@@ -73,7 +73,7 @@ documents called *Access Control List Resources* (or simply *ACLs*).
73
73
The WAC system assumes that web documents are placed in hierarchical containers
74
74
or folders. For convenience, users do not have to specify permissions on each
75
75
individual resource -- they can simply set permissions on a container, add a
76
- [ ` acl:defaultForNew ` ] ( #default-inherited-authorizations ) predicate, and have all
76
+ [ ` acl:default ` ] ( #default-inherited-authorizations ) predicate, and have all
77
77
of the resources in that container [ inherit] ( #acl-inheritance-algorithm ) those
78
78
permissions.
79
79
@@ -164,13 +164,13 @@ A request (to read or write) has arrived for a document located at
164
164
` /documents/papers/ ` container (in which the document resides) has its own
165
165
ACL resource (here, ` /documents/papers/.acl ` ). If it finds that, the server
166
166
reads each authorization in the container's ACL, and if any of them contain an
167
- ` acl:defaultForNew ` predicate, the server will use them (as if they were
167
+ ` acl:default ` predicate, the server will use them (as if they were
168
168
specified in ` paper1.acl ` ). Again, if any such authorizations are found, the
169
169
process stops there and no other statements apply.
170
170
3 . If the document's container has no ACL resource of its own, the search
171
171
continues upstream, in the * parent* container. The server would check if
172
172
` /documents/.acl ` exists, and then ` /.acl ` , until it finds some authorizations
173
- that contain ` acl:defaultForNew ` .
173
+ that contain ` acl:default ` .
174
174
4 . Since the root container (here, ` / ` ) MUST have its own ACL resource, the
175
175
server would use the authorizations there as a last resort.
176
176
@@ -320,9 +320,6 @@ of *all* agents (the general public). For example:
320
320
acl:accessTo <https://alice.databox.me/profile/card>. # to the public profile
321
321
```
322
322
323
- Note that this is a special case of ` acl:agentClass ` usage, since it doesn't
324
- point to a Class Listing document that's meant to be de-referenced.
325
-
326
323
### Authenticated Agents (Anyone logged on)
327
324
328
325
Authenticated access is a bit like public access
@@ -488,9 +485,9 @@ be able to change their access levels at a later point (since they retain
488
485
As previously mentioned, not every document needs its own individual ACL
489
486
resource and its own authorizations. Instead, one can can create an
490
487
Authorization for a container (in the container's own ACL resource), and then
491
- use the ` acl:defaultForNew ` predicate to denote that any resource within that
488
+ use the ` acl:default ` predicate to denote that any resource within that
492
489
container will * inherit* that authorization. To put it another way, if an
493
- Authorization contains ` acl:defaultForNew ` , it will be applied * by default* to
490
+ Authorization contains ` acl:default ` , it will be applied * by default* to
494
491
any resource in that container.
495
492
496
493
You can override the default inherited authorization for any resource by
@@ -512,16 +509,12 @@ An example ACL for a container would look something like:
512
509
acl:Write,
513
510
acl:Control;
514
511
515
- # defaultForNew says: this authorization (the statements above)
512
+ # default says: this authorization (the statements above)
516
513
# will also be inherited by any resource within that container
517
514
# that doesn't have its own ACL.
518
- acl:defaultForNew <https://alice.databox.me/docs/>.
515
+ acl:default <https://alice.databox.me/docs/>.
519
516
```
520
517
521
- ** Note:** The ` acl:defaultForNew ` predicate will soon be renamed to
522
- ` acl:default ` , both in the specs and in implementing servers. The semantics, as
523
- described here, will remain the same
524
-
525
518
## See also
526
519
527
520
[ Background on CORS] ( https://solid.github.io/web-access-control-spec/Background )
0 commit comments