You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p><dfnid="wac">Web Access Control</dfn> (<abbrtitle="Web Access Control">WAC</abbr>) is a decentralized cross-domain access control system providing a way for Linked Data systems to set authorization conditions on HTTP resources using the <dfnid="acl">Access Control List</dfn> (<abbrtitle="Access Control List">ACL</abbr>) model.</p>
373
373
374
-
<pid="wac-overview" rel="schema:hasPart" resource="#wac-overview"><spandatatype="rdf:HTML" property="schema:description">The WAC specification describes how to enable applications to discover <ahref="#authorization">Authorizations</a> associated with a given <ahref="#resource">resource</a>, and to control such policies, as directed by an agent. Server manages the association between a resource and an <ahref="#acl-resource">ACL resource</a>, and applies the authorization conditions on requested operations. Authorizations are described using the <cite><ahref="http://www.w3.org/ns/auth/acl" rel="cito:citesAsAuthority">ACL ontology</a></cite> to express and determine access privileges of a requested resource. Any kind of access can be given to a resource as per the ACL ontology. This specification uses the <ahref="#access-mode">access modes</a> currently defined by the ACL ontology, such as the class of operations to read, write, append and control resources. An Authorization may allow public access to resources or place the requirement for authenticated <ahref="#agent">agents</a>. Resources and agents can be on different origins.</span></p>
374
+
<pid="wac-overview" rel="schema:hasPart" resource="#wac-overview"><spandatatype="rdf:HTML" property="schema:description">The WAC specification describes how to enable applications to discover <ahref="#authorization">Authorizations</a> associated with a given <ahref="#resource">resource</a>, and to control such rules, as directed by an agent. Server manages the association between a resource and an <ahref="#acl-resource">ACL resource</a>, and applies the authorization conditions on requested operations. Authorizations are described using the <cite><ahref="http://www.w3.org/ns/auth/acl" rel="cito:citesAsAuthority">ACL ontology</a></cite> to express and determine access privileges of a requested resource. Any kind of access can be given to a resource as per the ACL ontology. This specification uses the <ahref="#access-mode">access modes</a> currently defined by the ACL ontology, such as the class of operations to read, write, append and control resources. An Authorization may allow public access to resources or place the requirement for authenticated <ahref="#agent">agents</a>. Resources and agents can be on different origins.</span></p>
<p>When a server supports the creation of intermediate containers in the process of creating a resource, the server must match Authorization policies allowing <code>acl:Write</code> on each container.</p>
764
+
<p>When a server supports the creation of intermediate containers in the process of creating a resource, the server must match Authorization rules allowing <code>acl:Write</code> on each container.</p>
765
765
766
-
<p>When a server supports the recursive deletion of a container, the server must match Authorization policies allowing <code>acl:Write</code> on each member resource.</p>
766
+
<p>When a server supports the recursive deletion of a container, the server must match Authorization rules allowing <code>acl:Write</code> on each member resource.</p>
<pid="consider-additional-information-lookups">Servers are strongly discouraged from trusting the information returned by looking up an agent’s WebID for access control purposes. The server operator can also provide the server with other trusted information to include in the search for a reason to give the requester the access.</p>
1053
1053
1054
-
<pid="consider-authorization-integrity-authenticity">Transfer of <ahref="#authorization">Authorizations</a> between a client and server over an open network creates the potential for those policies to be modified or disclosed without proper authorization. The requirements for the WAC protocol discussed in this specification do not include cryptographic protection of Authorization information, because it is assumed that this protection can be provided through HTTP over TLS. The path between client and application may be composed of multiple independent TLS connections, thus for end-to-end integrity and authenticity of content within an HTTP message, implementers can use mechanisms such as <cite><ahref="https://httpwg.org/http-extensions/draft-ietf-httpbis-message-signatures.html" rel="cito:citesAsPotentialSolution">Signing HTTP Messages</a></cite>. For cryptographic proof of Authorizations asserted by agents and protection from undetected modifications, implementers can use mechanisms such as <cite><ahref="https://w3c-ccg.github.io/ld-proofs/" rel="cito:citesAsPotentialSolution">Linked Data Security</a></cite>.</p>
1054
+
<pid="consider-authorization-integrity-authenticity">Transfer of <ahref="#authorization">Authorizations</a> between a client and server over an open network creates the potential for those rules to be modified or disclosed without proper authorization. The requirements for the WAC protocol discussed in this specification do not include cryptographic protection of Authorization information, because it is assumed that this protection can be provided through HTTP over TLS. The path between client and application may be composed of multiple independent TLS connections, thus for end-to-end integrity and authenticity of content within an HTTP message, implementers can use mechanisms such as <cite><ahref="https://httpwg.org/http-extensions/draft-ietf-httpbis-message-signatures.html" rel="cito:citesAsPotentialSolution">Signing HTTP Messages</a></cite>. For cryptographic proof of Authorizations asserted by agents and protection from undetected modifications, implementers can use mechanisms such as <cite><ahref="https://w3c-ccg.github.io/ld-proofs/" rel="cito:citesAsPotentialSolution">Linked Data Security</a></cite>.</p>
1055
1055
1056
1056
<pid="consider-acl-resource-activities">Implementations are encouraged to use mechanisms to record activities about ACL resources for the purpose of accountability and integrity, e.g., by having audit trails, notification of changes, reasons for change, preserving provenance information.</p>
0 commit comments