- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Wed, 18 Apr 2007 10:21:50 -0400
- To: Web Security Context WG <public-wsc-wg@w3.org>
- Message-ID: <OFF2A28039.A02EE85C-ON852572C1.004E8536-852572C1.004EEA38@LocalDomain>
We should certainly not be reinventing any requirements wrong. In
wsc-usecases, we shouldn't be putting forward any requirements or
recommendations at all. And we should not at any stage re-state
requirements from another WG (since they, not we, are the cannonical
source of them).
I propose we remove this text:
Access to security information beyond what is available through the
recommended presentation may be desireable in many scenarios, such
as debugging. User agents are encouraged to provide this access, but
in a way that does not interfere with the recommended presentation.
I think I was one of the few people really hot on keeping debugging
scenarios in mind. From a product perspective, they're incredibly
important from a Total Cost of Ownership point of view. I'll syphon my
energy on this point to
http://www.w3.org/2006/WSC/wiki/FuturesAndOnePluses
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
Web Security Context Issue Tracker <dean+cgi@w3.org>
Sent by: public-wsc-wg-request@w3.org
04/15/2007 10:54 AM
Please respond to
Web Security Context WG <public-wsc-wg@w3.org>
To
public-wsc-wg@w3.org
cc
Subject
ISSUE-40: Drill-down access to all security information is not \'nice,\'
it\'s required (by UAAG 1.0). (public comment)
ISSUE-40: Drill-down access to all security information is not 'nice,'
it's required (by UAAG 1.0). (public comment)
http://www.w3.org/2006/WSC/Group/track/issues/40
Raised by: Bill Doyle
On product: Note: use cases etc.
>From public comments
raised by: Al Gilman Alfred.S.Gilman@ieee.org
http://lists.w3.org/Archives/Public/public-usable-
authentication/2007Apr/0000.html
Drill-down access to all security information is not 'nice,' it's required
(by
UAAG 1.0).
where it says, in (non-goals) 3.1 Presentation of all security information
Access to security information beyond what is available through the
recommended presentation may be desireable in many scenarios, such
as debugging. User agents are encouraged to provide this access, but
in a way that does not interfere with the recommended presentation.
you must change
This statement is too weak. Mention and link the fact that access to all
this
information is required by UAAG 1.0, Guideline 2.
Why?
The User Agent Accessibility Guidelines 1.0 is already a Recommendation.
The
current work is not chartered to undercut its requirements. Don't
re-invent
this requirement wrong; just pass through the relevent authoritatve
requirement.
Received on Wednesday, 18 April 2007 14:22:01 UTC