2006/ws/policy ws-policy-guidelines.html,1.11,1.12 ws-policy-guidelines.xml,1.20,1.21

Update of /sources/public/2006/ws/policy
In directory hutz:/tmp/cvs-serv31662

Modified Files:
	ws-policy-guidelines.html ws-policy-guidelines.xml 
Log Message:
Editorial revision: most parts of editorial action 96 from MS review.
Remaining editorials to be reviewed.


Index: ws-policy-guidelines.html
===================================================================
RCS file: /sources/public/2006/ws/policy/ws-policy-guidelines.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -d -r1.11 -r1.12
--- ws-policy-guidelines.html	30 Nov 2006 06:03:53 -0000	1.11
+++ ws-policy-guidelines.html	20 Dec 2006 06:24:20 -0000	1.12
@@ -63,7 +63,7 @@
         guide to using the specifications. </p></div><div>
 <h2><a name="status">Status of this Document</a></h2><p><strong>This document is an editors' copy that has
         no official standing.</strong></p><p></p></div><hr><div class="toc">
-<h2><a name="contents">Table of Contents</a></h2><p class="toc">1. <a href="#introduction">Introduction</a><br>2. <a href="#Assertions">What is an Assertion? </a><br>3. <a href="#d3e176">Who is involved in authoring Assertions? </a><br>&nbsp;&nbsp;&nbsp;&nbsp;3.1 <a href="#roles"> Roles and Responsibilities </a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3.1.1 <a href="#domain-owners"> WS-Policy Authors</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3.1.2 <a href="#consumers">Consumers</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3.1.3 <a href="#providers">Providers</a><br>4. <a href="#general-guidelines">General Guidelines for WS-Policy Assertion Authors</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.1 <a href="#assertion-target">Assertions and Their Target Use</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.2 <a href="#compact-full">Authoring Styles </a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.3 <a href="#new-guidelines-domains">Considerations when Modeling New Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbp;&nbsp;4.3.1 <a href="#minimal-approach">Minimal approach</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.3.2 <a href="#QName_and_XML_Information_Set_representation">QName and XML Information Set representation</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.3.3 <a href="#self-describing"> Self Describing Messages </a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.3.4 <a href="#single-domains">Single Domains</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.4 <a href="#comparison">Comparison of Nested and Parameterized Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.4.1 <a href="#parameterized-assertions">Assertions with Parameters</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.4.2 <a href="#nested-assertions">Nested Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.4.3 <a href="#which-one-to-use">Considerations for choosing parameters vs nesting</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.5 <a href="#optional-policy-assertion">Designating Optional Behaviors</a>br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.5.1 <a href="#d3e514">Optional behavior in Compact authoring</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.5.2 <a href="#d3e522">Optional behavior at runtime</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.6 <a href="#typing-assertions">Typing Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.7 <a href="#levels-of-abstraction">Levels of Abstraction in WSDL </a><br>5. <a href="#lifecycle">Lifecycle of Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.1 <a href="#Referencing_Policy_Expressions">Referencing Policy Expressions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.2 <a href="#extending-assertions"> Evolution of Assertions (Versioning and Compatibility)</a><br>6. <a href="#inter-policy">Inter-domain Policy and Composition Issues</a><br>7. <a href="#best-practices-attachment">Applying Best Practices for  Policy Attachment</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.1 <a href="#context-free-policies">Appropriate Attachment: Preserving Context-Free Policies</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.2 <ahref="#appropriate-attachment-assertion-subjects">Appropriate Attachment: Identifying Assertion Subjects</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;7.2.1 <a href="#interaction">Interaction between Subjects</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.3 <a href="#identifying-assertion-sources">Appropriate Attachment: Identifying Assertion Sources </a><br>8. <a href="#scenario">Scenario and a worked example</a><br></p>
+<h2><a name="contents">Table of Contents</a></h2><p class="toc">1. <a href="#introduction">Introduction</a><br>2. <a href="#Assertions">What is an Assertion? </a><br>3. <a href="#d3e176">Who is involved in authoring Assertions? </a><br>&nbsp;&nbsp;&nbsp;&nbsp;3.1 <a href="#roles"> Roles and Responsibilities </a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3.1.1 <a href="#domain-owners"> WS-Policy Authors</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3.1.2 <a href="#consumers">Consumers</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3.1.3 <a href="#providers">Providers</a><br>4. <a href="#general-guidelines">General Guidelines for WS-Policy Assertion Authors</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.1 <a href="#assertion-target">Assertions and Their Target Use</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.2 <a href="#compact-full">Authoring Styles </a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.3 <a href="#new-guidelines-domains">Considerations when Modeling New Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbp;&nbsp;4.3.1 <a href="#minimal-approach">Minimal approach</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.3.2 <a href="#QName_and_XML_Information_Set_representation">QName and XML Information Set representation</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.3.3 <a href="#self-describing"> Self Describing Messages </a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.3.4 <a href="#single-domains">Single Domains</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.4 <a href="#comparison">Comparison of Nested and Parameterized Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.4.1 <a href="#parameterized-assertions">Assertions with Parameters</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.4.2 <a href="#nested-assertions">Nested Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.4.3 <a href="#which-one-to-use">Considerations for choosing parameters vs nesting</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.5 <a href="#optional-policy-assertion">Designating Optional Behaviors</a>br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.5.1 <a href="#d3e518">Optional behavior in Compact authoring</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;4.5.2 <a href="#d3e526">Optional behavior at runtime</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.6 <a href="#typing-assertions">Typing Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;4.7 <a href="#levels-of-abstraction">Levels of Abstraction in WSDL </a><br>5. <a href="#lifecycle">Lifecycle of Assertions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.1 <a href="#Referencing_Policy_Expressions">Referencing Policy Expressions</a><br>&nbsp;&nbsp;&nbsp;&nbsp;5.2 <a href="#extending-assertions"> Evolution of Assertions (Versioning and Compatibility)</a><br>6. <a href="#inter-policy">Inter-domain Policy and Composition Issues</a><br>7. <a href="#best-practices-attachment">Applying Best Practices for  Policy Attachment</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.1 <a href="#context-free-policies">Appropriate Attachment: Preserving Context-Free Policies</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.2 <ahref="#appropriate-attachment-assertion-subjects">Appropriate Attachment: Identifying Assertion Subjects</a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;7.2.1 <a href="#interaction">Interaction between Subjects</a><br>&nbsp;&nbsp;&nbsp;&nbsp;7.3 <a href="#identifying-assertion-sources">Appropriate Attachment: Identifying Assertion Sources </a><br>8. <a href="#scenario">Scenario and a worked example</a><br></p>
 <h3><a name="appendix" id="appendix">Appendices</a></h3><p class="toc">A. <a href="#security-considerations">Security Considerations</a><br>B. <a href="#xml-namespaces">XML Namespaces</a><br>C. <a href="#references">References</a><br>D. <a href="#acknowledgments">Acknowledgements</a> (Non-Normative)<br>E. <a href="#change-description">Changes in this Version of
           the Document</a> (Non-Normative)<br>F. <a href="#change-log">Web Services Policy 1.5 - Guidelines for Policy Assertion Authors Change Log</a> (Non-Normative)<br></p></div><hr><div class="body"><div class="div1">
 <h2><a name="introduction"></a>1. Introduction</h2><p>The WS-Policy specification defines a policy to be a collection
@@ -157,7 +157,7 @@
             	</p></li><li><p>Does the behavior have an implied scoping to a policy subject such as service, endpoint, operation and message?
             	</p></li><li><p>Is there a requirement that a choice must be made for successful interaction?</p><p>Sometimes providers and requesters are required to engage in certain behaviors. 
           			The use of optimization and reliable messaging are two examples.
-          		</p></li></ul><p>There are already many examples in the industry that adhere to this practice, such as <cite><a href="#WS-RM-Policy">Web Services Reliable Messaging Policy</a></cite>
+          		</p></li></ul><p>There are already many examples in the industry that adhere to the above practices, such as <cite><a href="#WS-RM-Policy">Web Services Reliable Messaging Policy</a></cite>
       	and <cite><a href="#WS-SecurityPolicy">WS-SecurityPolicy</a></cite>. Some common characteristics from these documents may be considered as <em>best practices</em> for new assertion authors:
       	</p><ul><li><p>Specify both the syntax and the semantics of the assertions
                		</p></li><li><p>If nested or parameterized assertions are defined, be clear about their usage
@@ -176,7 +176,7 @@
 		express their own domain knowledge, it is necessary to provide basic
 		functionality that all domains could exploit and then allow
 		points of extension where authors of the various WS-Policy
-		expressions for a particular domain can provide additional semantics.
+		assertions for a particular domain can provide additional semantics.
         </p><p>Some policy assertions specify traditional
       	requirements and capabilities that will ultimately manifest on
       	the wire (e.g., authentication scheme, transport protocol selection). Other policy assertions have no wire manifestation
@@ -247,15 +247,15 @@
       			configurations dynamically.
         		</p></div><div class="div3">
 <h4><a name="providers"></a>3.1.3 Providers</h4><p>A provider of WS-Policy Assertions can be any web service implementation that can
-	   			specify its on-the-wire message behavior as an XML
-	   			expression that conforms to the WS-PolicyFramework and
-	   			WS-Policy Attachment specifications. The
-	   			WS-PolicyAttachment specification has defined a set of
+	   			specify its on-the-wire message behavior as a policy
+				expression that conforms to the Web Services Policy 1.5 - Framework [<cite><a href="#WS-Policy">Web Services Policy Framework</a></cite>]
+				and Web Services Policy 1.5 - Attachment [<cite><a href="#WS-PolicyAttachment">Web Services Policy Attachment</a></cite>] specifications.
+				The Web Services Policy 1.5 - Attachment specification has defined a set of
 	   			subjects and an extensible mechanism for attaching policies
 	   			to web services subjects. When a web service provider
 	   			chooses to make its capabilities and constraints available,
-	   			it may also need to conform to requirements of other policy
-	   			specifications it utilizes ( i.e., WS-SecurityPolicy).
+	   			the provider may also need to conform to requirements of other policy
+	   			assertion specifications it utilizes ( i.e., WS-SecurityPolicy).
            		</p><p>When deploying services with policies it is useful for providers to anticipate how
            		to evolve their services capabilities over time.  If
            		forward compatibility is a concern in order to accommodate
@@ -328,8 +328,9 @@
 <h3><a name="compact-full"></a>4.2 Authoring Styles </h3><p> WS-Policy supports two different authoring styles.  A compact form is one in which an expression consists of three
 	   		constructs: an attribute to decorate an assertion (to indicate whether it is required or optional), semantics for
 	   		recursively nested policy operators, and a policy reference/inclusion mechanism.
-      		</p><div class="exampleOuter"><div class="exampleInner"><pre>&lt;wsp:Policy xmlns:wsp='http://www.w3.org/@@@@/@@/ws-policy'   xmlns:sp='http://schemas.xmlsoap.org/ws/2005/07/securitypolicy' 
-                   xmlns:wsrmp='http://docs.oasis-open.org/ws-rx/wsrmp/200608'&gt;
+      		</p><div class="exampleOuter"><div class="exampleInner"><pre>&lt;wsp:Policy xmlns:wsp='http://www.w3.org/@@@@/@@/ws-policy'
+ xmlns:sp='http://schemas.xmlsoap.org/ws/2005/07/securitypolicy' 
+ xmlns:wsrmp='http://docs.oasis-open.org/ws-rx/wsrmp/200608'&gt;
  &lt;wsrmp:RMAssertion wsp:Optional="true"/&gt;
  &lt;wsp:ExactlyOne&gt; 
   &lt;wsp:All&gt;
@@ -345,11 +346,12 @@
  &lt;/wsp:ExactlyOne&gt;
 &lt;/wsp:Policy&gt;</pre></div></div><p>An alternative style is a "normal form" in which the optional attribute is replaced by the expression of the
             alternatives allowed by the set of policy assertions. 
-      		</p><div class="exampleOuter"><div class="exampleInner"><pre>&lt;wsp:Policy xmlns:wsp='http://www.w3.org/@@@@/@@/ws-policy'   xmlns:sp='http://schemas.xmlsoap.org/ws/2005/07/securitypolicy' 
+      		</p><div class="exampleOuter"><div class="exampleInner"><pre>&lt;wsp:Policy xmlns:wsp='http://www.w3.org/@@@@/@@/ws-policy'
+ xmlns:sp='http://schemas.xmlsoap.org/ws/2005/07/securitypolicy' 
  xmlns:wsrmp='http://docs.oasis-open.org/ws-rx/wsrmp/200608'&gt;
  &lt;wsp:ExactlyOne&gt; 
-  &lt;wsp:All&gt;
 
+  &lt;wsp:All&gt;
    &lt;wsrmp:RMAssertion&gt;
       &lt;sp:TransportBinding&gt;
        &lt;wsp:Policy&gt;
@@ -358,8 +360,7 @@
                   &lt;sp:HttpsToken RequireClientCertificate='true' /&gt;
             &lt;/wsp:Policy&gt;
           &lt;/sp:TransportToken&gt;
-
- &lt;/wsp:Policy&gt;
+      &lt;/wsp:Policy&gt;
      &lt;/sp:TransportBinding&gt;
   &lt;/wsp:All&gt;
 
@@ -374,6 +375,7 @@
        &lt;/wsp:Policy&gt;
       &lt;/sp:TransportBinding&gt;
   &lt;/wsp:All&gt;
+
  &lt;/wsp:ExactlyOne&gt;
 &lt;/wsp:Policy&gt;</pre></div></div><p> Note that both authoring styles are equivalent, however
             there may be reasons to choose one form over another
@@ -599,7 +601,7 @@
         			to the WS-Policy framework.
         			</p></div></div><div class="div2">
 <h3><a name="optional-policy-assertion"></a>4.5 Designating Optional Behaviors</h3><div class="div3">
-<h4><a name="d3e514"></a>4.5.1 Optional behavior in Compact authoring</h4><p>Optional behaviors represent behaviors which may be engaged by a consumer. When using the
+<h4><a name="d3e518"></a>4.5.1 Optional behavior in Compact authoring</h4><p>Optional behaviors represent behaviors which may be engaged by a consumer. When using the
         			compact authoring form for assertions, behaviors are marked by
         			using <code>wsp:Optional</code> attribute that has a value,
         			"true". During the process of normalization, the runtime
@@ -610,7 +612,7 @@
         			runtime behavior. In order to simplify reference to such
         			assertions, we just use the term optional assertions in this section. 
         			</p></div><div class="div3">
-<h4><a name="d3e522"></a>4.5.2 Optional behavior at runtime</h4><p>The <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite> document contains an
+<h4><a name="d3e526"></a>4.5.2 Optional behavior at runtime</h4><p>The <cite><a href="#WS-Policy-Primer">Web Services Policy Primer</a></cite> document contains an
         			example that proposes the use of <cite><a href="#MTOM">MTOM</a></cite> as an
         			optional behavior that can be engaged by a consumer. The
         			primer proposes that an assertion that identifies the use of
@@ -900,16 +902,16 @@
       already incorporated <code>wss:Security</code> headers into their
       messages. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-1. </span>Message with Security Headers</i></p><div class="exampleInner"><pre>&lt;soap:Envelope&gt; 
   &lt;soap:Header&gt;
-	&lt;wss:Security soap:mustUnderstand ="1"&gt;
-	  &lt;wsu:Timestamp u:Id=_0"&gt;
-		&lt;wsu:Created&gt; 20006-01-19T02:49:53.914Z &lt;/u:Created&gt; 
-		&lt;wsu:Expires&gt; 20006-01-19T02:54:53.914Z &lt;/u:Expires&gt;
-	  &lt;/wsu:Timestamp&gt;
+    &lt;wss:Security soap:mustUnderstand ="1"&gt;
+      &lt;wsu:Timestamp u:Id=_0"&gt;
+        &lt;wsu:Created&gt; 20006-01-19T02:49:53.914Z &lt;/u:Created&gt; 
+        &lt;wsu:Expires&gt; 20006-01-19T02:54:53.914Z &lt;/u:Expires&gt;
+      &lt;/wsu:Timestamp&gt;
     &lt;/wss:Security&gt;
-	&lt;wsa:To&gt; http://CompanyA/quote &lt;wsa:To&gt;
-	&lt;wsa:Action&gt; http://CompanyA/GetRealQuote&lt;/wsa:Action&gt;
-&lt;/soap:Header&gt;
-&lt;soap:Body&gt;
+    &lt;wsa:To&gt; http://CompanyA/quote &lt;wsa:To&gt;
+    &lt;wsa:Action&gt; http://CompanyA/GetRealQuote&lt;/wsa:Action&gt;
+ &lt;/soap:Header&gt;
+ &lt;soap:Body&gt; ...
 &lt;/soap:Envelope&gt;</pre></div></div><p>The SOAP message in the example above includes security
      timestamps that express creation and expiration times of this
      message. Company A requires the use of these security timestamps
@@ -945,11 +947,13 @@
      service the ability to provide additional integrity protection by
      including WS-Security Headers to protect the message content
      after it is processed by the transport.  The additional security
-     processing is not required by all Company A web services. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-3. </span>CompanyA-ProfileB (not expanded)</i></p><div class="exampleInner"><pre> &lt;Policy wsu:Id="CompanyA-ProfileB"&gt;
-     &lt;wsa:UsingAddressing /&gt; &lt;ExactlyOne&gt;
-     &lt;sp:TransportBinding&gt;&lt;/sp:TransportBinding&gt;
-     &lt;sp:AsymmetricBinding&gt;&lt;/sp:AssymetricBinding&gt;
-     &lt;/ExactlyOne&gt; &lt;/Policy&gt; </pre></div></div><p>We have shown above that Company A offered a
+     processing is not required by all Company A web services. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-3. </span>CompanyA-ProfileB (not expanded)</i></p><div class="exampleInner"><pre>&lt;Policy wsu:Id="CompanyA-ProfileB"&gt;
+ &lt;wsa:UsingAddressing/&gt;
+ &lt;ExactlyOne&gt;
+  &lt;sp:TransportBinding&gt;&lt;/sp:TransportBinding&gt;
+  &lt;sp:AsymmetricBinding&gt;&lt;/sp:AssymetricBinding&gt;
+ &lt;/ExactlyOne&gt;
+&lt;/Policy&gt;</pre></div></div><p>We have shown above that Company A offered a
     second profile that included two security options.  The details of
     the Bindings, requires a more detailed exploration of some of the
     other features of the WS-Policy Framework. </p><p>When WS-Policy authors create sets of Policy assertions, like
@@ -967,27 +971,26 @@
     represent (ed) these dependent behaviors as "nested" policy
     assertions.  </p><p>In the example below the child Policy element is a nested
      policy behavior and further qualifies the behavior of the
-     <code>sp:TransportBinding</code> policy assertion.  </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-4. </span>CompanyA-ProfileB (fully expanded)</i></p><div class="exampleInner"><pre>
-&lt;Policy wsu:Id="CompanyA-ProfileB"&gt; 
-	&lt;wsa:UsingAddressing /&gt;
-	&lt;ExactlyOne&gt;
-	   &lt;sp:TransportBinding&gt;
-              &lt;Policy&gt;
-   	         &lt;sp:TransportToken&gt;
-		    &lt;Policy&gt;
-		      &lt;sp:HttpsToken RequireClienCertificate="false" /&gt;
-                    &lt;/Policy&gt;
-                 &lt;/sp:TransportToken&gt;
-                 &lt;sp:AlgorithmSuite&gt;
-                    &lt;Policy&gt;
-		       &lt;sp:Basic256Rsa15 /&gt;
-                    &lt;/Policy&gt;
-                 &lt;/sp:AlgorithmSuite&gt;
-              &lt;/Policy&gt;
-        &lt;/sp:TransportBinding&gt;
-	   &lt;sp:AsymmetricBinding&gt;
+     <code>sp:TransportBinding</code> policy assertion.  </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-4. </span>CompanyA-ProfileB (fully expanded)</i></p><div class="exampleInner"><pre>&lt;Policy wsu:Id="CompanyA-ProfileB"&gt; 
+ &lt;wsa:UsingAddressing/&gt;
+ &lt;ExactlyOne&gt;
+  &lt;sp:TransportBinding&gt;
+   &lt;Policy&gt;
+    &lt;sp:TransportToken&gt;
+     &lt;Policy&gt;
+      &lt;sp:HttpsToken RequireClienCertificate="false" /&gt;
+     &lt;/Policy&gt;
+    &lt;/sp:TransportToken&gt;
+    &lt;sp:AlgorithmSuite&gt;
+     &lt;Policy&gt;
+      &lt;sp:Basic256Rsa15 /&gt;
+     &lt;/Policy&gt;
+    &lt;/sp:AlgorithmSuite&gt;
+   &lt;/Policy&gt;
+  &lt;/sp:TransportBinding&gt;
+  &lt;sp:AsymmetricBinding&gt;
   &lt;/sp:AssymetricBinding&gt;
-	&lt;/ExactlyOne&gt;
+ &lt;/ExactlyOne&gt;
 &lt;/Policy&gt;</pre></div></div><p>
 				<code>The sp:AlgorithmSuite</code> is a nested policy
      assertion of the <code>sp:TransportBinding</code> assertion and
@@ -1015,12 +1018,10 @@
      specification and attach the policies to the web service endpoint
      policy subject as recommended by the WS-SecurityPolicy
      specification. For the default web services, the URI is included
-     in the wsdl binding for each web service. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-5. </span></i></p><div class="exampleInner"><pre>
-&lt;wsdl:binding name="CompanyADefaultBinding" type="tns:CompanyADefault"&gt; 
-  &lt;wsp:PolicyReference URI="http://www.CompanyA.com/WebServicesProfileA.xml"&gt;
-
-&lt;wsdl:operation name="GetQuote"&gt; &lt;/wsdl:operation&gt;
-&lt;/wsdl:binding&gt; </pre></div></div><p>The partner specified policy is included in the beginning of
+     in the wsdl binding for each web service. </p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-5. </span></i></p><div class="exampleInner"><pre>&lt;wsdl:binding name="CompanyADefaultBinding" type="tns:CompanyADefault"&gt;
+ &lt;wsp:PolicyReference URI="http://www.CompanyA.com/WebServicesProfileA.xml"&gt;
+ &lt;wsdl:operation name="GetQuote"&gt; &lt;/wsdl:operation&gt;
+&lt;/wsdl:binding&gt;</pre></div></div><p>The partner specified policy is included in the beginning of
     the WSDL 1.1 document and referenced by the binding for the service
     as in the example below.</p><div class="exampleOuter"><p style="text-align: left" class="exampleHead"><i><span>Example 8-6. </span></i></p><div class="exampleInner"><pre>
 &lt;wsdl:definitions name="StokeQuote"
@@ -1048,10 +1049,9 @@
 &lt;/wsp:Policy&gt;
 
 &lt;wsdl:binding name="CompanyADefaultBinding" type="tns:CompanyADefault"&gt; 
-  &lt;wsp:PolicyReference id=#CompanyA-ProfileB&gt;
-	&lt;wsdl:operation name="GetQuote"&gt; &lt;/wsdl:operation&gt;
-
-&lt;/wsdl:binding&gt; </pre></div></div><p>In some cases, companies may chose to implement their own
+ &lt;wsp:PolicyReference id=#CompanyA-ProfileB&gt;
+ &lt;wsdl:operation name="GetQuote"&gt; &lt;/wsdl:operation&gt;
+&lt;/wsdl:binding&gt;</pre></div></div><p>In some cases, companies may chose to implement their own
   assertions.  When companies chose to become policy authors they need
   to consider not only the definition of the behavior that the
   assertion represents but they need to consider how new assertions
@@ -1223,4 +1223,8 @@
 					    <a href="http://lists.w3.org/Archives/Public/public-ws-policy-eds/2006Nov/0129.html">Part 1</a> and 
 					    <a href="http://lists.w3.org/Archives/Public/public-ws-policy-eds/2006Nov/0134.html">Part 2</a>. 
 						</td></tr><tr><td rowspan="1" colspan="1">20061129</td><td rowspan="1" colspan="1">ASV</td><td rowspan="1" colspan="1">Formatted examples in <a href="#extending-assertions"><b>5.2  Evolution of Assertions (Versioning and Compatibility)</b></a>. 
+						</td></tr><tr><td rowspan="1" colspan="1">20061218</td><td rowspan="1" colspan="1">FS</td><td rowspan="1" colspan="1">Formatted examples in <a href="#compact-full"><b>4.2 Authoring Styles </b></a> and <a href="#scenario"><b>8. Scenario and a worked example</b></a>. 
+						</td></tr><tr><td rowspan="1" colspan="1">20061219</td><td rowspan="1" colspan="1">TIB</td><td rowspan="1" colspan="1">Editorial revision: most parts of editorial action
+							<a href="http://www.w3.org/2005/06/tracker/wspolicyeds/actions/96">96</a>.
+							Remaining editorials to be reviewed.
 						</td></tr></tbody></table><br></div></div></body></html>
\ No newline at end of file

Index: ws-policy-guidelines.xml
===================================================================
RCS file: /sources/public/2006/ws/policy/ws-policy-guidelines.xml,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -d -r1.20 -r1.21
--- ws-policy-guidelines.xml	18 Dec 2006 03:48:58 -0000	1.20
+++ ws-policy-guidelines.xml	20 Dec 2006 06:24:20 -0000	1.21
@@ -230,7 +230,7 @@
           	</item>
         </ulist>
 		
-		<p>There are already many examples in the industry that adhere to this practice, such as <bibref ref="WS-RM-Policy"/>
+		<p>There are already many examples in the industry that adhere to the above practices, such as <bibref ref="WS-RM-Policy"/>
       	and <bibref ref="WS-SecurityPolicy"/>. Some common characteristics from these documents may be considered as <emph>best practices</emph> for new assertion authors:
       	</p>
 			<ulist>
@@ -267,7 +267,7 @@
 		express their own domain knowledge, it is necessary to provide basic
 		functionality that all domains could exploit and then allow
 		points of extension where authors of the various WS-Policy
-		expressions for a particular domain can provide additional semantics.
+		assertions for a particular domain can provide additional semantics.
         </p>
         <p>Some policy assertions specify traditional
       	requirements and capabilities that will ultimately manifest on
@@ -361,15 +361,15 @@
 				<div3 id="providers">
 				<head>Providers</head>
 				<p>A provider of WS-Policy Assertions can be any web service implementation that can
-	   			specify its on-the-wire message behavior as an XML
-	   			expression that conforms to the WS-PolicyFramework and
-	   			WS-Policy Attachment specifications. The
-	   			WS-PolicyAttachment specification has defined a set of
+	   			specify its on-the-wire message behavior as a policy
+				expression that conforms to the Web Services Policy 1.5 - Framework [<bibref ref="WS-Policy"/>]
+				and Web Services Policy 1.5 - Attachment [<bibref ref="WS-PolicyAttachment"/>] specifications.
+				The Web Services Policy 1.5 - Attachment specification has defined a set of
 	   			subjects and an extensible mechanism for attaching policies
 	   			to web services subjects. When a web service provider
 	   			chooses to make its capabilities and constraints available,
-	   			it may also need to conform to requirements of other policy
-	   			specifications it utilizes ( i.e., WS-SecurityPolicy).
+	   			the provider may also need to conform to requirements of other policy
+	   			assertion specifications it utilizes ( i.e., WS-SecurityPolicy).
            		</p>
 				<p>When deploying services with policies it is useful for providers to anticipate how
            		to evolve their services capabilities over time.  If
@@ -1857,6 +1857,14 @@
 						<td>Formatted examples in <specref ref="compact-full"/> and <specref ref="scenario"/>. 
 						</td>
 					</tr>									
+					<tr>
+						<td>20061219</td>
+						<td>TIB</td>
+						<td>Editorial revision: most parts of editorial action
+							<loc href="http://www.w3.org/2005/06/tracker/wspolicyeds/actions/96">96</loc>.
+							Remaining editorials to be reviewed.
+						</td>
+					</tr>
 				</tbody>
 			</table>
 		</inform-div1>

Received on Wednesday, 20 December 2006 06:24:39 UTC