User Registration, Account Types & Access Roles

How SEIPID user accounts are registered, reviewed, and assigned access roles

Table of Contents

Section 01

User Registration & Account Setup

Before accessing the SEIPID portal and related services, every applicant is required to complete a structured registration and verification process. This process is designed to establish verified identity, institutional responsibility, and long-term accountability within the SEIPID ecosystem. Registration does not automatically grant system access; all applications undergo mandatory verification and approval stages.

SEIPID collects only essential information necessary to validate user identity, affiliation, and authority. This may include personal details, contact information, secure login credentials, and preliminary journal or publication-related information.

1

Account Creation

Applicants begin by creating an account using a valid email address and a secure password. Personal email addresses are permitted; however, professional or official institutional emails are strongly recommended, as they significantly facilitate and accelerate identity verification. During this stage, users must provide basic personal information and initial journal or publication details. All fields marked with (*) are mandatory.

2

Email Verification (Code-Based OTP)

After email submission, the system sends a One-Time Password (OTP) to the provided email address(es). Registration cannot proceed until email verification is completed successfully. Upon verification, the email status changes to Verified, and the Register button becomes active.

3

Registration Submission & Manual Review

Once email verification is complete, applicants may submit their registration. A formal confirmation email is issued, and the application enters a manual review stage conducted by the Xpertno Research Center (XRC). This review verifies identity, affiliation, authority, and eligibility for SEIPID access. Typical approval timelines range from 7 to 30 working days, depending on verification complexity and applicant category.

4

SEIPID Portal Access

This portal enables approved users to register journals, repositories, publishers, or other eligible scholarly entities within the SEIPID registry. SEIPID assignment and metadata submission do not begin automatically; entities must be registered and activated separately in accordance with SEIPID registry requirements.

Read SEIPID Registry Requirements

Terms of Registration

By registering, you agree to the following terms and conditions:

  • By submitting a registration application, applicants confirm that they have read, understood, and agreed to all applicable SEIPID Guidelines, Terms of Service, and Privacy Policies, including future updates.
  • Applicants are strongly encouraged to provide at least one official or institutional email address (journal, publisher, university, or organisational domain). While personal emails are permitted, institutional emails significantly improve verification speed and approval reliability.
  • All submitted information must be accurate, current, complete, and verifiable. Submission of false, misleading, incomplete, or outdated information may result in delayed processing, suspension, rejection, or permanent access revocation.
  • For identity, authority, and affiliation verification, Xpertno Research Center (XRC) reserves the right to contact affiliated journals, publishers, universities, or institutions directly using the information provided by the applicant.
  • SEIPID access is granted exclusively on the basis of verified responsibility and institutional accountability. Approved accounts may only manage their own journals or publications and shall not be used for proxy, anonymous, third-party, or unauthorised representation.
  • Submission of an application does not guarantee approval. SEIPID and XRC reserve the right to approve, defer, reject, suspend, or cancel any application or account at their discretion, with or without providing justification.
  • Although standard review timelines range between 7 and 30 working days, extended processing times may occur due to institutional verification delays, legal checks, technical audits, or other unforeseen factors.
  • Approval of a user account does not automatically activate SEIPID generation or metadata submission. Journals and publications must be registered separately and approved before any identifier assignment occurs.
  • SEIPID and XRC reserve the right to request additional documentation, clarification, or verification at any stage to maintain registry integrity, transparency, and trust.
  • SEIPID further reserves the right to suspend, revoke, or deactivate access to the portal, registry records, or assigned identifiers if policy violations, misrepresentation, misuse, or governance risks are identified at any time.
Section 02

User Types & Permission Levels

SEIPID operates through a structured role-based access framework designed to support platform security, institutional accountability, controlled permissions, and governance integrity. Each account type is assigned responsibilities and access rights according to its verified authority, operational function, and approved level of participation within the SEIPID registry.

XRC Administrators

Who they are: Internal administrative users created and managed directly by Xpertno Research Center (XRC).

What they can do: Review applications, verify users and entities, manage approvals, oversee compliance, and maintain overall registry governance.

How they are onboarded: These accounts cannot self-register and are assigned exclusively through internal nomination, credential validation, and executive approval.

Internal Role • No Public Registration • Executive Approval

Registrant Account Holders

Who they are: Verified external users authorised to register and manage scholarly entities such as journals, publishers, repositories, archive systems, conference series, and other eligible units within the SEIPID registry.

What they can do: Register entities, activate namespaces, select plans, submit metadata, generate SEIPIDs, manage issued identifiers, and maintain approved records within the limits of their account and plan.

How they are onboarded: These users apply through the standard registration and verification process and receive access only after identity, affiliation, authority, and eligibility have been reviewed and approved.

Verified Access • Entity Management • Plan-Based Permissions

Assistant Managers

Who they are: Delegated users added by approved registrant account holders to assist with operational tasks under the parent account.

What they can do: Help manage registered entities, namespaces, metadata records, and identifier-related workflows according to the permissions granted by the parent registrant account.

How they are onboarded: These accounts are not independently self-approved; they are created or invited by eligible registrant account holders. Assistant access may be included within selected plans, while additional assistant seats may be activated as paid add-ons.

Delegated Access • Plan-Based Seats • Optional Paid Add-On

Institutional / Organisational Accounts

Who they are: Formal accounts established for universities, publishing groups, research institutions, or other multi-entity organisations operating under a central structure.

What they can do: Oversee multiple registrant units, coordinate entity-level activity, and support centralised management across approved institutional namespaces or subdivisions.

How they are onboarded: These accounts are established through formal institutional communication, documentary verification, and executive approval by XRC or the authorised SEIPID governing authority.

Multi-Entity Oversight • Formal Institutional Request • Executive Approval

Account Upgrades & Profile Updates

Requests to upgrade account type, update institutional details, modify permissions, or revise registered information must be submitted through the official SEIPID Registrar or Support Desk. All such requests remain subject to verification, eligibility review, and administrative approval.

Role Hierarchy Note

Some accounts are created internally, some are approved through public registration, and others are delegated under existing registrant accounts. Access rights are assigned according to governance requirements, institutional responsibility, and approved plan conditions.