[{"data":1,"prerenderedAt":262},["ShallowReactive",2],{"blog-post-blog_en-souveraener-datenaustausch-mit-catena-x":3},{"id":4,"title":5,"body":6,"cover":247,"date":248,"description":249,"draft":250,"extension":251,"meta":252,"navigation":253,"path":254,"seo":255,"stem":256,"tags":257,"__hash__":261},"blog_en\u002Fen\u002Fblog\u002Fsouveraener-datenaustausch-mit-catena-x.md","Sovereign Data Exchange with Catena-X",{"type":7,"value":8,"toc":242},"minimark",[9,13,18,21,25,33,55,58,65,68,228,232,235,238],[10,11,12],"p",{},"The automotive industry faces a core challenge: How can data be exchanged securely and sovereignly along the entire value chain without losing control over your own data?",[14,15,17],"h2",{"id":16},"what-is-catena-x","What is Catena-X?",[10,19,20],{},"Catena-X is an open data ecosystem for the automotive industry. It provides a standardized framework in which companies can share data while maintaining full data sovereignty. This means every participant decides who gets access to which data and under what conditions.",[14,22,24],{"id":23},"the-role-of-eclipse-dataspace-components","The Role of Eclipse Dataspace Components",[10,26,27,28,32],{},"The technical foundation is provided by the ",[29,30,31],"strong",{},"Eclipse Dataspace Components (EDC)",". They implement the Dataspace Protocol and enable:",[34,35,36,43,49],"ul",{},[37,38,39,42],"li",{},[29,40,41],{},"Connectors"," for secure data exchange between participants",[37,44,45,48],{},[29,46,47],{},"Policy-based access control"," at the data level",[37,50,51,54],{},[29,52,53],{},"Decentralized architecture"," without central data storage",[10,56,57],{},"The following diagram shows the basic architecture of an EDC connector:",[10,59,60],{},[61,62],"img",{"alt":63,"src":64},"EDC Architecture","\u002Fimg\u002Fblog\u002Fedc-architecture.png",[10,66,67],{},"A simple example of an EDC policy:",[69,70,75],"pre",{"className":71,"code":72,"language":73,"meta":74,"style":74},"language-json shiki shiki-themes github-light github-dark","{\n  \"@type\": \"PolicyDefinition\",\n  \"policy\": {\n    \"permissions\": [\n      {\n        \"action\": \"use\",\n        \"constraints\": [\n          {\n            \"leftOperand\": \"BusinessPartnerNumber\",\n            \"operator\": \"eq\",\n            \"rightOperand\": \"BPNL00000003CRHK\"\n          }\n        ]\n      }\n    ]\n  }\n}\n","json","",[76,77,78,87,104,113,122,128,141,149,155,168,181,192,198,204,210,216,222],"code",{"__ignoreMap":74},[79,80,83],"span",{"class":81,"line":82},"line",1,[79,84,86],{"class":85},"sVt8B","{\n",[79,88,90,94,97,101],{"class":81,"line":89},2,[79,91,93],{"class":92},"sj4cs","  \"@type\"",[79,95,96],{"class":85},": ",[79,98,100],{"class":99},"sZZnC","\"PolicyDefinition\"",[79,102,103],{"class":85},",\n",[79,105,107,110],{"class":81,"line":106},3,[79,108,109],{"class":92},"  \"policy\"",[79,111,112],{"class":85},": {\n",[79,114,116,119],{"class":81,"line":115},4,[79,117,118],{"class":92},"    \"permissions\"",[79,120,121],{"class":85},": [\n",[79,123,125],{"class":81,"line":124},5,[79,126,127],{"class":85},"      {\n",[79,129,131,134,136,139],{"class":81,"line":130},6,[79,132,133],{"class":92},"        \"action\"",[79,135,96],{"class":85},[79,137,138],{"class":99},"\"use\"",[79,140,103],{"class":85},[79,142,144,147],{"class":81,"line":143},7,[79,145,146],{"class":92},"        \"constraints\"",[79,148,121],{"class":85},[79,150,152],{"class":81,"line":151},8,[79,153,154],{"class":85},"          {\n",[79,156,158,161,163,166],{"class":81,"line":157},9,[79,159,160],{"class":92},"            \"leftOperand\"",[79,162,96],{"class":85},[79,164,165],{"class":99},"\"BusinessPartnerNumber\"",[79,167,103],{"class":85},[79,169,171,174,176,179],{"class":81,"line":170},10,[79,172,173],{"class":92},"            \"operator\"",[79,175,96],{"class":85},[79,177,178],{"class":99},"\"eq\"",[79,180,103],{"class":85},[79,182,184,187,189],{"class":81,"line":183},11,[79,185,186],{"class":92},"            \"rightOperand\"",[79,188,96],{"class":85},[79,190,191],{"class":99},"\"BPNL00000003CRHK\"\n",[79,193,195],{"class":81,"line":194},12,[79,196,197],{"class":85},"          }\n",[79,199,201],{"class":81,"line":200},13,[79,202,203],{"class":85},"        ]\n",[79,205,207],{"class":81,"line":206},14,[79,208,209],{"class":85},"      }\n",[79,211,213],{"class":81,"line":212},15,[79,214,215],{"class":85},"    ]\n",[79,217,219],{"class":81,"line":218},16,[79,220,221],{"class":85},"  }\n",[79,223,225],{"class":81,"line":224},17,[79,226,227],{"class":85},"}\n",[14,229,231],{"id":230},"why-this-matters","Why This Matters",[10,233,234],{},"In an increasingly connected industry, keeping data purely internal is no longer sufficient. At the same time, there need to be clear rules and technical guarantees that shared data won't be misused. Catena-X and the EDC solve exactly this tension.",[10,236,237],{},"I work with these technologies daily and build solutions that enable companies to securely enter the dataspace.",[239,240,241],"style",{},"html pre.shiki code .sVt8B, html code.shiki .sVt8B{--shiki-default:#24292E;--shiki-dark:#E1E4E8}html pre.shiki code .sj4cs, html code.shiki .sj4cs{--shiki-default:#005CC5;--shiki-dark:#79B8FF}html pre.shiki code .sZZnC, html code.shiki .sZZnC{--shiki-default:#032F62;--shiki-dark:#9ECBFF}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":74,"searchDepth":89,"depth":89,"links":243},[244,245,246],{"id":16,"depth":89,"text":17},{"id":23,"depth":89,"text":24},{"id":230,"depth":89,"text":231},"\u002Fimg\u002Fblog\u002Fcatena-x-cover.jpg","2026-04-06","How Catena-X and the Eclipse Dataspace Components enable secure, standardized data exchange in the automotive industry.",false,"md",{},true,"\u002Fen\u002Fblog\u002Fsouveraener-datenaustausch-mit-catena-x",{"title":5,"description":249},"en\u002Fblog\u002Fsouveraener-datenaustausch-mit-catena-x",[258,259,260],"Catena-X","Dataspace","EDC","_YCvjH_opT2Z9RNPw-2g5B0KjbRuJgrDPTcgpwLyoIo",1775892933859]