Skip to content

Service Registration in the EOSC Core Innovation Sandbox via the Core Infrastructure Proxy

Description

This page explains how to register a service with the Core Infrastructure Proxy. Services can be registered through the Core Service Registry portal using either the OpenID Connect (OIDC) or SAML protocol. Providers of services can use the portal to view and also manage their services by creating and submitting service requests. Both service registration and reconfiguration requests need to be reviewed by the EOSC Core Innovation Sandbox AAI Support Team.

AAI Endpoints

OpenID Connect

Environment Core Infrastructure Proxy OIDC/OAuth2 Issuer
Preproduction https://core-proxy.sandbox.eosc-beyond.eu/auth/realms/core
Integration https://core-proxy.staging.sandbox.eosc-beyond.eu/auth/realms/core

The Core Infrastructure Proxy supports OpenID Connect Discovery. OpenID Connect client libraries that support OpenID Connect Discovery will be able to find and configure the appropriate endpoints from the Core Infrastructure Proxy discovery endpoint.

If the OpenID Connect client library your service is using does not support OpenID Connect Discovery, then you can find all the required endpoints at the following URL:

<issuer>/.well-known/openid-configuration

SAML 2.0

Environment Core Infrastructure Proxy SAML 2.0 Identity Provider Entity ID SAML 2.0 Identity Provider Metadata URL
Preproduction https://core-proxy.sandbox.eosc-beyond.eu/auth/realms/core https://core-proxy.sandbox.eosc-beyond.eu/auth/realms/core/protocol/saml/descriptor
Integration https://core-proxy.staging.sandbox.eosc-beyond.eu/auth/realms/core https://core-proxy.staging.sandbox.eosc-beyond.eu/auth/realms/core/protocol/saml/descriptor

Registration

To start the registration process, access the Core Service Registry from your browser using the link below:
https://core-proxy.sandbox.eosc-beyond.eu/federation

Unless you have an active session, you will need to select "Login" to authenticate.

Core Service Registry - Login

After logging into the portal, navigate to "Manage Services" and select "New Service" to enter the registration form.

Core Service Registry - Registering new service

Content of the form

ℹ️ Note:
Only the fields marked with a red asterisk * are required.

General Service Information

  • Service name - The name of the service. It will be displayed to end users.
  • Integration Environment - The target integration environment: Preproduction or Integration
  • Logo - A URL with the logo of the service
  • Service Website URL - The URL of the website or landing page for the service.
  • Description - Human-readable text description of the service.

Core Service Registry - General service info

Contact Information

Email addresses for administrative, security, support, and technical contacts or teams responsible for the service.

  • Admin Contact - The email address(es) of administrative contact(s)
  • Security Contact - The email address(es) of security contact(s)
  • Support Contact - The email address(es) of support/helpdesk contacts
  • Technical Contact - The email address(es) of technical contact(s)

Core Service Registry - Service contacts

Service Provider Policies

Links to documents with service policies and compliance with mandatory policies of the platform.

  • Privacy Policy (URL) - A URL pointing to the privacy policy of the service.
  • Acceptable Usage Policy / Terms of Use (URL) - A URL pointing to the Acceptable Usage Policy and/or Terms of Use of the service.

Protocol-specific Information

Details for OIDC based services

  • Client ID - Unique client identifier. Leave blank for automatic generation.
  • Application Type - Choose Web (default) or Native.
  • Redirect URI(s) - Specify OIDC redirect URIs for your client. Wildcards are not supported.
  • Scope(s) - Define one or more client scopes.

Core Service Registry - OIDC service

  • Grant Types - Choose OAuth grant type(s).
  • Default is Authorization Code, suitable for both confidential and public clients.
  • Select Client Credentials if you need to use the client credentials grant to obtain access tokens on behalf of a service (service account). Do not combine Client Credentials with other grant types.
  • Token Endpoint Authorization Method - Select authentication method. Use No authentication for public clients.
  • Introspection - Whether the client is allowed to perform OAuth 2.0 Token Introspection. Disabled for public clients.
  • Client secret - Required for confidential clients.
  • Refresh Tokens - Whether refresh tokens will be issued for your client.
  • PKCE - Specify if Proof Key for Code Exchange - PCKCE will be used. Recommended for Authorization Code Flow and mandatory for public clients.

Core Service Registry - OIDC service (2)

Details for SAML based services

  • Entity ID - Unique identifier for your SAML service (Service Provider - SP entityID).
  • Metadata URI - Specify a publicly accessible URI serving the metadata for your SAML SP.
  • Requested Attributes - Specify the attributes requested by your SAML SP.

Core Service Registry - SAML service

Registration Request Submission

After clicking "Submit", you'll receive a confirmation email for your registration request. Users with reviewing privileges will be notified to assess the request. Approved requests are deployed to the requested integration environment. The Support team reviews requests based on the Integration Environment, and you'll be notified via email upon completion. Reviewers can propose changes to the pending request. The proposed changes will be included in the email notification.

Managing Service Owners

Services are owned by user groups with regular members and group managers. All members can view and submit reconfiguration requests to the service. Group managers have additional privileges, such as inviting/removing members to/from the owners group. When a user requests to register a service, an owners group is automatically created with the requester set as the group manager. To view/manage the owners group, select "Manage Owners".

Core Service Registry - Service owners