Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

If you like an existing idea you can just add a +1 for endorsement. The more supporters a proposal gets the more likely it is to be implemented.

...

titleExample from the previous cycle

...

The eduGAIN service activity will set up a POC in order to evaluate the new OpenID Federation (OIDfed) standard and wants to eventually create an official eduGAIN Technology Profile to extend the current service.

The Trust and Identity Incubator has over the years build considerable experience with developing tooling, and implementing OpenID Fed in various products and languages, as well as evaluating e.g. REFEDs specifications in the context of OIDfed.

This activity seeks to contribute to the eduGAIN PoC by:

  • Sharing existing experience and providing a sparring partner to the eduGAIN PoC team
  • Contribute to standards and policy development for eduGAIN and national federations (upon request by the eduGAIn PoC team)
  • Developing or further enhancing software tools, including, but not limited to:
    • Contribute to existing software development for the eduGAIN PoC
    • Build/Productise a (scalable) resolver which can be deployed by fedops and eduGAIN
    • Further improve visualisation and reporting tooling
    • Further improve Go based OP/RP

The incubator will work on these in close collaboration with the eduGAIN PoC team.

How are the topics selected?

The T&I incubator topics are generated by different methods:

  • public calls for proposals for ideas (on relevant email lists). The call for ideas are not only for the next upcoming cycle.
  • based on input from the T&I service owners and the service owner's development plan
  • by the incubator team by participation at relevant events (TNC, TIIME, FIM4R, TechEx, etc)
  • by the incubator team based its own research
  • re-evaluation of past, not-yet-implemented proposals to see if their relevance increased or conditions improved.

During the public calls there is a possibility to support (+1) topics (in this wiki) and to comment/enhance proposals made by others. While there is a season for public calls, the task leads might be approached at any time with a topic idea.

Ultimately, it is the task leads' responsibility to pick the topics, supervised by the work package leads and with the input and guidance from the WP5 lead team.

The task lead's job is to verify that: 

  • The proposal is inline and supports the execution of the GEANT strategy for the T&I area and the objectives of the GEANT project T&I Work Package
  • the proposal is realistically implementable in the ~ net 6 months that is available for one cycle for effective work, and within the budget
  • there is adequate kind of and amount of skill within the team to carry out a proposal. This means that even a well-prepared topic might get delayed or not picked up, if it requires a special skill (i.e. a programming language) that cannot be acquired.
  • there are no past or parallel efforts to carry out the exact same work. Similar, complementary, related efforts are not a problem as they signal interest in the general area. In such cases the proposal should be adjusted to prevent reinventing and to enhance collaboration with related work
  • in general, there should be an element of novelty and risk in the proposals. The Incubator is dedicated space for the T&I topic to experiment and even fail in a managed way. This is much less afforded to the other activities. Therefore, any proposal that achieves risk-less development goals has an opportunity cost of not using the resources for experimental, exploratory work. Experimental nature might come from: a first-of-a kind implementation of an idea or a spec; a first-of-a-kind combination of technologies, proof-of-concept for yet untested ideas, etc.

The points above also mean that topic popularity itself can only be one factor of topic selection. The task leads should be transparent about their reasoning.

It is also the task leads' job to improve, enhance on any proposals to achieve the above goals, which might require background research, community engagement and looking for talent.


Info
titleExample from the previous cycle
TitleStatusProposerSupporter (+1)DescriptionPossible outcomesNotes
<title>


New proposalProposer Name (Affiliation) and Another Proposer Name (Affiliation)Supporter name (optional. supporters might show up later)

A detailed description of the work: some context, goals, motivation.




Proposals:

Table of Contents
minLevel5


Note
titleTopic submission deadline

The Call for Ideas is always open. Currently we are looking for ideas for the cycle starting in June 2026.


TitleStatusProposerSupporter (+1)DescriptionTask leaders' notes
Post quantum cryptography for OpenID Connect and OpenID Federation

new proposal

Davide Vaghetti

 

How ready are OpenID Connect and OpenID Federation for post-quantum cryptography algorithms such as ML-KEM? I propose a lab & research activity to verify if the most prominent OIDC and OIDFed Trust Anchor, OP and RP implementations for our community — go-oidfed Lighthouse, go-oidfed OFFA, SUNET inmor, Shibboleth OIDC and OIDFed Plugin and SSP OIDC and OIDFed module, Satosa, Keycloak to name a few – can handle signing and encryption with post-quantum cryptography algorithms. 


update radsecproxy in OpenWRT TLS-PSK support 

new proposal

János Mohacsi

 

upgrade openwrt radsecproxyversion to the latestversion and provide UCI interface according to the guideline documented in eduroam  configuration guides and "TLS PSK configuration" guideline. 


Document radsecproxy TLS PSK configuration and develop guideline for TLS PSK enrollment 

new proposal

Janos Mohacsi

 

TLS-PSK standard is a candidate to replace traditional eduroam proxy hierarchy and make more secure the eduroam infrastructure with proper F-TICKS logging


refactor geteduroam server to use pkcs11 library to support HW cryptogrphy modules

new proposal

Janos Mohacsi 

 

geteduroam has an internal CA, which is currently using openssl. Check and exrend openssl to be able to configure and use pkcs11 to communicate with a Hardware Security Modules or smart card. Check and test espcially the x86 PC TPM modules, Apple Secure Enclave. 


Microsoft Entra vs Federations

New proposal

scribed by Mihály Héder 

 

The idea proposed by various parties is to investigate MS Entra and make sure - possibly by means of guide documents, helper code or proxies - it works flawlessly with the federation technologies of our community. It is part of the topic to find out what are the gaps and pain points.


More Manageable Keycloak

New proposal

scribed by Mihály Héder

 

In plenary discussion at TIIME as well as local NREN discussions in Hungary and elsewhere it was established that keycloak is an operator's favorite due to its good UX. At the same time automated metadata processing or OIDFed capabilities are lacking. The goal is to remedy these shortcomings.


nginx and new Shib Service provider

New proposal

scribed by Mihály Héder

 

Proposed in discussion with Scott Cantor from Shibboleth consortium during TechEx 2025 Denver. The idea is to re-use the java-based main logic of the shibboleth code with not only its native apache module but also in nginx with the same functionality.


multi-protocol discovery service

New proposal

scribed by Mihály Héder 

 

At TIIME 2026 in the OIDFed discovery service session there was a near unanimous call for multi-protocol discovery services that will work in a world where there are both SAML and OIDFed entities of relevance. The task is to investigate and create a proof-of-concept for such a service.


SATOSA GaP analysis for OIDFed

New proposal

scribed by Mihály Héder

 

In a multi-protocol future, there will be a great need for proxies that can translate between protocols such as SAML and OIDFed. SATOSA is such a proxy. While there are certainly various python libraries that can be used for prividing OIDFed functionality, the exact landscape should be analysed and a gap assessment should be made. This point was made by the audience on both TechEx2025 and TIIME2026.


Model Context Protocol for AI + Trust and Identity

New proposal

Mihály Héder

 

The model context protocol (and a few similar solutions) are used in the word of AI for agents (both AI and human) to access machine learning and inference resources. The Authentication and Authorization challenges are vast and not dissimilar from what our TI community have experienced. Since MCP is likely to be used in NREN context, the incubator should investigate the landscape. It is very likely that the vast amount of agents could benefit from an OIDFed-like technology, and that the authorization model could approximate a Membership Menegament Service (MMS) model well known in our community.

Some questions to resolve are: 

  • AI agent identification in the context of a multi-agent system.
  • Delegation from humans to artificial agents with clearly defined limits
  • In accordance with the AI Act, traceability and auditability, ensuring trust, accountability, and the ability to revoke permissions if needed, while still working seamlessly across multiple institutions through the identity federation.


Analysis of the Advantages and Disadvantages of Generative AI for Digital Identity Wallets.
 

New proposal

 

Generative AI opens up new possibilities for improving the security, usability, and efficiency of digital identities. On the other hand, the same technology can exacerbate threats such as identity theft, document forgery, deepfake attacks, and data leaks.

However, digital identity wallets based on standards such as VC, OIDC4VCI, and OIDC4VP are evolving into a central trust infrastructure in government agencies, educational institutions, and online services.

Despite this importance, a comprehensive analysis of the positive and negative impacts of generative AI on digital identity wallets is still lacking.

This work provides a comprehensive analysis of the advantages and disadvantages of generative AI for digital identity wallets and proposes a model for their secure and standards-based use.

Since digital identity wallets are still under development, it makes sense to explore solutions that leverage generative intelligence to improve their secure design and development. In other words, how can Gen-AI enhance a digital wallet without compromising users and their data? Gen-AI can be also helpful during the design phase.

For example:

  • How data validated by multiple VCs can be meaningfully combined with GenAI for a dedicated goal?
  • Given the variety of VC formats, how can AI assist in converting VCs between formats or languages without compromising their validity?

  • How can AI assistants be integrated into a wallet without exposing user data to leakage or misuse?

Before we can deploy AI in these or similar scenarios, we need to understand the associated risks.

Therefore, the objectives can be summarized as follows:

- Investigation of the positive application possibilities of Gen-AI to improve functionality and user experience

- Analysis of security risks such as spoofing and data breaches through generative models

- Evaluation of the compatibility of Gen-AI with the standards VC, OIDC4VCI, and eIDAS2.0 (we can disscuss it whether it is difficult)

- Development of proposals (model proposal) for the responsible use of Gen-AI in digital identity wallets

The scope of work can be limited to educational scenarios.

P.S.: We briefly discussed Gen‑AI risks in the wallet team, but none of the team members have deep knowledge in Gen‑AI area. Therefore, I thought it would be useful to explore this specific topic together with a student.


OIDFed comprehensive testing

under development

Group discussion at TIIME (scribed by Mihály)

Mike Jones, Niels Van Dijk, Mihály Héder

The incubator could meaningfully contribute to the OpenID Foundation's Certification test suite by defining and possibly implementing test cases. 

  • An initial list for areas to test. Functional requirements:
  • Multi language support. Obviously critical in our sector (R&E), but really, everywhere. By default an educational institution at least in the EU will have to support at least English + their local language, and in many cases, like e.g. Switzerland the need to support EN, FR, DE and IT simultaneously.
  • Trustmarks: this capability is currently not well represented in the tests
  • (Handling of) Metadata policy

Non-functional requirements:

  • Scaling: large leaf count environments (possibly thousands), long trust chains (is the increment linear or at least polynomial?), etc.
  • Stress testing: can cheap HTTP calls generate costly background processes (i.e building trust chains), possibly leading to DOS attacks and the need of throttling methods?


Shibboleth SPv4 alternative agents

under development

Mihály Héder based on Discussion at Shib consortium update, Denver 10 december 2025

 

Building on the recent work done by the shibboleth consortium, now it will be possible to create light-weight agents (as in modules in web server stacks) for various web applications. These agents would be able to take leverage of all functionality that is maintained in the shibboleth java code, which will be run as a 'hub', including SAML stack, OIDC, OIDFed (under development), etc. The target could be nginx, django, potentially others.

Good risk for reward as we have relevant skills on team and it enables several function points all at once.

Satellite eduroam (satroam..?) development

 pending discussions

David Patterson

Klaas Wierenga

Authenticating to eduroam over Low Earth Orbit (LEO) satellite connectivity has the potential to extend connectivity to areas with no infrastructure, or where 4/5G mobile coverage is poor.  Satellite eduroam (satroam) could enable NRENs to provide secure connectivity for emergency medicine, disaster relief, environmental research, and addressing the digital divide in marginalised regions. 

The proposal is for Jisc to coordinate the following activity:

  • Coalition. Establish a small-scale collaboration with up to 3 additional NRENs to share expertise and insights, and help shape the future development of satroam 
  • Testing. Support proof-of-concept testing of satroam, to include: authentication processes; alternative LEO providers; diverse geographical regions; end user groups.
  • Use cases. Produce examples of satroam, and identify future areas of investigation.

This follows proof-of-concept testing, conducted in partnership with KENET (Kenya), as part of the GÉANT Twinning Programme: How Jisc and KENET extended eduroam to rural Kenya using satellite internet - Jisc. The work in Kenya is based on Jisc's Extending eduroam service, which allows users to authenticate to eduroam over 4/5G. 

 

Public VC credentials

under development

Branko Marović (UoB/AMRES), Mihály Héder

 

Using a Go implementation for public verifiable credentials (credentials that are not primarily issued to a wallet but published on a website or other public surface), developed by WP9 with OpenBadges 3.0 to certify software quality or related software team practices, other use cases could be implemented. This implementation is accompanied with a suitable certificate framework and dataset, which would probably need to be adapted for other user cases.

The task is to investigate suitable use cases and how they could be achieved. One example is a reviewer appreciation certificate (see the topic list). Others include a range of educational use cases where OpenBadges 3.0 is applicable. An additional interesting concept is that the subject of the credential does not necessarily have to be a person - it could be a repository, a company, a group, or similar.

Note (Mihály): We need to define a bit more, investigate moodle/canvas/etc integration modes, or integration with IdP dashboards.

Convergence of Password/passkey Managers and Wallets

under development

Mihály Héder

 

From the point of view of user experience of an ordinary web user, the landscape is getting quite confusing. Thanks to user education and frightening stories about stolen password and breaches, an increasing number of users rely on complicated password variations or generated passwords and because of this, to saving passwords. This can be done in browsers, which depending on browser accounts (like google accounts signed in to chrome) get stored centrally. Others learn about end-to-end encrypted, hosted dedicated password managers, such as Bitwarden, ProtonPass, etc. Yet another route is to rely on OS-level, such as some Android and Windows solutions. With the rollout of Passkeys by big providers such as google users have to use some sort of manager software to store those.  In this diverse set of identity tools most users will have to use, the wallet ecosystem provides new ways of getting confused. Strictly based on theoretical models of user acceptance (an not other considerations such as security, sovereignty, etc) we can hypothesize that users will prefer those solutions that integrate everything, such as a potential google wallet version in the future and won't prefer a dedicated wallet app such as paradym, wwwallet, lissi, sphereon, etc. Then the follow-up question is how to provide an open source alternative (such as keepass{xc}) or at least European alternative (proton) integrated with wallet functionality for those users who are interested in this.

 

Scalable, interoperable revocation (in EUDI  wallets)

ready for consideration

Stefan Liström (SUNET)

Marina Adomeit (SUNET)

Revocation is not only a mandatory privacy enhancing feature for end-users, it is also a core security feature. Both use cases for revocation need to be implemented in a future EUDI wallet ecosystem. There is currently however no clear solution for interoperable, scalable revocation in the EUDI. This activity investigates and describes the possible approaches for scalable, interoperable ways to handle revocation. The activity should try to test at least two of the approaches with respect to requirements on scalability and interoperability as may needed for the EUDI.

Partially covered by cycle 11.

Possible outcomes: report, training materials, proof-of-concept solutions, proposal for the relevant decision makers in EUDI.

Note (Mihály): revocation is so basic that it is suspicious if no one else works on this right now

Passkey registration to User Profile Page (Shibboleth)

ready for consideration

Janne Lauros (CSC)

Timo Tunturi (Aalto Uni)

Mihály Héder (SZTAKI)

This proposal is continuation to earlier incubator work where User Profile Page for Shibboleth was implemented as means for the user to view the available user data and the tokens issued on behalf of user (https://github.com/GEANT/shib-idp-profile).

Shibboleth project is working on WebAuthn authentication flow and has define the scope for the Passkey management as "The inbuilt flow represents the minimum viable product for implementing such a feature. In the future other plugins may provide this functionality"

We propose following task for the next Incubator Cycle to provide additional features for Passkey maangement

  • Add Passkey registration to UserProfile. Work should be done in cooperation with Shibboleth team to guarantee best integration to interfaces provided by Shibboleth project. 
  • The user must be able to register and manage multiple Passkey credentials. 
  • An optional API providing organization tools to list and remove Passkeys of users. 
  • An optional administrative function to allow an administrator to define requirements for authenticators (via Attestation).

Possible outcomes: prototypes, documentation, open source code for the relevant FOSS projects.

ReviewerAppreciation Certificates

under development

Mihály Héder (HUN-REN)

Branko Marović (UoB/AMRES)

There is a widely acknowledged crisis in research assessment, which by now prevents the realisation of its most important norms that ensured progress in the past. CoARA, a consortium of 700 research institutions and the most recent effort addressing this problem, describes the issue as follows:

"Assessment processes relying predominantly on journal- and publication based metrics can be a hurdle to the recognition of diverse contributions and may negatively affect the quality and impact of research. They also contribute to an unhealthy research culture and an unaffordable publication system." (CoARA mission statement, March 2024, https://coara.eu/app/uploads/2024/03/CoARA_Presentation_-5min_.pdf)

Part of the problem lies in managerial approaches, best addressed through CoARA’s advocacy.

However, an overlooked element is tooling (or rather the lack of it) that streamlines the creation and propagation of publication records (via the now near-universal DOI system), while other contribution types remain neglected. As a result, researchers’ records are automatically enhanced for publications but not for other forms of achievement.

From a T&I perspective this is troubling. Even the few existing forms of recognition (typically reviewer certificates in PDF format) are tied to email addresses as primary identifiers, combined with surnames and initials, with all the associated problems. For other contribution types, such as peer review, experiment reproduction, software as a research outcome, or PhD committee work, no universal mechanism exists, despite the general recognition that certificates or credentials should be issued at the point of activity. ORCID’s academic activity records and Clarivate’s Publons address this only partially, and in ways tied to specific platforms.

With the emergence of Verifiable Credentials and the GÉANT community’s experience in building global collaborations, there may be scope to contribute to reform efforts. Specifically, this topic should explore how eduPerson, SCHAC, and other schemas familiar to the T&I community could be integrated into a reviewer appreciation data model at Crossref, and the possible forms in which such data could be expressed. One such form is Verifiable Credentials, building on recent work in this area. In this case, the certificate would have a public mode (i.e. not only issued to a wallet but also published on a website), following the approach developed in WP9 for certifying software projects - a technologically similar project.

Possible outcomes:

Proof-of-Concept, reports, educational materials, research assessment community engagement

Note: this could be a use case for WP9's public certificate issuance platform.

OIDFed of groups and people

under development

Mihály Héder (HUN-REN)

 

Academics are expected to have a public persona, complete with a public, unique identifier tied to their real name (ORCID), public affiliations, etc. This is necessary to fulfill one of the most important ethos of science, sharing knowledge, which in practice also creates a need to promote publications, collaborations, research agendas, etc. This sets academics apart from citizens in general, who are interested in maximal achievable online privacy. 

This special feature of academic life means that academics could be interested in not only a public profile page such as ORCID, Academia.edu, ResearchGate, etc. but even in public endpoints representing them. With and OIDFed leaf endpoint, together with a trust mark ecosystem acedemics could build trust chains to each other. This is crucial as often they have to collaborate with peers the don't know beforehand and they are resorted to the public academic track record (see the other topic "Automatic collection of Verifiable Academic Efforts") and guesswork. A main use case would be partner finding, verifying new hires and publising. In the latter domain editors should establish that the person submitting is real in the first place (email, ORCID can be self-generated) and that the affiliation is real. Memberships, such as IEEE or other could also be interesting.
The idea can be extended to research groups, projects and companies that all have an interest of a public profile in good standing. 

Possible outcomes

report or publication

PoC solutions

SAML Legacy

Under development

Mihály Héder

 

While much of the current focus of our T&I community is aimed at OpenID Federation, which could be the future of Research and Education Federations, it is inevitable that several NRENs will stick with the old SAML technology for a long period of time. This raises the question: what novelties could the TI Incubator work on to ease the life of these federations? With the OASIS working group behind SAML discontinued, the update of cryptographic primitives might be a challenge to be tacked. Another issue could ensuring the expression of new kind of data in SAML, as well as ensuring that there are well working and well-documented SAML-OIDFED proxy solutions.

 

Metadata Event Streams

Under development

Pete Birkinshaw (Mimoto)

 

Mimoto has a simple proof-of-concept for notifying services of changes to remote data status, immediately, using persistent streams of JSON over web sockets. This activity would be to implement other clients and servers, decide on a data format for messages, and to test viability. 

Data types include federation information, metadata aggregates, MDQ entity records, and so on. It's not specific to SAML but may help to make older SAML services more responsive.

Clients open web sockets to an event server and receive lightweight notifications of changes in realtime. The simplest response to such messages is to reset a cached copy of the specified record and reload the record when requested. This technique appears to be faster and simpler than using existing approaches - a client to redownload an aggregate on remote changes should be possible with only a small shell script. The disadvantage is the need for an event service capable of supporting many concurrent connections - it may not be feasible in some languages and application frameworks. 

 

Fticks-like functionality for OIDFED

Under development

Mihály Héder, 

Niels van Dijk, Davide Vaghetti, Andrijana Todosijevic

As the case of eduroam shows, good, comprehensive usage statistics can help management, decision-making and popularization of a service. For this, the funtionality should be part of the default configuration, anonymous and batch-like to ensure complete anonymity and peace-of-mind of the operators in that they sufficiently protect their users. We propose that provided a sufficient level of k-anonymity (it is guaranteed that each individual cannot be distinguished from another k (say, 100, 1000) individuals in a dataset) and no significant performance sacrifice, such usage statistics would be acceptable and favorable at OP-side to reported to the NREN and to eduGAIN. 

 

Proposals:

Table of Contents
minLevel5

Note
titleTopic submission deadline

The Call for Ideas for the next cycle starting in XX is still open.

The submission deadline for the next cycle is XX 2025.

TitleStatusProposerSupporter (+1)DescriptionTask leaders' notes
Scalable, interoperable revocation (in EUDI  wallets)

ready for consideration

Stefan Liström (SUNET)

Marina Adomeit (SUNET)

Revocation is not only a mandatory privacy enhancing feature for endusers, it is also a core security feature. Both use cases for revocation need to be implemented in a future EUDI wallet ecosystem. There is currently however no clear solution for interoperable, scalable revocation in the EUDI. This activity investigates and describes the possible approaches for scalable, interoperable ways to handle revocation. The activity should try to test at least two of the approaches with respect to requirements on scalability and interoperability as may needed for the EUDI.

Possible outcomes: report, training materials, proof-of-concept solutions, proposal for the relevant decision makers in EUDI.

Implement OID4VCI/VP in SimpleSAMLphp and Shibboleth IdP dashboard

ready for consideration

Mihály Héder (HUN-REN)

(mentioned in Scott Cantor's 2024 TechEx shibboleth report as a reasonable candidate for future development)

The primary motivation of this topic is to create Verifiable Credential issuer tools for our community so that it can participate in the wallet ecosystem. The best place to start appears to be the IdP software as here we can leverage the sophisticated data handling retrieval and transformation both Shib and SSP, that is already deployed on top of university student information systems, research organization user databases, institutional LDAP or SQL deployments; exactly where the relevant data resides.  Plus, in terms of user interface we can leverage the TI Incubator's earlier outcome, the IdP Dashboard, which was developed for both Shib and SSP.

Possible outcomes: prototypes, documentation, open source code for the relevant FOSS projects.

Passkey registration to User Profile Page (Shibboleth)

ready for consideration

Janne Lauros (CSC)

Timo Tunturi (Aalto Uni)

Mihály Héder (SZTAKI)

This proposal is continuation to earlier incubator work where User Profile Page for Shibboleth was implemented as means for the user to view the available user data and the tokens issued on behalf of user (https://github.com/GEANT/shib-idp-profile).

Shibboleth project is working on WebAuthn authentication flow and has define the scope for the Passkey management as "The inbuilt flow represents the minimum viable product for implementing such a feature. In the future other plugins may provide this functionality"

We propose following task for the next Incubator Cycle to provide additional features for Passkey maangement

  • Add Passkey registration to UserProfile. Work should be done in cooperation with Shibboleth team to guarantee best integration to interfaces provided by Shibboleth project. 
  • The user must be able to register and manage multiple Passkey credentials. 
  • An optional API providing organization tools to list and remove Passkeys of users. 
  • An optional administrative function to allow an administrator to define requirements for authenticators (via Attestation).

Possible outcomes: prototypes, documentation, open source code for the relevant FOSS projects.

SeamlessAccess with OIDFed Support

under development

Zacharias Törnblom

Mihály Héder (HUN-REN)

Primary goal: show OIDC OPs the same way as SAML IdPs - in synergy with the eduGAIN OIDFed PoC project. 

Secondary goal: use credentials to persist the choice of home organization. 

Possible outcomes:

report, educational material, prototype to be picked up by the SeamlessAccess project

Automatic collection of Verifiable Academic Efforts

under development

Mihály Héder (HUN-REN)

 

Academic Track Record is the primary source for establishing trust between collaborators that don't know each other.
Because science is universal, global and involves mobility, these encounters occur very often.

In such events, the researchers are left to check to past affiliations of each other, look for collaborators they shared, see what impactful conference or journal paper the other appeared in, see if the other supervised or reviewed PhDs, postgrads in relevant topics. Hence, a semi-formalized trust chain in established.

In order to establish more trust in a researcher account in an academic collaborations, there are several automated actions an AAI platform can take. Commercial (Academia.edu, researchergate, google scholar) and community-owned (ORCID) initiatives already perform very basic collection of information (scraping crossref metadata (DOI)-s and the web). These methods could be much enhanced with more assured information that we have in the Research and Education space and could enrich an institutional or a  MyAccessID account, for example.

Several parts of this concept has been proven and demonstrated by the various science social networks, like Academia.edu and ResearchGate, who, as soon as a publication appears with a DOI. This is done by regularly scraping the related database, and the same happens for citations. This very often happens with matching of name strings, in lack of better curated attributes in the crossref metadata and results in mis-attributed data. However, other, equally important elements of the record - peer reviews in and efforts service of science, like PhD defense committee membership, and altmetrics (contribution to research software, instruments; confirmed reader counts) are overlooked and the technology for that is only an idea at this moment.

A) arXiv API+ORCID: in possession of a verified ORCID, the arXiv API can be queried for articles written by an author:

https://arxiv.org/search/advanced?terms-0-operator=AND&terms-0-term=&terms-0-field=title&terms-1-operator=AND&terms-1-term=0000-0002-9979-9101&terms-1-field=orcid&classification-physics_archives=all&classification-include_cross_list=include&date-filter_by=all_dates&date-year=&date-from_date=&date-to_date=&date-date_type=submitted_date&abstracts=show&size=50&order=-announced_date_first

Trust: high

arXiv was originally created for physics and is still dominant on that field.

Output DOI+publishing place

B) Crossref API+ORCID

In the crossref JSON metadata, ORCID is present, if it was known

{"ORCID":"http:\/\/orcid.org\/0000-0002-9979-9101","authenticated-orcid":false,"given":"Mih\u00e1ly","family":"H\u00e9der","sequence":"additional","affiliation":[]}]

C) DBLP+ORCID

on DBLP is possible to search by ORCID

D) email based matching

E) name based matching

trust: low

F) Consuming Verifiable Credentials

Possible outcomes: 

report, prototypes

HumbleScholar

under development

Mihály Héder (HUN-REN)

 

There is a widely acknowledged crisis in science assessment. By now, this prevents the realization of its most important norms that ensured its progress in the past. CoARA, a consortium of 700 research institutions, the most recent effort countering the problem offers this description:

"Assessment processes relying predominantly on journal- and publication based metrics can be a hurdle to the recognition of diverse contributions and may negatively affect the quality and impact of research. They also contribute to an unhealthy research culture and an unaffordable publication system." (CoARA mission statement, March 2024, https://coara.eu/app/uploads/2024/03/CoARA_Presentation_-5min_.pdf)

One part of the problem is in the managerial approach, hence best addressed by CoARA's advocacy. An overlooked element however is the tooling - and the lack thereof that streamlines the creation and propagation of publication records (through the now near-universal DOI system), while the rest of the contribution types are overlooked. This way the accounts of researchers are automatically enhanced for publications but not for other achievements (see also my other topic proposal titled "Automatic collection of Verifiable Academic Efforts"). Alarmingly from a T&I point of view, usually even these are usually tied to an email address as a primary identifier, a surname and the initials of the given names, with all the associated problems. For the rest of the contribution types: reviews, reproduction of experiments, software-as-research-outcome, PhD committee work - there is no such universal mechanism, but it is recognized that some sort of certificates or credentials should be issued at the point where such activity happens. ORCID academic activity record type and Clarivate corp.'s Publons partially address this problem, but in a way that is tied to one given platform. With the emergence of Verifiable Credentials and the GÉANT community's experience in creating truly global collaborations we might be able to help the reform efforts.

Possible outcomes:

Proof-of-Concept, reports, educational materials, research assessment community engagement

OIDFed National Federations PoC

under development

Mihály Héder (HUN-REN)

 

Leveraging the fact that many T&I team members have experience in running SAML federations, we are well placed to create simulations of how a migration to / expanding with OIDFed would work for them. In order for the OIDFed to be successful, small and large, proxy-based and mesh federations all should be able to implement it with ease.  By running some hypothetical, simulated migration projects, we would have comprehensive a gap analysis on OIDFed, both in terms of training materials, non-covered use cases and tooling for all kinds of federations.

Possible outcomes

GAP analyis, training materials

OIDFed of groups and people

under development

Mihály Héder (HUN-REN)

 

Academics are expected to have a public persona, complete with a public, unique identifier tied to their real name (ORCID), public affiliations, etc. This is necessary to fulfill one of the most important ethos of science, sharing knowledge, which in practice also creates a need to promote publications, collaborations, research agendas, etc. This sets academics apart from citizens in general, who are interested in maximal achievable online privacy. 

This special feature of academic life means that academics could be interested in not only a public profile page such as ORCID, Academia.edu, ResearchGate, etc. but even in public endpoints representing them. With and OIDFed leaf endpoint, together with a trust mark ecosystem acedemics could build trust chains to each other. This is crucial as often they have to collaborate with peers the don't know beforehand and they are resorted to the public academic track record (see the other topic "Automatic collection of Verifiable Academic Efforts") and guesswork. A main use case would be partner finding, verifying new hires and publising. In the latter domain editors should establish that the person submitting is real in the first place (email, ORCID can be self-generated) and that the affiliation is real. Memberships, such as IEEE or other could also be interesting.
The idea can be extended to research groups, projects and companies that all have an interest of a public profile in good standing. 

Possible outcomes

report or publication

PoC solutions