-
Notifications
You must be signed in to change notification settings - Fork 6
prior-art: group based access policies #31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
TallTed
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Editorial, relatively minor
|
@TallTed for Wac groups, the predicate is vcard:hasMember, and there is no need for that to be public (TrinPod only makes those triples public if user wants them public) |
Co-authored-by: Ted Thibodeau Jr <tthibodeau@openlinksw.com>
@gibsonf1 are you refering to the case where groups are used as local groups within a security domain? In general case we can have a Vcard group which is hosted on one server, for example |
@elf-pavlik After consultation on the matrix specification channel a couple years ago, we were advised to use vcard:hasMember to capture group members and hierarchies of groups for group access. For example, this group: https://solid-practioners.trinpod.us/i has group members that are not public. In this implementation case (TrinPod), triples are a resource so can have their own acl, and by default triples are private unless given another acl. |
|
@gibsonf1 I understad, still if I set access policy somewhere on |
|
@gibsonf1 — re: #31 (comment) — I'm not sure what writing of mine you were responding to. I had fixed some typos, grammar, and the like, in ways that I did not intend to change meaning. If you can point out the specific change to which you were responding, I can review it more carefully. |
This is a good point - simple solution, when
@TallTed this: "WAC |
Ah, OK. I just fixed the obvious typo of |
Co-authored-by: Ted Thibodeau Jr <tthibodeau@openlinksw.com>
What you suggested doesn't seem to align with the scenario I presented. We probably should check if use cases have similar scenario for group based access policies captured and add olne in case it's missing. I'm just trying to document prior-art in this PR. Not find a solution for long know issues with WAC and group based policies. |
No worries @elf-pavlik , but I think the server reporting if a requestor is a member of a group or not is broader than WAC and not something specific to it. And the issue of members of a group being public or not is also not specific to WAC, but to the implementation. |
If authorization system relies on verifying group membership this way, it seems to me a part of interop, not an implementation choice. |
I would chalk it down as a part of interop that was not worked out yet. (But needs to be) As right now, we (TrinPod) use vcard:hasMember hierarchies to work out permissions and group membership in production, but only on pods that use TrinPod servers as there is no interop yet worked out between server providers. |
|
Those notes are related to this use case: https://w3c.github.io/lws-ucs/spec/#dfn-group-sharing |
Followup to #18 (comment)
It mostly captures what I can recall on group access based policies that was discussed in Solid CG. Most likely incompeate but I hope still useful.