Discover Services

Explore a wide range of services available through the AAF. If your organisation is connected to the AAF, you can seamlessly access these services via your institution's Identity Provider.

Lithosurfer


Litho surfer Authentication

Machine Learning eResearch Platform


MLeRP provides a web interface to a slurm cluster dedicated to machine learning activities

Monash University Hybrid Login


Monash University's hybrid login service

Neurodesk Play Australia


Neurodesk Play allows access Neurodesk without any setup for Australian users

Open OnDemand


The Open OnDemand platform allows user-friendly access to HPC resources.

Pawsey Application Portal


Incredible technology from supercomputers to data & visualisation, with outstanding expertise, training and support that sets Pawsey apart

See more…

RECOM


The CSIRO RECOM platform allows researchers to make estuary-scale and reef-scale hydrodynamic and biogeochemical ocean models.

See more…

AHECS Website

The Australasian Higher Education Cybersecurity Service (AHECS) was formed in 2019 as an initiative from CAUDIT members. AHECS is delivered in collaboration with Australia’s Academic and Research Network (AARNet), AUSCERT, Council of Australasian University Directors of Information Technology (CAUDIT), Research and Education Advanced Network New Zealand (REANNZ), and the Australian Access Federation (AAF). 
AHECS is a higher education sector collective that leverages the capabilities and expertise of its partner entities to strengthen the overall cybersecurity posture of the sector. AHECS acts as the sectors peak cybersecurity body and represents the sector on cybersecurity issues. 
AHECS’s purpose is aligned to the principles of being stronger together and ‘all boats lift on a rising tide’. It is a collective developed specifically for the sector, by the sector, to address capability gaps and help defend the sector from continuously evolving cybersecurity threats. This is achieved through coordination of members and partners to inform direction, advocate, share intelligence, reduce barriers to the implementation of good practice, identify and act on capability gaps, and holistically defend the sector from continuously evolving cyber security threats in conjunction with key third parties.