Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use case: group membership vc #157

Merged
merged 5 commits into from
Jan 27, 2021
Merged

Conversation

elf-pavlik
Copy link
Member

@elf-pavlik elf-pavlik commented Jan 15, 2021

This use case presents scenario of group based access which doesn't require public group member list. Neither party granting access maintaining their own list of members in group they grant access to.

EDIT: https://solid.github.io/authorization-panel/wac-ucr/#capabilities-vc provides more complicated use case which depends on existence of broader trust network. Use case in this PR only requires membership credential issued by a known party. It also directly addresses known issues with group based access where list of group members is not accessible to the guard enforcing access policy.

@elf-pavlik elf-pavlik added the UCR use cases and requirements label Jan 15, 2021
@elf-pavlik elf-pavlik requested a review from justinwb January 15, 2021 17:27
proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
Co-authored-by: Ted Thibodeau Jr <tthibodeau@openlinksw.com>
Copy link
Member

@justinwb justinwb left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Really good use case, just a few nitpicky grammar suggestions

proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
Co-authored-by: Justin Bingham <justin.bingham@janeirodigital.com>
@elf-pavlik
Copy link
Member Author

Once we have this UC merged I will create Issue where we can iron out how Credentials and Capabilities could interplay in this scenario.

@bblfish
Copy link
Contributor

bblfish commented Jan 23, 2021

In the discussion on capabilities in issue 160 @elf-pavlik made a refinement to the use case which improves it a lot.

@elf-pavlik wrote:

Thinking about variations of #157, Omni Corp. could grant read/write (not control) access to Acme Corp. for project A, B and C. Now Acme wants to delegate read/write access for Project A to team X and read/write access to Project B to team Y.

I responded:

These restrictions are starting to make more sense of your Acme use case. Without them it sounds like Omni is giving access to the entirety of its web site to Acme Corp, suggesting a takeover had just happened.

@elf-pavlik
Copy link
Member Author

elf-pavlik commented Jan 23, 2021

I've changed store front to projects A, B and C to make it little more specific and fit other project oriented scenarios.

In #160 we are also discussing it with variant of Acme having distinct teams and wanting to have granular control which Acme team can access which Omni project.

proposals/wac-ucr/index.bs Outdated Show resolved Hide resolved
Co-authored-by: Ted Thibodeau Jr <tthibodeau@openlinksw.com>
@elf-pavlik elf-pavlik merged commit 975d9a4 into solid:master Jan 27, 2021
@elf-pavlik elf-pavlik deleted the uc-vc-membership branch January 27, 2021 15:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
UCR use cases and requirements
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants