Access to the iENTRANCE Infrastructure
iENTRANCE provides access to its facilities, technologies and expertise through a structured and transparent process based on the submission and evaluation of user proposals.
Access is coordinated through the iENTRANCE Central Hub, which acts as a single-entry point for users and manages the allocation of resources across the distributed infrastructure.
The detailed conditions for access, including scope, eligibility and deadlines, are defined in the specific calls or access opportunities published on the iENTRANCE website.
Access Modes
Access to iENTRANCE services is provided through three complementary modes:
Excellence-driven access
Access is granted on a competitive basis following the evaluation of project proposals. This is the primary access mode for academic users and research-oriented projects.
Market-driven access
Access is provided to industrial users or for applied research activities. Conditions are defined on a case-by-case basis and may include specific agreements and confidentiality clauses.
Wide access
This mode supports exploratory activities, training, and the onboarding of new users, facilitating broader use of the infrastructure.
Different access modes may follow different procedures and conditions, as specified in the relevant access calls or agreements.
Access conditions, including financial support, confidentiality, intellectual property, dissemination obligations and data-sharing requirements, may differ depending on the selected access mode and shall be defined in the relevant call text or service agreement. For market-driven access, services may be provided under specific commercial terms and conditions.
Access Proposal Submission
Applicants must submit their proposals via the online application portal available on the iENTRANCE website.
The submission form requires detailed information, including:
- project title and abstract
- research objectives and methodology
- justification for requesting access to the infrastructure
- expected results and potential impact
- required resources, services and facilities
- applicant’s qualifications and relevant experience
Applicants are encouraged to consult the application guidelines provided with each access opportunity and may contact the iENTRANCE team for support in identifying suitable services.
Applicants are responsible for ensuring that the information provided in the proposal is accurate, complete and consistent with the objectives of the requested access. Where relevant, applicants should also identify any specific requirements relating to data management, confidentiality, safety, ethical compliance, intellectual property or expected dissemination of results.
Publications and authorship
For access modes other than market-driven access, where the contribution provided by iENTRANCE staff is substantial and goes beyond ordinary user support, particularly in relation to measurements, experimental execution, data processing and/or data analysis, the researcher, technologist or technician involved should be included among the authors of the resulting scientific publication, in accordance with accepted authorship criteria and good scientific practice. In such cases, acknowledgement of the project or infrastructure alone is not considered sufficient.
Before the access starts, users and the involved iENTRANCE staff are encouraged to discuss and agree the expected level of scientific and technical involvement, including the appropriate form of recognition in publications and other outputs.
Evaluation Process
Applications undergo a structured and transparent evaluation process carried out by dedicated committees:
Scientific Committee
Composed of external experts, this committee evaluates:
- scientific quality and originality
- relevance to the state of the art
- potential impact
Technical Feasibility Committee
Composed of iENTRANCE partners, this committee assesses:
- technical feasibility of the proposed activities
- suitability of the requested infrastructure services
- identification of the most appropriate infrastructure nodes
Technical Management Committee
This committee oversees the technical implementation of approved projects and ensures proper coordination during execution.
Access Allocation and Project Execution
Access to the iENTRANCE infrastructure is granted based on:
- evaluation results
- technical feasibility
- availability of resources
Following approval:
- projects are assigned to the appropriate infrastructure nodes
- activities are planned and scheduled
- users work in close collaboration with technical staff
Continuous support is provided throughout the execution phase, and project activities are monitored by the Technical Management Committee.
The specific conditions of access and execution may vary depending on the selected access mode.
User Responsibilities During Project Execution
Users are expected to cooperate with the hosting infrastructure nodes and the relevant technical staff throughout the execution of the approved activities. Users must comply with the operational, organisational and safety rules applicable at the hosting site, including any mandatory training, access restrictions, sample-handling requirements or instrument-use procedures.
Users are also expected to provide, in a timely manner, any information reasonably required for the planning, safe execution and documentation of the access activities, including technical parameters, sample-related information and metadata relevant to the services provided.
Data Management and FAIR Principles
All activities within iENTRANCE follow a FAIR-by-design approach, ensuring that data generated through the infrastructure are:
- Findable
- Accessible
- Interoperable
- Reusable
Users remain responsible for the scientific content, integrity and lawful use of the data, materials and information they provide in the context of the access. They may also be required to supply the metadata and documentation necessary to support the traceability, interpretation, preservation and reuse of data generated through iENTRANCE services.
Data management is supported by a digital ecosystem that includes:
- standardized metadata and data formats
- shared documentation and methodologies
- integration with European and international infrastructures
Data access conditions may vary depending on the access mode:
- open research projects → data are generally shared according to open science principles
- industrial projects → data may be subject to confidentiality and specific agreements
Applicants may be required to comply with data management guidelines and, where applicable, provide a data management plan.
Where provided for by the relevant call, access mode or service conditions, applicants may be required to comply with specific requirements concerning metadata standards, data formats, repository deposition, persistent identifiers and data citation.
Data access, retention, sharing and dissemination conditions may vary depending on the access mode. For non-market-driven access, data are generally managed in accordance with FAIR and open science principles, unless otherwise specified. For market-driven access, data may be subject to confidentiality obligations, restricted access and specific contractual arrangements.
Intellectual Property and Confidentiality
Unless otherwise specified in the relevant call or agreement, users retain ownership of their pre-existing knowledge, materials, methods, data and other background elements brought into the project. Intellectual property rights and confidentiality obligations relating to results generated through access to iENTRANCE may vary depending on the access mode, the nature of the activities performed and the contribution provided by the parties involved.
Where access is provided under market-driven conditions, the applicable service agreement may define specific provisions regarding confidentiality, ownership or use of results, publication restrictions, exploitation rights and any related obligations of the parties.
Where the activities carried out within iENTRANCE give rise to potentially protectable results or involve substantial scientific or technical contributions from infrastructure staff, the relevant parties are encouraged to clarify, at the earliest possible stage, the applicable arrangements concerning intellectual property, confidentiality and dissemination.
Post-Project Requirements
At the end of the project, users are required to:
submit a report describing the results of the activities
provide feedback on the access and services
communicate to iENTRANCE, within a reasonable time, any publication, dataset, conference contribution, patent application or other output resulting from the use of the infrastructure.
Users must acknowledge iENTRANCE in all publications and outputs resulting from the use of the infrastructure.
Where applicable, users should also cite the relevant proposal or project identifier, the infrastructure node, service or instrument used, and any dataset identifier or DOI made available in connection with the access activities.
Additional dissemination or data-sharing requirements may apply depending on the access mode.
Failure to comply with the applicable reporting, acknowledgement, dissemination or data-management obligations may be considered in the context of future access requests, where permitted by the relevant rules and procedures.
Safety, Compliance and Liability
Users must comply with all applicable health, safety, security and environmental protection rules in force at the hosting infrastructure node. Access may be subject to prior training, approval procedures, sample declarations or other site-specific requirements necessary for the safe and lawful execution of the activities.
Users are responsible for ensuring that any materials, samples, substances, data or information they provide for the purpose of access activities may be lawfully used, handled, transferred and processed, and that they comply with all applicable legal, regulatory, ethical and safety requirements.
Where required by the hosting institution or by the applicable access conditions, users may be asked to provide evidence of adequate insurance coverage or to comply with additional liability-related requirements.
Key Considerations
Applicants should ensure that:
- the scientific and/or technological quality of the proposal is clearly demonstrated
- the need for access to iENTRANCE infrastructure is well justified
- the proposed methodology is feasible within the available services
- the expected impact is clearly described
- data management aspects are considered when relevant
Applicants are encouraged to contact the instrument specialists identified in the service catalogue prior to submission, in order to optimise the proposed experimental plan and refine key parameters such as the required instrument time and resource allocation.
Applicants should also consider, where relevant, the expected data management obligations, possible dissemination commitments, recognition of scientific and technical contributions, confidentiality constraints, intellectual property aspects and any site-specific safety or compliance requirements associated with the requested access.
Proposals must comply with the requirements specified in the relevant access opportunity.



