Under construction
A. Generic
- Which Research Infrastructure (RI) are you representing?
- Which type of science are you serving ? (Frascati manual of Fields of Research and Development (FORD)) (can we compile a list!?)
- Please provide description about the research infrastructure (e.g. which kind of instrastructure and related services are delivered and by whoom, is there a formalised collaboration etc.)
- Please provide description of the user audience (e.g. number of users, distribution over the globe and organisations)
- Do you (also) cater for users from the citizen scientists or industry users?
- Is the RI member of European Open Science Cloud (EOSC)?
- Is the RI participating in Citizen Science Programmes or other initiatives or programmes?
B. AAI solution
Describe the currently running solution for authentication and authorisation infrastructure (AAI).
- Is your AAI solution compliant to AARC BPA (blueprint architecture)?
- Which AARC guidelines are you implementing? (add the table... )
C. Policy for access management
- Does the Research Infrastructures have an access policy? (the access policy governs who can access the infrastructure, under what conditions)
- Is there a formalised procedure to manage access rights to services (e.g. cooperation agreement, call for application and evaluation, ad-hoc individual order/access, member of an organisation, etc.)?
- How do you implement the policy for access management (e.g. how is the individual who can access the research research data/measurement data/your research instrument identified and authorised)?
- What are the requirements for identification of the users (e.g. required information, LoA, authentication method)?
D. Workflow
1. Can you describe the research workflow?
Based on the workflow we could ask sub-quesions such as:
- Are the research data and databases of the Research Infrastructure accessible
- yes, they are continuously accessible both inside and outside the institution
- yes, they are continuously accessible from within the institution
- Accessible to others on a case-by-case basis
- Not accessible to others
- During the access of the Research Infrastructure which method is used (more than one option can be marked):
- Providing measurement/database access based on research collaboration
- Provision of measurement/database access for based on a contract
- Measurements/database access with customer/requester access
- Taking measurements/database access by providing online/remote access
- Measurements/database access with data processing and evaluation
- Other: (describe)
E. Requirements
- Can you describe further requirements, gaps and challenges?
As we collect the answers, we will try to identify common requirements. We can use the EOSC AAI requirements as basis for this:
- Stronger Authentication Methods
- Develop a policy requiring the community participants to provide a centralised point for managing data release decisionas
- Support for EU Digital Identity Wallets (EUDI Wallet)
- Better user experience for authentication process
- Scalable solution limiting the number of consent requests in compliance with the GDPR
- Develop a sustainable solution for managing (de)provisioning rules in the locally deployed solutions of participating entities and transferring them through EOSC AAI to the end-service integration point. (Manage locally and transfer them through the whole flow)
- Dynamically establishing trust in a distributed environment
- Provide solutions for an identity beyond the research and education community in support of public sector and private sector services.
- Scalable authorization model in EOSC AAI
- Identity Vetting