|
4 | 4 | [Solid specification](README.md); the parent spec and all its components are
|
5 | 5 | versioned as a whole.
|
6 | 6 |
|
7 |
| -[Web Access Control (WAC)](https://www.w3.org/wiki/WebAccessControl) is a |
8 |
| -decentralized system that allows different users and groups various forms of |
9 |
| -access to resources where users and groups are identified by HTTP URIs. The |
10 |
| -system is similar to the access control system used within many file systems |
11 |
| -except that the documents controlled, the users, and the groups, are all |
12 |
| -identified by URIs. Users are identified by WebIDs. Groups of users are |
13 |
| -identified by the URI of a class of users which, if you look it up, returns a |
14 |
| -list of users in the class. This means a WebID hosted by any server can be a |
15 |
| -member of a group hosted some other server. |
16 |
| - |
17 |
| -Users do not need to have an account (i.e. WebID) on a given server to have |
18 |
| -access to documents on it. |
19 |
| - |
20 |
| -ACL resources are not publicly listed by the server when browsing files |
21 |
| -(typically when doing a GET on an LDP container). However, they can still be |
22 |
| -read/written by client apps using the above mentioned ways of writing data. |
23 |
| -An ACL resource is advertised through a **Link** header having **rel="acl"** and |
24 |
| -can be discovered when doing HTTP GET/HEAD on regular resources. The naming of |
25 |
| -an ACL resource is arbitrary and may change from one server implementation to |
26 |
| -another. |
27 |
| - |
28 |
| -For example, the container `https://example.org/data/` may have a corresponding |
29 |
| -ACL resource with the URI: `https://example.org/data/.acl`. A resource |
30 |
| -`https://example.org/data/test` may have a corresponding ACL resource at |
31 |
| -`https://example.org/data/test.acl`. The following is an example of a typical |
32 |
| -request. |
33 |
| - |
34 |
| - |
35 |
| -REQUEST: |
36 |
| -```http |
37 |
| -GET /data/ HTTP/1.1 |
38 |
| -Host: example.org |
39 |
| -``` |
40 |
| - |
41 |
| -RESPONSE: |
42 |
| -```http |
43 |
| -Link: <https://example.org/data/.acl>; rel="acl" |
44 |
| -``` |
45 |
| - |
46 |
| -WAC policies are applied to resources, instead of RDF triples. This means that |
47 |
| -policies can be set for [LDPRs](http://www.w3.org/TR/ldp/#ldpr) as well as for |
48 |
| -[LDPCs](http://www.w3.org/TR/ldp/#ldpc). A special case is applied to LDPCs, |
49 |
| -where policies can be defined as "default" for everything in a container, |
50 |
| -meaning that all the members of that specific container will inherited them. |
| 7 | +The Web Access Control (WAC) spec as applies to the Solid project has been |
| 8 | +moved to its own separate repo, at: |
| 9 | +**https://github.com/solid/web-access-control-spec** |
0 commit comments