You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The specification gives an algorithm for finding the appropriate ACL via inheritance but as far as I can see there is no explicit algorithm for finding the authorizations within the ACL document. In the examples it seems that each authorization is 1) given a hash-URI (fragment) in the ACL and 2) is identified with a type triple <#auth-uri> a acl:Authorization. Are either or both of these the requirements for identification of the authorizations within and ACL document?
The specification gives an algorithm for finding the appropriate ACL via inheritance but as far as I can see there is no explicit algorithm for finding the authorizations within the ACL document. In the examples it seems that each authorization is 1) given a hash-URI (fragment) in the ACL and 2) is identified with a type triple
<#auth-uri> a acl:Authorization
. Are either or both of these the requirements for identification of the authorizations within and ACL document?(Context of this question is use of WAC on the Fedora Repository API specification)
The text was updated successfully, but these errors were encountered: