...
- 'Research governance’ as a foundational area.
- ‘Users’ are (human) end-users who participate in a collaboration, are identified via
- ‘Authentication Sources’, i.e. external identity providers and the identity layer of the BPA, to be granted access by
- ‘Collaboration Management’, to
- ‘Service and Infrastructure Providers’; in the BPA the infrastructure integration components, site-local integration components, and the actual service providers.
Policiesin PDK version 2 are standards to which adherence can be asserted and that can be assessed and validated – for example as trust marks – that are endorsed by AEGIS and considered ‘standards track’. Policies are endorsed by the organisation at the appropriate level of management, and express a commitment of adherence by the organisation’s management. These are indicated in a roman font in the graphic below.
The Indicated in italics in the diagram processes and procedures, being templates, are reference implementations where we assume these to be specialised for specific deployments. In the diagram these are indicated in italics.In the diagram, processes and procedures, being templates
The semi-opaque elements are relevant, but fall outside of the scope of the PDK, which targets the authentication and authorisation infrastructure. But even if, for example. identifying the 'why and what' of your research collaboration (your 'primary assets') may not be AAI per-se (and hence greyed-out), it is very useful to know that before embarking on your AAI journey!
...