimark",[9,13,18,21,25,33,55,58,65,68,228,232,235,238],[10,11,12],"p",{},"Die Automobilindustrie steht vor einer zentralen Herausforderung: Wie lassen sich Daten entlang der gesamten Wertschöpfungskette sicher und souverän austauschen, ohne die Kontrolle über die eigenen Daten zu verlieren?",[14,15,17],"h2",{"id":16},"was-ist-catena-x","Was ist Catena-X?",[10,19,20],{},"Catena-X ist ein offenes Datenökosystem für die Automobilindustrie. Es schafft einen standardisierten Rahmen, in dem Unternehmen Daten teilen können - unter voller Wahrung ihrer Datensouveränität. Das bedeutet: Jeder Teilnehmer bestimmt selbst, wer Zugriff auf welche Daten erhält und unter welchen Bedingungen.",[14,22,24],{"id":23},"die-rolle-der-eclipse-dataspace-components","Die Rolle der Eclipse Dataspace Components",[10,26,27,28,32],{},"Die technische Grundlage bilden die ",[29,30,31],"strong",{},"Eclipse Dataspace Components (EDC)",". Sie implementieren das Dataspace Protocol und ermöglichen:",[34,35,36,43,49],"ul",{},[37,38,39,42],"li",{},[29,40,41],{},"Konnektoren"," für den sicheren Datenaustausch zwischen Teilnehmern",[37,44,45,48],{},[29,46,47],{},"Policy-basierte Zugriffskontrolle"," auf Datenebene",[37,50,51,54],{},[29,52,53],{},"Dezentrale Architektur"," ohne zentrale Datenhaltung",[10,56,57],{},"Die folgende Abbildung zeigt die grundlegende Architektur eines EDC-Konnektors:",[10,59,60],{},[61,62],"img",{"alt":63,"src":64},"EDC-Architektur","\u002Fimg\u002Fblog\u002Fedc-architecture.png",[10,66,67],{},"Ein einfaches Beispiel für eine EDC-Policy:",[69,70,75],"pre",{"className":71,"code":72,"language":73,"meta":74,"style":74},"language-json shiki shiki-themes github-light github-dark","{\n  \"@type\": \"PolicyDefinition\",\n  \"policy\": {\n    \"permissions\": [\n      {\n        \"action\": \"use\",\n        \"constraints\": [\n          {\n            \"leftOperand\": \"BusinessPartnerNumber\",\n            \"operator\": \"eq\",\n            \"rightOperand\": \"BPNL00000003CRHK\"\n          }\n        ]\n      }\n    ]\n  }\n}\n","json","",[76,77,78,87,104,113,122,128,141,149,155,168,181,192,198,204,210,216,222],"code",{"__ignoreMap":74},[79,80,83],"span",{"class":81,"line":82},"line",1,[79,84,86],{"class":85},"sVt8B","{\n",[79,88,90,94,97,101],{"class":81,"line":89},2,[79,91,93],{"class":92},"sj4cs","  \"@type\"",[79,95,96],{"class":85},": ",[79,98,100],{"class":99},"sZZnC","\"PolicyDefinition\"",[79,102,103],{"class":85},",\n",[79,105,107,110],{"class":81,"line":106},3,[79,108,109],{"class":92},"  \"policy\"",[79,111,112],{"class":85},": {\n",[79,114,116,119],{"class":81,"line":115},4,[79,117,118],{"class":92},"    \"permissions\"",[79,120,121],{"class":85},": [\n",[79,123,125],{"class":81,"line":124},5,[79,126,127],{"class":85},"      {\n",[79,129,131,134,136,139],{"class":81,"line":130},6,[79,132,133],{"class":92},"        \"action\"",[79,135,96],{"class":85},[79,137,138],{"class":99},"\"use\"",[79,140,103],{"class":85},[79,142,144,147],{"class":81,"line":143},7,[79,145,146],{"class":92},"        \"constraints\"",[79,148,121],{"class":85},[79,150,152],{"class":81,"line":151},8,[79,153,154],{"class":85},"          {\n",[79,156,158,161,163,166],{"class":81,"line":157},9,[79,159,160],{"class":92},"            \"leftOperand\"",[79,162,96],{"class":85},[79,164,165],{"class":99},"\"BusinessPartnerNumber\"",[79,167,103],{"class":85},[79,169,171,174,176,179],{"class":81,"line":170},10,[79,172,173],{"class":92},"            \"operator\"",[79,175,96],{"class":85},[79,177,178],{"class":99},"\"eq\"",[79,180,103],{"class":85},[79,182,184,187,189],{"class":81,"line":183},11,[79,185,186],{"class":92},"            \"rightOperand\"",[79,188,96],{"class":85},[79,190,191],{"class":99},"\"BPNL00000003CRHK\"\n",[79,193,195],{"class":81,"line":194},12,[79,196,197],{"class":85},"          }\n",[79,199,201],{"class":81,"line":200},13,[79,202,203],{"class":85},"        ]\n",[79,205,207],{"class":81,"line":206},14,[79,208,209],{"class":85},"      }\n",[79,211,213],{"class":81,"line":212},15,[79,214,215],{"class":85},"    ]\n",[79,217,219],{"class":81,"line":218},16,[79,220,221],{"class":85},"  }\n",[79,223,225],{"class":81,"line":224},17,[79,226,227],{"class":85},"}\n",[14,229,231],{"id":230},"warum-das-wichtig-ist","Warum das wichtig ist",[10,233,234],{},"In einer zunehmend vernetzten Industrie reicht es nicht mehr, Daten nur intern zu halten. Gleichzeitig braucht es klare Regeln und technische Garantien dafür, dass geteilte Daten nicht missbraucht werden. Catena-X und die EDC lösen genau dieses Spannungsfeld.",[10,236,237],{},"Ich arbeite täglich mit diesen Technologien und entwickle Lösungen, die Unternehmen einen sicheren Einstieg in den Dataspace ermöglichen.",[239,240,241],"style",{},"html pre.shiki code .sVt8B, html code.shiki .sVt8B{--shiki-default:#24292E;--shiki-dark:#E1E4E8}html pre.shiki code .sj4cs, html code.shiki .sj4cs{--shiki-default:#005CC5;--shiki-dark:#79B8FF}html pre.shiki code .sZZnC, html code.shiki .sZZnC{--shiki-default:#032F62;--shiki-dark:#9ECBFF}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":74,"searchDepth":89,"depth":89,"links":243},[244,245,246],{"id":16,"depth":89,"text":17},{"id":23,"depth":89,"text":24},{"id":230,"depth":89,"text":231},"\u002Fimg\u002Fblog\u002Fcatena-x-cover.jpg","2026-04-06","Wie Catena-X und die Eclipse Dataspace Components einen sicheren, standardisierten Datenaustausch in der Automobilindustrie ermöglichen.",false,"md",{},true,"\u002Fde\u002Fblog\u002Fsouveraener-datenaustausch-mit-catena-x",{"title":5,"description":249},"de\u002Fblog\u002Fsouveraener-datenaustausch-mit-catena-x",[258,259,260],"Catena-X","Dataspace","EDC","nGSCHsRz-x4NiZ_AeGhH-LDnH52xNvw0HoUnLhpR0qk",1775892933459]