Skip to main content
Australian Government Architecture
Search
Header menu
Home
Purpose of the AGA
Explore the AGA
How to use
Contact
Data availability - Secure Data Exchange
Release non-sensitive data as open by default, using the Standard.
Determine requirements - Blockchain
Determine if there are any specific ethical, privacy or legislative requirements that need to be taken into account, and how these are best addressed...
Business Outcomes - Blockchain
Consider whether Blockchain is the most appropriate solution to meet the business outcomes.
Virtual Servicing policy: Investigate reuse
Assess the suitability of existing Virtual Servicing capabilities when planning investment in citizen-facing contact points.
Federated Authority policy: Onboard to FAS
Onboard to the Federated Authentication Service (FAS) as identity providers.
Reuse - Artificial Intelligence
Engage with agencies with prior experience in adoption of these technologies to leverage existing investment as well as knowledge, patterns, and...
Federated Authority policy: Onboard services to the FAS
Onboard services to the FAS as relaying parties.
Federated Authority policy: Avoid new investment
Avoid investment in new or standalone federated authentication solutions.
Hosting policy
This policy describes the requirements for entities planning digital investments involving hosting. It refers to the facilities that will host...
Hosting policy: Ensure systems are hosted appropriately
Ensure the secure hosting of security-classified government information and data using certified services and associated infrastructure by applying...
Pagination
Previous page
‹‹
Page 17
Next page
››
Subscribe to Whole of Government