-
Notifications
You must be signed in to change notification settings - Fork 452
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Indicate ORCID iDs are unauthenticated in metadata export plugins #10796
Labels
Enhancement:1:Minor
A new feature or improvement that can be implemented in less than 3 days.
Milestone
Comments
kaitlinnewson
added
the
Enhancement:1:Minor
A new feature or improvement that can be implemented in less than 3 days.
label
Jan 13, 2025
kaitlinnewson
added a commit
to kaitlinnewson/crossref-ojs
that referenced
this issue
Jan 17, 2025
bozana
added a commit
to pkp/crossref-ojs
that referenced
this issue
Jan 17, 2025
pkp/pkp-lib#10796 indicate if orcid is authenticated
I think we could always only consider the authenticated ORCID IDs if the third party does not support the differentiation, also because in 3.5 we will not allow the ORCID IDs to be edited or manually entered any more, so to move even more towards it... |
@kaitlinnewson, could you maybe also list the other affected plugins or put this task also to this issue #9912 ? |
kaitlinnewson
added a commit
to kaitlinnewson/crossref-ojs
that referenced
this issue
Jan 21, 2025
kaitlinnewson
added a commit
to kaitlinnewson/crossref-ops
that referenced
this issue
Jan 22, 2025
kaitlinnewson
added a commit
to pkp/crossref-ojs
that referenced
this issue
Jan 22, 2025
kaitlinnewson
added a commit
to pkp/crossref-ops
that referenced
this issue
Jan 22, 2025
kaitlinnewson
added a commit
to kaitlinnewson/crossref-ops
that referenced
this issue
Jan 22, 2025
kaitlinnewson
added a commit
to kaitlinnewson/crossref-ojs
that referenced
this issue
Jan 22, 2025
kaitlinnewson
added a commit
to pkp/crossref-ops
that referenced
this issue
Jan 22, 2025
kaitlinnewson
added a commit
to pkp/crossref-ojs
that referenced
this issue
Jan 22, 2025
kaitlinnewson
added a commit
to kaitlinnewson/ojs
that referenced
this issue
Jan 23, 2025
kaitlinnewson
added a commit
to kaitlinnewson/jatsTemplate
that referenced
this issue
Jan 24, 2025
kaitlinnewson
added a commit
to kaitlinnewson/medra
that referenced
this issue
Jan 27, 2025
kaitlinnewson
added a commit
to kaitlinnewson/jatsTemplate
that referenced
this issue
Jan 27, 2025
kaitlinnewson
added a commit
to kaitlinnewson/medra
that referenced
this issue
Jan 27, 2025
bozana
added a commit
to pkp/jatsTemplate
that referenced
this issue
Jan 27, 2025
pkp/pkp-lib#10796 update orcidAccessToken to orcidIsVerified
bozana
added a commit
to pkp/medra
that referenced
this issue
Jan 29, 2025
pkp/pkp-lib#10796 only export ORCID if verified
github-project-automation
bot
moved this from Backlog
to Done
in Metadata and Distribution
Jan 31, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Enhancement:1:Minor
A new feature or improvement that can be implemented in less than 3 days.
Describe the bug
The ORCID documentation notes the following about unauthenticated ORCID iDs:
A quick scan and check-in with @ewhanson indicates that most metadata exports that include ORCID iDs are not checking and indicating when unauthenticated. We'll need to review all export plugins which include ORCID iDs and ensure that they check for authentication and indicate when the ORCID iD is unauthenticated (e.g exported as
https://orcid.org/.... (unauthenticated)
) .Additionally, we will need to confirm how to metadata schema for downstream receivers (e.g. Crossref) expects unauthenticated ORCID iDs to be formatted. If there is no way to indicated an ORCID iD is not authenticated, then we should consider only exporting the ORCID when it has been authenticated.
What application are you using?
OJS, OMP or OPS all versions (checking for authentication and inclusion of ORCID iDs may be different between versions).
List of plugins exporting ORCID iDs
Pull requests
The text was updated successfully, but these errors were encountered: