6. Appendix# 6.1. ID Broker architecture and flows 6.1.1. Theory 6.1.2. Requirements for the auth flow 6.1.3. ID Broker Flow 6.1.4. Alternatives 6.2. Data model 6.2.1. Mapping LDAP / UDM / UCS@school attributes 6.3. manage-service-providers