Skip to main content
Australian Government Architecture
Search
Header menu
Home
Purpose of the AGA
Explore the AGA
How to use
Contact
Optimise data usage - Secure Data Exchange
Optimise the use and reuse of public data
Data availability - Secure Data Exchange
Release non-sensitive data as open by default, using the Standard.
Determine requirements - Blockchain
Determine if there are any specific ethical, privacy or legislative requirements that need to be taken into account, and how these are best addressed...
Business Outcomes - Blockchain
Consider whether Blockchain is the most appropriate solution to meet the business outcomes.
Virtual Servicing policy: Investigate reuse
Assess the suitability of existing Virtual Servicing capabilities when planning investment in citizen-facing contact points.
Federated Authority policy: Onboard to FAS
Onboard to the Federated Authentication Service (FAS) as identity providers.
Federated Authentication policy (position)
A federated authentication policy will be developed as part of the ongoing maturation of the Australian Government Architecture. To provide input,...
Reuse - Artificial Intelligence
Engage with agencies with prior experience in adoption of these technologies to leverage existing investment as well as knowledge, patterns, and...
Federated Authority policy: Onboard services to the FAS
Onboard services to the FAS as relaying parties.
Federated Authority policy: Avoid new investment
Avoid investment in new or standalone federated authentication solutions.
Pagination
Previous page
‹‹
Page 9
Next page
››
Subscribe to Unendorsed