Hi Andrea,
Good to see you here, and imho no thread is too old to revive when there's still live issues to discuss. :)
Re: Elements and token reuse. That seems to be an old interpretation to me and rather, I suspect that ORCID would encourage this kind of reuse. Sorry I can't be entirely clear what their issue is as that link is behind a Symplectic support login.
Those of you with a keen eye will have noted that since we started development in Feb, ORCID have reversed their request to us asking that we identify the Hub apps as "Hub apps". That's why we changed the auto-population in the API credentials request form from being named "NZ ORCID Hub for" the organisation name, to being just the organisation name (ORCID support began stripping the "NZ ORCID Hub for" in any case) .
That's not quite true. The client id and client secret (and redirect URI) are needed to get the access token, but once you have it and the ORCID iD that granted it the id/secret aren't referred to again.
As a consequence there's be no technical barrier for a Sympletic app, or indeed any app specifically including cURL, using a Hub-mediated "/read-limited+/activities/update" token to read trusted-party information, and in my opinion no additional privacy concerns.
When we were in the position of branding the interactions from these Apps with "NZ ORCID Hub...", I'll admit that I was uncomfortable with the reuse of tokens for other purposes. Now that the Apps show it's the organisation that is requesting permission, and the actions of the tokens gained will be shown to have come from the organisation, my concerns have evaporated. As noted it's in our future plans to explore ways of securely sharing the tokens with you.
We're fortunate to have an ORCID delegation here next week for ARMS, and I'll be happy to ask them for a verdict on this very matter.
BTW it's a requirement of the ORCID's new checklist for vendor systems that we allow this, i.e.,.
- Your system must offer a way for your clients to export the stored ORCID iDs and token exchange data (access tokens, refresh tokens, scopes, scope expiry). If your system also writes data, then it must also include the relevant put codes with data exports.
We're very clear that the tokens belong to the organisations, and if you ask for them we'll give them to you.
The last thing I'll note tho is a reiteration: ORCID's security is geared around ensuring the identity of the App together with making the user aware of the source of a token request and explaining the scope requested. Given their power and utility, once the ORCID iD/token pair is obtained, the burden of securing them lies with the system(s) these tokens pass through (i.e. the Hub and whatever system is on the receiving end at the institution).
Best wishes,
Jason