Trust and Identity Technology Working Group

The Trust and Identity Technology Working Group aims to identify technologies used by research collaborations, to ensure interoperability now and into the future, for a seamless, secure and globally connected research ecosystem.

Ensuring that researchers can easily collaborate across national research organisations, facilities and services is a challenge. To address this issue, the AAF is coordinating a Trust and Identity Technology Working Group. Its purpose is to identify the technology used by research collaborations, to ensure interoperability now and into the future, for a seamless, secure and globally connected research ecosystem. 

The AAF is inviting the community to participate in this working group, where you will play a pivotal role in shaping an effective and enduring national framework for the Australian e-research ecosystem.

What will it involve

There will be one initial workshop, and there may also be some individual consultation outside of the workshop. In the workshop, we will seek to understand your existing technology landscape. It is crucially important that we understand any technology that might need to be considered, to ensure that the Trust and Identity Framework is sustainable and scalable. This workshop will be an opportunity to have an open and robust discussion with colleagues across the national research infrastructure ecosystem.

Who this is for

We welcome expressions of interest from those in the research and education sector, and NRI directors and technical representatives. We also invite any other people in your facility or your host organisation, who are well placed to provide insight into your current trust and identity landscape.  For example, this may be relevant to your host university’s IT unit. 

Key considerations

The framework aims to guide the operational measures to provide research infrastructure and services securely and effectively, and includes technologies which offer:

User identity
User attribute services
Authorisation
End Services Authentication