Discover Services

Explore a wide range of services available through the AAF. If your organisation is connected to the AAF, you can seamlessly access these services via your institution's Identity Provider.

AuScope Portal Prod Azure


Research infrastructure for the Earth and Geospatial Science community.

See more…

Australian Data Archive Deposit Dataverse


ADA dataverse DEPOSIT Site, used by Data Owners to Self-Deposit their data and supporting documentation

Biosecurity Commons


Migrated Client

See more…

Bunya


Web-based services for Bunya HPC users

Bushfire Data Commons


Bushfire Data Commons offers secure access to bushfire datasets and tools, developed by MeG, sponsored by ARDC.

CAI Data Store


Imaging data and tools from NIF

See more…

CAUDIT Website


Authentication service for the main CAUDIT Website.

See more…

CERI Production


Configuration for CERI production

See more…

CoESRA


Ecosystem Science Analysis and Synthesis

CPM variant database


CPM Variant database

See more…

Curtin University Production REDCap


See more…

AHECS Website

The Australasian Higher Education Cybersecurity Service (AHECS) was formed in 2019 as an initiative from CAUDIT members. AHECS is delivered in collaboration with Australia’s Academic and Research Network (AARNet), AUSCERT, Council of Australasian University Directors of Information Technology (CAUDIT), Research and Education Advanced Network New Zealand (REANNZ), and the Australian Access Federation (AAF). 
AHECS is a higher education sector collective that leverages the capabilities and expertise of its partner entities to strengthen the overall cybersecurity posture of the sector. AHECS acts as the sectors peak cybersecurity body and represents the sector on cybersecurity issues. 
AHECS’s purpose is aligned to the principles of being stronger together and ‘all boats lift on a rising tide’. It is a collective developed specifically for the sector, by the sector, to address capability gaps and help defend the sector from continuously evolving cybersecurity threats. This is achieved through coordination of members and partners to inform direction, advocate, share intelligence, reduce barriers to the implementation of good practice, identify and act on capability gaps, and holistically defend the sector from continuously evolving cyber security threats in conjunction with key third parties.