logo next generationlogo italia domanilogo università ricerca
GuidelinesDiscover more

Access to the iENTRANCE Infrastructure

iENTRANCE provides access to its facilities, technologies and expertise through a structured and transparent process based on the submission and evaluation of user proposals.

Access is coordinated through the iENTRANCE Central Hub, which acts as a single-entry point for users and manages the allocation of resources across the distributed infrastructure.

The detailed conditions for access, including scope, eligibility and deadlines, are defined in the specific calls or access opportunities published on the iENTRANCE website.

Access Modes

Access to iENTRANCE services is provided through three complementary modes:

Excellence-driven access

Access is granted on a competitive basis following the evaluation of project proposals.
This is the primary access mode for academic users and research-oriented projects.

Market-driven access

Access is provided to industrial users or for applied research activities.
Conditions are defined on a case-by-case basis and may include specific agreements and confidentiality clauses.

Wide access

This mode supports exploratory activities, training, and the onboarding of new users, facilitating broader use of the infrastructure.

Different access modes may follow different procedures and conditions, as specified in the relevant access calls or agreements.

Access conditions, including financial support, confidentiality, intellectual property, dissemination obligations and data-sharing requirements, may differ depending on the selected access mode and shall be defined in the relevant call text or service agreement. For market-driven access, services may be provided under specific commercial terms and conditions.

Access Proposal Submission

Applicants must submit their proposals via the online application portal available on the iENTRANCE website.

The submission form requires detailed information, including:

  • project title and abstract
  • research objectives and methodology
  • justification for requesting access to the infrastructure
  • expected results and potential impact
  • required resources, services and facilities
  • applicant’s qualifications and relevant experience

Applicants are encouraged to consult the application guidelines provided with each access opportunity and may contact the iENTRANCE team for support in identifying suitable services.

Applicants are responsible for ensuring that the information provided in the proposal is accurate, complete and consistent with the objectives of the requested access. Where relevant, applicants should also identify any specific requirements relating to data management, confidentiality, safety, ethical compliance, intellectual property or expected dissemination of results.

Publications and authorship

For access modes other than market-driven access, where the contribution provided by iENTRANCE staff is substantial and goes beyond ordinary user support, particularly in relation to measurements, experimental execution, data processing and/or data analysis, the researcher, technologist or technician involved should be included among the authors of the resulting scientific publication, in accordance with accepted authorship criteria and good scientific practice. In such cases, acknowledgement of the project or infrastructure alone is not considered sufficient.

Before the access starts, users and the involved iENTRANCE staff are encouraged to discuss and agree the expected level of scientific and technical involvement, including the appropriate form of recognition in publications and other outputs.

Evaluation Process

Applications undergo a structured and transparent evaluation process carried out by dedicated committees:

Scientific Committee

Composed of external experts, this committee evaluates:

  • scientific quality and originality
  • relevance to the state of the art
  • potential impact

Technical Feasibility Committee

Composed of iENTRANCE partners, this committee assesses:

  • technical feasibility of the proposed activities
  • suitability of the requested infrastructure services
  • identification of the most appropriate infrastructure nodes

Technical Management Committee

This committee oversees the technical implementation of approved projects and ensures proper coordination during execution.

Access Allocation and Project Execution

Access to the iENTRANCE infrastructure is granted based on:

  • evaluation results
  • technical feasibility
  • availability of resources

Following approval:

  • projects are assigned to the appropriate infrastructure nodes
  • activities are planned and scheduled
  • users work in close collaboration with technical staff

Continuous support is provided throughout the execution phase, and project activities are monitored by the Technical Management Committee.

The specific conditions of access and execution may vary depending on the selected access mode.

User Responsibilities During Project Execution

Users are expected to cooperate with the hosting infrastructure nodes and the relevant technical staff throughout the execution of the approved activities. Users must comply with the operational, organisational and safety rules applicable at the hosting site, including any mandatory training, access restrictions, sample-handling requirements or instrument-use procedures.

Users are also expected to provide, in a timely manner, any information reasonably required for the planning, safe execution and documentation of the access activities, including technical parameters, sample-related information and metadata relevant to the services provided.

Data Management and FAIR Principles

All activities within iENTRANCE follow a FAIR-by-design approach, ensuring that data generated through the infrastructure are:

  • Findable
  • Accessible
  • Interoperable
  • Reusable

Users remain responsible for the scientific content, integrity and lawful use of the data, materials and information they provide in the context of the access. They may also be required to supply the metadata and documentation necessary to support the traceability, interpretation, preservation and reuse of data generated through iENTRANCE services.

Data management is supported by a digital ecosystem that includes:

  • standardized metadata and data formats
  • shared documentation and methodologies
  • integration with European and international infrastructures

Data access conditions may vary depending on the access mode:

  • open research projects → data are generally shared according to open science principles
  • industrial projects → data may be subject to confidentiality and specific agreements

Applicants may be required to comply with data management guidelines and, where applicable, provide a data management plan.

Where provided for by the relevant call, access mode or service conditions, applicants may be required to comply with specific requirements concerning metadata standards, data formats, repository deposition, persistent identifiers and data citation.

Data access, retention, sharing and dissemination conditions may vary depending on the access mode. For non-market-driven access, data are generally managed in accordance with FAIR and open science principles, unless otherwise specified. For market-driven access, data may be subject to confidentiality obligations, restricted access and specific contractual arrangements.

Intellectual Property and Confidentiality

Unless otherwise specified in the relevant call or agreement, users retain ownership of their pre-existing knowledge, materials, methods, data and other background elements brought into the project. Intellectual property rights and confidentiality obligations relating to results generated through access to iENTRANCE may vary depending on the access mode, the nature of the activities performed and the contribution provided by the parties involved.

Where access is provided under market-driven conditions, the applicable service agreement may define specific provisions regarding confidentiality, ownership or use of results, publication restrictions, exploitation rights and any related obligations of the parties.

Where the activities carried out within iENTRANCE give rise to potentially protectable results or involve substantial scientific or technical contributions from infrastructure staff, the relevant parties are encouraged to clarify, at the earliest possible stage, the applicable arrangements concerning intellectual property, confidentiality and dissemination.

Post-Project Requirements

At the end of the project, users are required to:

submit a report describing the results of the activities

provide feedback on the access and services

communicate to iENTRANCE, within a reasonable time, any publication, dataset, conference contribution, patent application or other output resulting from the use of the infrastructure.

Users must acknowledge iENTRANCE in all publications and outputs resulting from the use of the infrastructure.

Where applicable, users should also cite the relevant proposal or project identifier, the infrastructure node, service or instrument used, and any dataset identifier or DOI made available in connection with the access activities.

Additional dissemination or data-sharing requirements may apply depending on the access mode.

Failure to comply with the applicable reporting, acknowledgement, dissemination or data-management obligations may be considered in the context of future access requests, where permitted by the relevant rules and procedures.

Safety, Compliance and Liability

Users must comply with all applicable health, safety, security and environmental protection rules in force at the hosting infrastructure node. Access may be subject to prior training, approval procedures, sample declarations or other site-specific requirements necessary for the safe and lawful execution of the activities.

Users are responsible for ensuring that any materials, samples, substances, data or information they provide for the purpose of access activities may be lawfully used, handled, transferred and processed, and that they comply with all applicable legal, regulatory, ethical and safety requirements.

Where required by the hosting institution or by the applicable access conditions, users may be asked to provide evidence of adequate insurance coverage or to comply with additional liability-related requirements.

Key Considerations

Applicants should ensure that:

  • the scientific and/or technological quality of the proposal is clearly demonstrated
  • the need for access to iENTRANCE infrastructure is well justified
  • the proposed methodology is feasible within the available services
  • the expected impact is clearly described
  • data management aspects are considered when relevant

Applicants are encouraged to contact the instrument specialists identified in the service catalogue prior to submission, in order to optimise the proposed experimental plan and refine key parameters such as the required instrument time and resource allocation.

Applicants should also consider, where relevant, the expected data management obligations, possible dissemination commitments, recognition of scientific and technical contributions, confidentiality constraints, intellectual property aspects and any site-specific safety or compliance requirements associated with the requested access.

Proposals must comply with the requirements specified in the relevant access opportunity.