-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use case: group membership vc #157
Conversation
55bea43
to
c752221
Compare
Co-authored-by: Ted Thibodeau Jr <tthibodeau@openlinksw.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Really good use case, just a few nitpicky grammar suggestions
Co-authored-by: Justin Bingham <justin.bingham@janeirodigital.com>
Once we have this UC merged I will create Issue where we can iron out how Credentials and Capabilities could interplay in this scenario. |
In the discussion on capabilities in issue 160 @elf-pavlik made a refinement to the use case which improves it a lot.
I responded:
|
I've changed store front to projects A, B and C to make it little more specific and fit other project oriented scenarios. In #160 we are also discussing it with variant of Acme having distinct teams and wanting to have granular control which Acme team can access which Omni project. |
Co-authored-by: Ted Thibodeau Jr <tthibodeau@openlinksw.com>
This use case presents scenario of group based access which doesn't require public group member list. Neither party granting access maintaining their own list of members in group they grant access to.
EDIT: https://solid.github.io/authorization-panel/wac-ucr/#capabilities-vc provides more complicated use case which depends on existence of broader trust network. Use case in this PR only requires membership credential issued by a known party. It also directly addresses known issues with group based access where list of group members is not accessible to the guard enforcing access policy.