...
1. Can you describe the research workflow?
I think those are details we can ask as we go through the workflow :
2. Are the research data and databases of the Research Infrastructure accessible?
1. yes, they are continuously accessible both inside and outside the institution
2. yes, they are continuously accessible from within the institution
3. Accessible to others on a case-by-case basis
4. Not accessible to others
3. During the access of the Research Infrastructure which method is used (more than one option can be marked):
1. Providing measurement/database access based on research collaboration
2. Provision of measurement/database access for based on a contract
3. Measurements/database access with customer/requester access
4. Taking measurements/database access by providing online/remote access
5. Measurements/database access with data processing and evaluation
6. Other: (describe)
E. Requirements
- Gaps, challenges ..
I think that we try to deduct them as we go through the gaps and challenges but dont ask explicitely:
1. What are the AAI requirements of your RI?
1. Requirement: Stronger Authentication Methods
2. Requirement: Develop a policy requiring the community participants to provide a centralised point for managing data release decisions
3. Requirement: Support for EU Digital Identity Wallets (EUDI Wallet)
4. Requirement: Better user experience for authentication process
5. Requirement: Scalable solution limiting the number of consent requests in compliance with the GDPR
6. Requirement: Develop a sustainable solution for managing (de)provisioning rules in the locally deployed solutions of participating entities and transferring them through EOSC AAI to the end-service integration point. (Manage locally and transfer them through the whole flow)
7. Requirement: Dynamically establishing trust in a distributed environment
8. Requirement: Provide solutions for an identity beyond the research and education community in support of public sector and private sector services.
9. Requirement: Scalable authorization model in EOSC AAI
10. Requirement: Identity Vetting
11. Other Requirement: ????
...