...
1. Can you describe the research workflow? I think those are details we can ask as we go through the workflow :
2.
Based on the workflow we could ask sub-quesions such as:
- Are the research data and databases of the Research Infrastructure accessible
...
...
- yes, they are continuously accessible both inside and outside the institution
...
- yes, they are continuously accessible from within the institution
...
- Accessible to others on a case-by-case basis
...
- Not accessible to others
...
- During the access of the Research Infrastructure which method is used (more than one option can be marked):
...
...
- Providing measurement/database access based on research collaboration
...
- Provision of measurement/database access for based on a contract
...
- Measurements/database access with customer/requester access
...
- Taking measurements/database access by providing online/remote access
...
- Measurements/database access with data processing and evaluation
...
- Other: (describe)
E. Requirements
- Gaps, challenges ..
...
- Can you describe further requirements, gaps and challenges?
As we collect the answers, we will try to identify common requirements. We can use the EOSC AAI requirements as basis for this:
- Stronger Authentication Methods
- Develop a policy requiring the community participants to provide a centralised point for managing data release
...
- decisionas
- Support for EU Digital Identity Wallets (EUDI Wallet)
...
- Better user experience for authentication process
...
- Scalable solution limiting the number of consent requests in compliance with the GDPR
...
- Develop a sustainable solution for managing (de)provisioning rules in the locally deployed solutions of participating entities and transferring them through EOSC AAI to the end-service integration point. (Manage locally and transfer them through the whole flow)
...
- Dynamically establishing trust in a distributed environment
...
- Provide solutions for an identity beyond the research and education community in support of public sector and private sector services.
...
- Scalable authorization model in EOSC AAI
...
- Identity Vetting
...