Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Client Capabilities: Verifiable Credential Proofs vs. Special discoverable prefix in storage #60

Closed
elf-pavlik opened this issue Jan 24, 2020 · 2 comments

Comments

@elf-pavlik
Copy link
Member

elf-pavlik commented Jan 24, 2020

From #59

@zenomt: a document with a URI in an approved (according to the user's profile) location is just as good as a credential signed by an approved (according to the user's profile) issuer, but with no extra cryptography required (and it's a lot simpler).

If DPoP mechanism and verifiable credentials proof use the same crypto, relying on VC proofs doesn't seem like additional implementation complexity. I actually consider it simpler than having some magic location in the storage which can't be listed etc. Anyways I think we can consider separately how capabilities presented by the client can be verified

EDIT: reference to @zenomt's proposal: #48

The URI for the App Authorization document MUST be in (at a sub-path of) an acl:appAuthorizations in the user's profile (otherwise the resource server MUST ignore it):

@zenomt
Copy link
Contributor

zenomt commented Jan 25, 2020

note: i am still -1 on DPoP for Solid.

the point about "no extra cryptography" isn't necessarily about implementation complexity, but about semantic complexity and the actual cryptographic operations that must be carried out.

my main argument for the "App Authorization documents" construction is that, given an identity (and corresponding contents of its profile) and an appid, app-specific authorizations can be implemented with just plain old linked data, independently of how the identity or appid are established (such as by webid-oidc including appid, or by webid-tls with Origin header, or a future mechanism).

@elf-pavlik
Copy link
Member Author

https://solid.github.io/data-interoperability-panel/specification/ represents most advanced work on authorizing solid apps (clients)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants