- From: Henry Story <henry.story@bblfish.net>
- Date: Tue, 13 Jun 2023 11:00:14 +0200
- To: public-webid <public-webid@w3.org>
- Message-Id: <BD195A68-3421-4BBE-911A-E058E2E498CC@bblfish.net>
Hi, I have been working on an Authentication mechanism working purely at the HTTP layer by building just very lightly on the IETFs “Signing HTTP Messages” Specification. I gave a demonstration about it at last Wednesday’s Solid CG meeting, which I recorded and put online. https://twitter.com/bblfish/status/1666547828506742788 Today I presented the @ietf's upcoming HTTPSig protocol (@http_wg) at the @w3c Solid Community Group meeting. I illustrated it by running my #scala crawler on #BigData published as #LinkedData #EventStreams protected with #solidProject access control rules. This is about as… The 🐠 BblFish twitter.com The in development spec, which I need to update is here: https://github.com/bblfish/authentication-panel/blob/sigUpdate/proposals/HttpSignature.md HTTP Sig requires a KeyID URL (which is compatible with the WebID URL and could be placed in the same document), eg as <#me> foaf:name “Alice”; cert:key <#k1> . <#k1> …. I am currently trying to tie this in with the security ontology. Compared to WebID-TLS: + It is much more flexible than client certificate negotation, allowing each resoruce and mode to have its own rules and authentication proof. - it is not built into the browser (but we can do the signing via an intermediary cache and I have some ideas on how to do that in the browser) Henry
Attachments
- text/html attachment: stored
- image/jpeg attachment: M3fN2SQUcBQyhX6e.jpg
Received on Tuesday, 13 June 2023 09:00:33 UTC