- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Wed, 26 Jan 2022 14:46:02 -0500
- To: public-webid@w3.org
- Message-ID: <c733f9a4-28fd-7826-9702-95933138b8e8@openlinksw.com>
On 1/26/22 1:53 AM, Henry Story wrote: > >> On 26. Jan 2022, at 00:58, Kingsley Idehen <kidehen@openlinksw.com> wrote: >> >> On 1/25/22 6:08 PM, Nathan Rixham wrote: >>> On Tue, Jan 25, 2022 at 10:58 PM Kingsley Idehen <kidehen@openlinksw.com> wrote: >>> On 1/25/22 4:29 PM, Nathan Rixham wrote: >>>> On Tue, Jan 25, 2022 at 9:23 PM Kingsley Idehen <kidehen@openlinksw.com> wrote: >>>> On 1/25/22 1:28 PM, Nathan Rixham wrote: >>>>> Would a fair definition of a valid WebId then be something like: A URI is a valid WebIdentifier if it dereferences to a valid WebId-Profile describing the URI with the minimum set of required properties (type, name, public_keys)? >>>> A WebID is a resolvable identifier that denotes an agent. It resolves to a WebID Profile Document. >>>> >>>> How do you know it's a WebID before you resolve it? >>> Good question! >>> >>> By deciding the want to denote yourself using a given identifier, relative to your profile document. >>> >>> Let me rephrase, and suggest looking at it the other way around: given a random IRI <y> how do I know <y> is a webid / refers to an Agent, without first resolving it? and as a sub point, is a "valid" webid? >> >> You know it is a WebID because the spec says its is a URI that denotes an Agent. That's it, really :) >> Hi Henry, > You used to know it’s a WebID because we had the cert ontology that related the WebID to a public Key. That isn't how I recall it. Again, we don't want to conflate things since the following are distinct: 1. WebID 2. WebID-Profile Document 3. WebID-TLS Protocol -- which is informed by an Ontology > The core purpose of having a WebID was to tie it into the WebID-TLS authentication scheme. It is/was a puzzle-piece for solving a larger puzzle i.e., identity authenticity that scaled to both the Internet and Web. The ultimate goal was that we could finally build solutions that loosely-coupled 1. Identity 2. Identification 3. Authentication 4. Authorization 5. Storage Basically, the puzzle-pieces that enable a Read-Write Web (RWW) based on existing open standards. Kingsley > > For me that authentication piece has now moved over to using the IETFS ”Signing HTTP Messages”. > I have an implementation in Scala https://github.com/bblfish/httpSig that compiles to JS and Java > and am working on the authentication part. > > Now WebID is still key in the Solid ecosystem as a way to tie together many different identifiers > for agents, links to their apps, their stores, etc… So that community is a very important user of > WebIDs with many deployed systems and apps. Changes would need to empirically work out how it chimes > with what is deployed there. > > Henry > > > -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Home Page: http://www.openlinksw.com Community Support: https://community.openlinksw.com Weblogs (Blogs): Company Blog: https://medium.com/openlink-software-blog Virtuoso Blog: https://medium.com/virtuoso-blog Data Access Drivers Blog: https://medium.com/openlink-odbc-jdbc-ado-net-data-access-drivers Personal Weblogs (Blogs): Medium Blog: https://medium.com/@kidehen Legacy Blogs: http://www.openlinksw.com/blog/~kidehen/ http://kidehen.blogspot.com Profile Pages: Pinterest: https://www.pinterest.com/kidehen/ Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen Twitter: https://twitter.com/kidehen Google+: https://plus.google.com/+KingsleyIdehen/about LinkedIn: http://www.linkedin.com/in/kidehen Web Identities (WebID): Personal: http://kingsley.idehen.net/public_home/kidehen/profile.ttl#i : http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Wednesday, 26 January 2022 19:46:18 UTC