Skip to content
This repository was archived by the owner on Apr 13, 2022. It is now read-only.

Commit 480385b

Browse files
author
Andrei
committed
Merge pull request #94 from solid/dz_link_to_wac_spec
Link to WAC-spec repo from Authorization section
2 parents c9f6ba2 + 10d2598 commit 480385b

File tree

2 files changed

+7
-47
lines changed

2 files changed

+7
-47
lines changed

README.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -169,8 +169,8 @@ authorization for all its resources.
169169

170170
### Web Access Control
171171

172-
[Web Access Control (WAC)](https://www.w3.org/wiki/WebAccessControl) is a
173-
decentralized system that allows different users and groups various forms of
172+
[Web Access Control (WAC)](https://github.com/solid/web-access-control-spec) is
173+
a decentralized system that allows different users and groups various forms of
174174
access to resources where users and groups are identified by HTTP URIs. The
175175
system is similar to the access control system used within many file systems
176176
except that the documents controlled, the users, and the groups, are all
@@ -182,7 +182,8 @@ member of a group hosted some other server.
182182
Users do not need to have an account (i.e. WebID) on a given server to have
183183
access to documents on it.
184184

185-
**See component spec: [Solid WAC Specification](authz-solid-wac.md)**
185+
**See component spec:
186+
[Solid WAC Specification](https://github.com/solid/web-access-control-spec)**
186187

187188
## Content Representation
188189

authz-solid-wac.md

Lines changed: 3 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -4,47 +4,6 @@
44
[Solid specification](README.md); the parent spec and all its components are
55
versioned as a whole.
66

7-
[Web Access Control (WAC)](https://www.w3.org/wiki/WebAccessControl) is a
8-
decentralized system that allows different users and groups various forms of
9-
access to resources where users and groups are identified by HTTP URIs. The
10-
system is similar to the access control system used within many file systems
11-
except that the documents controlled, the users, and the groups, are all
12-
identified by URIs. Users are identified by WebIDs. Groups of users are
13-
identified by the URI of a class of users which, if you look it up, returns a
14-
list of users in the class. This means a WebID hosted by any server can be a
15-
member of a group hosted some other server.
16-
17-
Users do not need to have an account (i.e. WebID) on a given server to have
18-
access to documents on it.
19-
20-
ACL resources are not publicly listed by the server when browsing files
21-
(typically when doing a GET on an LDP container). However, they can still be
22-
read/written by client apps using the above mentioned ways of writing data.
23-
An ACL resource is advertised through a **Link** header having **rel="acl"** and
24-
can be discovered when doing HTTP GET/HEAD on regular resources. The naming of
25-
an ACL resource is arbitrary and may change from one server implementation to
26-
another.
27-
28-
For example, the container `https://example.org/data/` may have a corresponding
29-
ACL resource with the URI: `https://example.org/data/.acl`. A resource
30-
`https://example.org/data/test` may have a corresponding ACL resource at
31-
`https://example.org/data/test.acl`. The following is an example of a typical
32-
request.
33-
34-
35-
REQUEST:
36-
```http
37-
GET /data/ HTTP/1.1
38-
Host: example.org
39-
```
40-
41-
RESPONSE:
42-
```http
43-
Link: <https://example.org/data/.acl>; rel="acl"
44-
```
45-
46-
WAC policies are applied to resources, instead of RDF triples. This means that
47-
policies can be set for [LDPRs](http://www.w3.org/TR/ldp/#ldpr) as well as for
48-
[LDPCs](http://www.w3.org/TR/ldp/#ldpc). A special case is applied to LDPCs,
49-
where policies can be defined as "default" for everything in a container,
50-
meaning that all the members of that specific container will inherited them.
7+
The Web Access Control (WAC) spec as applies to the Solid project has been
8+
moved to its own separate repo, at:
9+
**https://github.com/solid/web-access-control-spec**

0 commit comments

Comments
 (0)