Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Informal process for PRs
    • Two thumbs-up from sprint members will approve a PR
  • URI constants PR
    • No issues to discuss
  • AccessToClass Handler Interface PR
    • Constant should not be mutable
  • AccessTo handler
    • Peter still needs to implement
  • Example: We have an ACL that points to a resource in Fedora
    • How do we determine if the ACL applies to a resource, and what gets returned?
      • Not the ACL itself but a link header that points to the ACL
      • In the case of multiple ACLs, return a link to the most permissive ACL
  • Do we need an RDF relationship where the resource is the subject and its ACL is the object?
    • We do not - the triple will have the ACL as the subject and the protected resource as the object
  • Are ACLs first-class resources with associated triples, or resources with child hash resources that themselves have associated triples
    • Each ACL will be a first class resource with associated triples
    • Authorization is an rdf:type
    • An ACL resource has an rdf:type of authorization
  • Global vs. collection-based access-to-class ACLs
    • If accessToClass ACLs are global, all access-to-class assertions would need to be in a single ACL
      • Different rules for different collections would not be possible
      • We could get around this by keeping global accessToClass rules at the root node
        • In this way they could be overridden by ACLs at lower level collections
  • Proposal: Associating ACLs with resources
    • Any resource can have a “hasACL” property
    • If a resource has such a property it is used, if not we continue walking up the tree until a relevant ACL is found
  • Proposal: ACLs will be containers with child authorization resources
    • ACL container will not contain any assertions about authorization. It is an aggregation of its children
    • The child authorization resources contain assertions about authorization
    • We traverse the children to determine whether or not a user has access to a resource

08/27

08/28

08/31

09/01

09/02

09/03

  • Fedora Tech Meeting

...