Skip to content

Expand section 2 - Concepts. #44

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from
Closed

Expand section 2 - Concepts. #44

wants to merge 1 commit into from

Conversation

dmitrizagidulin
Copy link
Member

apps, desktop apps, constrained apps and IoT devices.
- Clients that have their own identity (bots/services) vs clients that are
always “piloted” by a user (apps)
- “Attended” vs “Unattended” clients
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you provide a description of what his is? Is this not a repeat of the bullet above?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure thing

Copy link
Member

@elf-pavlik elf-pavlik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

few suggestions


- By deployment type: Server-side web apps, in-browser JS web apps, mobile
apps, desktop apps, constrained apps and IoT devices.
- Clients that have their own identity (bots/services) vs clients that are
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Earlier sections suggest that both the user and the client have distinct identity. This section seems to either try to touch (attended / unattended) topic solid/authorization-panel#38 or suggests that bots/services don't need to act on behalf of any user and sometimes themselves stay considered as a user.

(whenever technically possible) a tuple of: *(controller id, client id)*. To
put it another way, for any given action (such as an [authenticated
request]() to a data store), the access control mechanism needs to know _who_
performed the action, and _what software/client_ they were using to perform
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we formulate it in a way which doesn't suggest that client needs to always be attended by the user when making requests. In case of a bot it can make requests on behalf of the user any time, similar some server-side client which periodically checks for updates or even uses subscription mechanism to listen for changes. Nowadays even on device clients can use background-sync to make requests when they detect connectivity available but user may not attend those actions at that moment.
In spirit of considering OAuth2 a delegation framework, I would like to consider expressing both attended and unattended client activities as. client acting on behalf of a user so we get something like:

the access control mechanism needs to know what client (always a software) performs the request and on behalf of who (always a user) that client performs the request.

@dmitrizagidulin
Copy link
Member Author

Closing this PR. The main panel spec has moved in a different direction.
I've archived the original draft of the spec (in this PR) in https://github.com/interop-alliance/multi-rs-did-auth.

@dmitrizagidulin dmitrizagidulin deleted the concepts branch July 13, 2020 14:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants