Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Info

Under construction

...

A.

...

Generic

  1.  Which Which Research Infrastructure (RI) are you representing?
  2. Which type of science are you serving ? (Frascati manual of Fields of Research and Development (FORD)) (can we compile a list!?)
  3. Please provide description about the research infrastructure (e.g. which kind of instrastructure and related services are delivered and by whoom, is there a formalised collaboration etc.)
  4. Please provide description of the user audience (e.g. number of users, distribution over the globe and organisations)
  5. Do you (also) cater for users from the citizen scientists or industry users? 
  6. Is the RI member of European Open Science Cloud (EOSC)?
  7. Is the RI participating in Citizen Science Programmes or other initiatives or programmes?

B. AAI solution

  1. Describe the currently running solution for authentication and authorisation infrastructure (AAI).

  2. Is your AAI solution compliant to AARC BPA (blue print arcitectureblueprint architecture)?
  3. Which AARC guidelines are you implementing? (add the table... )

...

  • Stronger Authentication Methods
  • Develop a policy requiring the community participants to provide a centralised point for managing data release decisionas
  • Support for EU Digital Identity Wallets (EUDI Wallet)
  • Better user experience for authentication process
  • Scalable solution limiting the number of consent requests in compliance with the GDPR
  • Develop a sustainable solution for managing (de)provisioning rules in the locally deployed solutions of participating entities and transferring them through EOSC AAI to the end-service integration point. (Manage locally and transfer them through the whole flow)
  • Dynamically establishing trust in a distributed environment
  • Provide solutions for an identity beyond the research and education community in support of public sector and private sector services.
  • Scalable authorization model in EOSC AAI
  • Identity Vetting