Implementing an Authentication and Authorisation Infrastructure (AAI) that is compliant with the AARC Blueprint Architecture (BPA) requires navigating a range of technical, policy, and organisational decisions. This section provides practical guidance for prospective implementers - whether you are a research community, infrastructure operator, or service provider - based on maturity level, available resources, and interoperability goals.

Step 1: Define Your Research Community's Requirements

Before choosing an architecture or software stack, clarify:

Step 2: Define your Policies (see XXX)

Step 3: Choose an Implementation Path

The following flow chart may help you frame the necessary questions to understand whether to use a hosted AAI platform or run your own.

Option 1: Hosted AAI Platform

Wherever possible, the AARC community recommends using a hosted platform to benefit from the points mentioned previously. 

Visit the section on existing hosted services (XXX)

Option 2: Self-Hosted Proxy Architecture

Ideal for communities needing more control over attributes, group management, or federation strategy. May be more suitable for communities that already operate an internal AAI and are seeking to interoperate with the wider community. 

Visit the section on existing solutions (XXX)

Step 4: Plan for Operations and Sustainability