4
4
5
5
** Disclaimer: this is a living spec. Expect it to change often!**
6
6
7
- ** Current Spec version:** ` v.0.6.1 ` (see [ CHANGELOG.md] ( CHANGELOG.md ) )
7
+ ** Current Spec version:** ` v.0.7.0 ` (see [ CHANGELOG.md] ( CHANGELOG.md ) )
8
8
9
9
## Table of Contents
10
10
@@ -123,9 +123,13 @@ provider or certificate authority.
123
123
124
124
#### WebID-TLS
125
125
126
- Solid currently relies on the [ WebID-TLS
127
- protocol] ( http://www.w3.org/2005/Incubator/webid/spec/tls/ ) as its primary
128
- authentication mechanism. Instead of usernames, it uses WebIDs as unique
126
+ ** Note:** Several browser vendors (Chrome, Firefox) have removed support
127
+ for the ` KEYGEN ` element, on which WebID-TLS relied for in-browser certificate
128
+ generation.
129
+
130
+ Solid uses the [ WebID-TLS
131
+ protocol] ( http://www.w3.org/2005/Incubator/webid/spec/tls/ ) as one of its
132
+ primary authentication mechanism. Instead of usernames, it uses WebIDs as unique
129
133
identifiers, as previously mentioned. And instead of using passwords as bearer
130
134
tokens, it uses cryptographic certificates (stored and managed by the user's web
131
135
browser) to prove a user's identity.
@@ -140,15 +144,20 @@ authenticates them.
140
144
** See component spec:
141
145
[ Solid WebID-TLS Specification] ( authn-webid-tls.md ) **
142
146
143
- #### Alternative Authentication Mechanisms
147
+ #### WebID-OIDC
148
+
149
+ The Solid team is currently implementing support for WebID-OIDC as another
150
+ primary authentication mechanism. It is based on the OAuth2/OpenID Connect
151
+ protocols, adapted for WebID based decentralized use cases.
152
+
153
+ ** See component spec:
154
+ [ WebID-OIDC Specification] ( https://github.com/solid/webid-oidc-spec ) **
155
+
156
+ #### Other Authentication Mechanisms
144
157
145
- There are several other authentication alternatives to WebID-TLS that are
146
- currently being investigated. These include other client-side certificate
147
- management mechanisms such as HTTP-Signatures, OAuth2-based mechanisms such as
148
- IndieAuth, and others (such as combinations of traditional username-and-password
149
- authentication and WebID-TLS Delegation).
150
- See issue [ solid/#22 ] ( https://github.com/solid/solid/issues/22 ) for ongoing
151
- developments.
158
+ There are several other authentication mechanisms that are
159
+ currently being investigated, such as combinations of traditional
160
+ username-and-password authentication and WebID-TLS Delegation).
152
161
153
162
### Secondary Authentication: Account Recovery
154
163
@@ -227,9 +236,7 @@ various social web applications that are part of the ecosystem.
227
236
228
237
### Notifications
229
238
230
- API recommendations for implementing Solid-compatible Notifications are
231
- currently being discussed at [ solid/proposals/Solid Inboxes and
232
- Notifications] ( https://github.com/solid/solid/blob/master/proposals/notifications.md ) .
239
+ ** See component spec: [ Linked Data Notifications] ( https://www.w3.org/TR/ldn/ ) **
233
240
234
241
### Friends Lists, Followers and Following
235
242
@@ -255,9 +262,11 @@ being discussed. TBD.
255
262
** Server Implementations:** See
256
263
[ solid/solid-platform] ( https://github.com/solid/solid-platform#servers ) for a
257
264
list of Solid servers and developer tools.
258
- Note: The Solid team uses [ ldnode] ( https://github.com/linkeddata/ldnode/ ) as
265
+ Note: The Solid team uses
266
+ [ ` node-solid-server ` ] ( https://github.com/solid/node-solid-server ) as
259
267
its main server implementation.
260
268
261
- ** Client App Implementations:** See
262
- [ solid/solid-apps] ( https://github.com/solid/solid-apps ) for an example list of
263
- Apps built using Solid
269
+ ** Client App Implementations:** See
270
+ [ ` solid-client ` ] ( https://github.com/solid/solid-client ) for the main client
271
+ library, and [ solid/solid-apps] ( https://github.com/solid/solid-apps ) for an
272
+ example list of Apps built using Solid.
0 commit comments