Replies: 3 comments 3 replies
-
sighs Stupid half-done github discussions UI doesn't have a mouseover explanation of the little up-arrow beside the title, which suggests there's something preceding this page ... but no, it's some kind of rating or voting system, which only allows an up-vote and doesn't let you UNDO a click (so there's at least one accidental up-vote from me), nor down-vote as should always be possible where there are up-votes. And this is a (meta-)comment, not an answer, but there's no way to add a comment on the question, because github hasn't learned from other discussion and/or q&a sites. I do not think semi-threaded "discussions" add enough benefit to justify moving from "issues". |
Beta Was this translation helpful? Give feedback.
-
For the |
Beta Was this translation helpful? Give feedback.
-
This is related to the question that @elf-pavlik asked on Gitter May 03 2021 21:21 ECT:
So it looks like the Whether we would need something more fine grained like a real Id for the key material, as in the cert ontology, is an open question. |
Beta Was this translation helpful? Give feedback.
-
In the AuthN issue 156: Ontology for KeyID document we came to the conclusion to use the JWK security vocabulary. Alice could then publish her public-key in the document
https://alice.me/keys
The
security:publicKeyJwk
relates theKeyId
<#k>
from Signing HTTP Messages v05, to the JWK signature key and algorithm. Thesecurity:controller
relates theKeyId
to what I believe is the WebID. The json "controller" attribute is given a namespace in the security context vocabulary v2 and especially in the security vocabulary v3. But it is not defined in the security vocab spec - so I opened issue 114 there.Having added this to the AuthN side, we need to look at using it in AuthZ. There are two ways to do this using the above vocabulary elements and the work on Web Access Control ontology.
AC Rule points to WebID
The Guard having verified the keyId would need a link fro Alice's WebID Profile to the KeyID Document. It would need to find the following statement in the WebID Profile
AC Rule indirectly identifying the user by the key
The AC Rule could also indirectly identify the agent via the key as in the following N3,
Note: the
is ... of
construction is N3 syntactic sugar to write an inverse relation.This would not require one to go through a WebID.
It means though that we would be conceiving of the
security:controller
relation as a functional property: every key has one controller agent. There is no textual description on the security vocabulary of what the range of the controller relation is. As @OR13 mentioned in issue 156 above work on the security ontology has gotten stuck in mega thread. So perhaps we should look to some clarification on the meaning of it. In a way the security:controller relation is acting similarly to thecert:key
relation from the cert ontology which is an inverse functional property that relates an agent to a cryptographic key (but without specifying the hashing algorithm).Other considerations?
Beta Was this translation helpful? Give feedback.
All reactions