- From: Pierre-Antoine Champin <pierre-antoine.champin@liris.cnrs.fr>
- Date: Mon, 15 Apr 2013 09:26:26 +0200
- To: "ashok.malhotra@oracle.com" <ashok.malhotra@oracle.com>
- Cc: "public-ldp-wg@w3.org" <public-ldp-wg@w3.org>
- Message-ID: <CA+OuRR8_MOb7FJ-QDTjprX0dkU3fajVRfV6ybU5NyXEzyfGp3g@mail.gmail.com>
Hi Ashok, On Sun, Apr 14, 2013 at 12:24 PM, Ashok Malhotra <ashok.malhotra@oracle.com>wrote: > Access Control is a mechanism to enable or deny permissions to entities - > individuals, groups of individuals or organizations - to perform operations > on resources. The entities have to be authenticated and identified > and, perhaps, added to a group. > > In the case of LDP the resources are LDP resources but the access control > may operate at different granularities: RDF documents, named graphs or > individual triples. The operations are read, update, create and delete. > > Access Control will be provided by the storage mechanism and not the LDP > server itself. > This is a very strong statement, and I'm not sure I agree in the general case. All the web applications that I know define their owl ACL above the underlying RDBMS. pa > The access control mechanism isn't in the purview of the LDP standard, so > what can we say about > access control? What can we ask the server to provide? > > 1. How are entities authenticated? Can we require the use of WebID or > OpenID for example? > Can we even recommend that one of these be used? > > LOW BAR: The storage system provides its own mechanism for authenticating > and identifying entities e.g > username/password > HIGH BAR: Storage system accepts a URL which points to a set of > credentials identifying entities. Authorization is orthogonal. > > 2. What is the granularity of access control? > > LOW BAR: RDF documents > HIGH BAR: A regex that identifies individual triples > > OTHER REQUIREMENTS .. We can add these with a SHOULD > > 3. If access is denied, some explanation of why it was denied. For > example, "Could not verify one of user's principals" or "Network problem > during authentication" or "User not authorized to update" > > 4. Ability to discover the access control policy > > -- > All the best, Ashok > >
Received on Monday, 15 April 2013 07:26:59 UTC