- From: Jose Kahan <jose.kahan@w3.org>
- Date: Tue, 9 Dec 2003 18:58:00 +0100
- To: www-xkms@w3.org
Dear all, We're almost there. You'll find here below more information concerning the exit criteria and identification of features at risk and a draft proposal. Each time that a document reaches a new milestone in its move towards recommendation, we have to describe the exit criteria that will allow us to move on to the next milestone. The document should also quote all features at risk. This information will appear in the request to move to CR sent to the Director, and also in the Call for Implementations. Quoting Section 7.4.3 of the Process Document [1]: ------- In the Call for Implementations, the Working Group MAY identify specific features of the technical report as being "features at risk." General statements such as "We plan to remove any unimplemented feature" are not acceptable; the Working Group MUST precisely identify any features at risk. Thus, in response to a Call for Implementations, reviewers can indicate whether they would formally object to the removal of the identified features. ---- I think that the above is clear and fair for building a robust spec. You'll find here below my draft proposal for exit criteria. It gives a general list of all the features that XKMS proposes and how many implementations we need to have. I mostly considered that all the REQUIRED features needed two complete (client/server) implementations whereas the recommended or optional ones would be ok with one complete implementation. If you think that any of those features is at risk, we must specify them as such now. If we don't do so now and want to remove them later, it means we'll have to go back to Last Call, even if it's for a short period. Please send in your feedback. Thanks! [1] http://www.w3.org/2003/06/Process-20030618/tr.html#cfi -jose ---------------- Exit Criteria The XKMS Specification describes two different protocol sets (X-KISS, X-KRSS), a message syntax, as well as three different message processing mechanisms (Synchronous, Asynchronous, Two-Phase Request, Compound Requests and Responses). Moreover, part 2 of the XKMS Specification describes different protocol bindings with security enhancements for the XKMS messages (HTTP, Soap 1.1 and 1.2, SSL/TLS). From this basis, we propose the following exit criteria, where one complete implementation stands for both a client and a server interoperable implementation: * Message processing mechanisms: - A minimum of two complete implementations for all the REQUIRED message processing mechanisms (Synchronous response) - A minimum of one complete implementation for all the RECOMMENDED and OPTIONAL message processing mechanisms (Asynchronous response, Two-Phase protocol) * Message syntax: - For each of the supported message processing mechanisms, a minimum of two complete implementations for all the required and optional elements and attributes defined in Section 3 for the Request and Response messages as well as for the Compound and Status requests (i.e, if an implementation doesn't support Asynchronous processing of messages, it doesn't need to support the Status request elements either, but it does have to return a Result code such as Receiver.Refused) * X-KISS protocol set: - A minimum of two complete implementations for each of the following X-KISS Services: Locate and Validate - A minimum of two complete implementations for all the REQUIRED elements and attributes described in X-KISS message set - A minimum of one complete implementation for all the OPTIONAL elements and attributes described in the X-KISS message set * X-KRSS protocol set: - A minimum of two complete implementations for each of the following X-KRSS services: Register, Reissue, Revoke, and Recover - A minimum of two complete implementations for all the REQUIRED elements and attributes described in X-KRSS message set - A minimum of one complete implementation for all the OPTIONAL elements and attributes described in the X-KRSS message set * Bindings: - A minimum of two complete implementations supporting HTTP Transport and Soap 1.1 encapsulation - A minimum of one complete implementation supporting HTTP Transport and Soap 1.2 encapsulation - A minimum of two complete implementations supporting Exclusive Canonicalization together with XML Signature - A minimum of one complete implementation supporting of each of the following security enhancements: Payload Authentication (levels I and II), TLS Bindings (levels I-III) * Interoperability matrix -The WG will create an interoperability matrix with test cases and document how implementations satisfy those tests. The role of this matrix will be to enumerate each feature of the XKMS protocol and specify which features exist in which implementations and whether interoperability has been demonstrated or not, as proof that we are satisfying the exit criteria.
Received on Tuesday, 9 December 2003 12:58:03 UTC