- From: Frederick Hirsch <frederick.hirsch@nokia.com>
- Date: Mon, 15 Oct 2007 15:02:05 -0400
- To: ext Maryann Hondo <mhondo@us.ibm.com>
- Cc: Frederick Hirsch <frederick.hirsch@nokia.com>, Asir Vedamuthu <asirveda@microsoft.com>, "public-ws-policy@w3.org" <public-ws-policy@w3.org>, public-ws-policy-request@w3.org
- Message-Id: <ABFDD713-4738-4199-8FCD-A579CD3ED6C9@nokia.com>
+1 to Maryann comments. regards, Frederick Frederick Hirsch Nokia On Oct 15, 2007, at 1:05 PM, ext Maryann Hondo wrote: > > Comments inline. > > > > > Asir Vedamuthu <asirveda@microsoft.com> > Sent by: public-ws-policy-request@w3.org > 10/12/2007 10:31 PM > > To > "public-ws-policy@w3.org" <public-ws-policy@w3.org> > cc > Subject > New Issue: 5184 Editorial Changes - Guidelines > > > > > > > These are editorial comments on the Guidelines document at http:// > www.w3.org/TR/2007/WD-ws-policy-guidelines-20070928/ > > Section 3 > > a) s/An assertion is a piece of metadata that describes a > capability related to a specific WS-Policy domain/An assertion is a > piece of metadata that describes a capability related to a specific > domain/ > > > <mh> I don't agree. We are not defining "general assertions" for > any domain, we are defining WS-Policy Assertions which releate to > domains that have chosed to express their capabilities via the WS- > Policy expressions. > </mh> > > > Section 4.1.1 > > b) s/When using the WS-Policy Framework, any Assertion Authors > defining new WS-Policy assertions must adhere to the MUST's and > SHOULD's in the specification and should review the conformance > section of the specification./Assertion authors should review the > conformance sections of the WS-Policy Framework and Attachment > specifications and an assertion must adhere to all the constraints > contained in the Framework and Attachment specifications./ > > Section 5.3 > > c) s/The examples given in this document reference WS-Policy like > WS-SecurityPolicy and WS-RM Policy./The examples given in this > document are based on existing assertions such as WS-SecurityPolicy > and WS-RM Policy./ > > Section 5.3.1 > > d) s/This indicates that there is a relationship between the > assertions./This indicates a consistent set of behaviors./ > > <mh> I disagree. I think "relationship" is the right word.</mh> > > > Section 5.3.2 > > e) s/"To give an example, the WS-ReliableMessaging Policy document > specifies attribute extensibility as part of the XML definition, > allowing the wsp:Ignorable attribute: > Example 5-5. WS-ReliableMessaging Policy use of attribute > extensibility > /wsrmp:RMAssertion/@{any} > This is an extensibility mechanism to allow different {extensible} > types of information, based on a schema, to be passed."// > > The RM policy assertion manifests on the wire, is relevant to > compatibility assessment and cannot be ignored by a requester. > Illustrating the use of ignorable marker on the RM policy assertion > is incorrect. > > > <mh> I thought the idea was to follow the other guidelines > documents which specifically say "an example". I'm confused by this > alternative. It's much more obtuse. what is this last sentence? </mh> > > > > > > > Section 5.3.3 > > f) s/Define message format only/Assertions should not describe > message semantics/ > > Section 5.7.1 > > g) s/If there are multiple instances of a policy assertion type in > the same policy alternative without parameters and nested policies, > these have the same meaning as a single assertion of the type > within the policy alternative./If policy assertion authors did not > specify the semantics of repetition of policy assertions of a type > that allows neither parameters nor nested policy expressions within > a policy alternative, then repetition is simply redundancy, and > multiple assertions of the assertion type within a policy > alternative have the same meaning as a single assertion of the type > within the policy alternative./ > > > <mh> I disagree, the alternative is confusing > > > > h) s/That identification will facilitate the deployment of their > policy assertions and include such information in the assertion > definition./That identification will facilitate the deployment of > their policy assertions./ > > i) s/Assertion Authors should specify the set of relevant WSDL > policy subjects with which the assertion may be associated. For > instance, if a policy assertion is to be used with a WSDL policy > subject - such as service, endpoint, operation and message it > should be stated./Assertion Authors should specify the set of > relevant WSDL policy subjects with which the assertion may be > associated./ > > > <mh> Again, I thought the entire purpose of taking on the template > for guidance was to include examples. Now you seem to want to > remove them, why? > > > > j) s/However such policy attachments to WSDL policy subjects of > broader scope and granularity should be done only after careful > evaluation./The best practice is to choose the most granular WSDL > policy subject to which the behavior represented by a policy > assertion applies./ > > k) s/If the capability may imply different semantics with respect > to attachment points, the Assertion Authors should consider the > following: > Decompose the semantics with several assertions. > Rewrite a single assertion targeting a specific subject./If the > behavior indicated by an assertion varies when attached to > different policy subjects, Assertion Authors should consider > decomposing the assertion into multiple assertions and associate > them to multiple subjects./ > > <mh> I think this is fine the way it is. > > Section 6 > > l) s/Assertion Extensibility/Assertion authors should allow for > extensibility (see best practice 5. Start with a Simple Assertion)/ > > <mh> I don't see this in section 6 > > m) s/Supporting New Policy Subjects/Supporting New Policy Subjects > (see Section 6.3 Supporting New Policy Subjects)/ > > Section 6.1 > > n) s/The contents of the parameter are static and allow reuse in > different security scenarios./The contents of the parameter are > static and may be reused in different security scenarios using > other referencing mechanisms (these are outside the scope of the WS- > Policy Framework)./ > > Regards, > > Asir S Vedamuthu > Microsoft Corporation > > > >
Received on Monday, 15 October 2007 19:16:16 UTC