| ID | Title | Summary | Links | Status |
|---|
| AARC- |
JRA1.4AGuidelines on expressing group membership and role information | Information about the groups a user is a member of is commonly used by SPs to authorise user access to protected resources. Apart from the group information that is managed by the user’s home IdP, research communities usually operate their own group managing services. Such services often act as Attribute Authorities, maintaining additional information about the users, including VO membership, group membership within VOs, as well as user roles. It is therefore necessary that all involved SPs and IdPs/AAs can interpret this information in a uniform way. Specifically, the following challenges are addressed by this document: - Standardising the way group membership information is expressed, both syntactically and semantically
- Indicating the entity that is authoritative for each piece of group membership information
- Expressing VO membership and role information
- Supporting group hierarchies in group membership information
| AARC-JRA1.4A (201710) [PDF] Older versions AARC-JRA1.4A (1.0) [PDF] | | AARC-JRA1.4B | Guidelines on attribute aggregation | PDF | | AARC-JRA1.4C | Guidelines on token translation services | PDF | | AARC-JRA1.4D | Guidelines on credential delegation | PDF | | AARC-JRA1.4E | Best practices for managing authorisation | PDF | | AARC-JRA1.4F | Guidelines on non-browser access | PDF | | AARC-JRA1.4G | Guidelines for implementing SAML authentication proxies for social media identity providers | PDF | | AARC-JRA1.4H | Account linking and LoA elevation use cases and common practices for international research collaboration | PDF | | AARC-JRA1.4I | Best practices and recommendations for attribute translation from federated authentication to X.509 credentials | PDF | | | AARC2-JRA1.1A | Guideline on the exchange of specific assurance information between Infrastructures | Increasingly Research Infrastructures and generic e-Infrastructures compose an 'effective' assurance profile derived from several sources. The assurance elements may come from an institutional identity provider (IdP), from community-provided information sources, from step-up authentication services, and from controls placed upon the user, the community, or the Infrastructure Proxy through either policy or technical enforcement. Knowledge about the upstream source of either identity or authenticator can also influence the risk perception of the Infrastructure and result in a modification of the assurance level, e.g. because it has involved a social identity provider or perhaps a government e-ID. The granularity of this composite assurance profile is attuned to the risk assessment specific to the Infrastructure or Infrastructures, and is often both more fine-grained and more specific than what can reasonably be expressed by generic IdPs or consumed by generic service providers. Yet it is desirable to exchange as complete as possible the assurance assertion obtained between Infrastructures, so that assurance elements need not be re-asserted or re-computed by a recipient Infrastructure or Infrastructure service provider. This document describes the assurance profiles that are recommended to be used by the e-Infrastructures and research infrastructures AAI platforms to exchange user authentication information between infrastructures. | Wiki | |
AARC2-JRA1.1B | Guidelines for the discovery of authoritative attribute providers across different operational domains | AARC2-JRA1.1C | Guidelines for handling user registration and user consent for releasing attributes across different operational domains | AARC2-JRA1.1D | Guidelines for federated access to non-web services across different operational domains | AARC2-JRA1.1E | Guidelines for the exchange of affiliation information between infrastructures | Wiki | | Status |
|---|
| colour | Yellow |
|---|
| title | IN PROGRESS |
|---|
|
| AARC2-JRA1.1F | Guidelines for uniquely identifying users across infrastructures | Wiki | | AARC2-JRA1.2A | Guidelines for scalable and consistent authorisation across multi-SP environments | Wiki | | Status |
|---|
| colour | Yellow |
|---|
| title | IN PROGRESS |
|---|
|
| AARC2-JRA1.2B | Requirements and guidelines for SPs using alternative mechanisms and protocols for federated access → OIDC Based Services in research
| Wiki | | Status |
|---|
| colour | Yellow |
|---|
| title | IN PROGRESS |
|---|
|
| AARC2-JRA1.2C | Step-up authentication requirements and guidelines for SPs | Wiki | | Status |
|---|
| colour | Yellow |
|---|
| title | IN PROGRESS |
|---|
|
| AARC2-JRA1.2D | | G056 | AARC profile for expressing community identity attributes | This document defines a profile for expressing the attributes of a researcher’s digital identity. The profile contains a common list of attributes and definitions based on existing standards and best practises in research & education. The attributes include identifiers, profile information, and community attributes such as group membership and role information. | Google doc | |
AARC-G080
| AARC Blueprint Architecture 2025
| The AARC Blueprint Architecture (BPA) provides a set of building blocks for software architects and technical decision makers who are designing and implementing access management solutions for international research collaborations. This document describes the evolution of the AARC Blueprint Architecture, starting with a summary of the changes since AARC-BPA-2019. | Google doc (Initial Revision) | | Status |
|---|
| colour | Yellow |
|---|
| title | FINAL CALL |
|---|
|
|
| AARC-G100 | Guidelines for Establishing Trust between AARC-compliant AAI services using OpenID Federation | This specification provides guidance for enabling interaction and establishing trust among AARC-compliant proxies that implement OAuth 2.0 Authorization Servers (AS) and Resource Servers (RS) residing in distinct domains. These interactions are facilitated through trusted third parties referred to as Trust Authorities, which are entities issuing authoritative statements about entities that participate in an identity federation. The federation uses OpenID Federation. This document is intended for operators and implementers of AAI services and defines two trust profiles: G100.1 (Basic Trust Model), specifying the minimum requirements for establishing trust between proxies using OpenID Federation trust chains, and G100.2 (Fine-Grained Trust Model), which extends the basic model with policy-based trust through the use of Trust Marks and metadata policies. | Website Google doc | |