Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify case where storage server acts as oauth client (direct access with web browser) #80

Closed
elf-pavlik opened this issue Jul 6, 2020 · 2 comments

Comments

@elf-pavlik
Copy link
Member

Described in Accessing NonRDF-Sources directly via browser, in which case storage server itself is being used as oauth client. We may need to specify that when storage server is being used as oauth client, it has unconstrained access to all resources it hosts.

@zenomt
Copy link
Contributor

zenomt commented Jul 17, 2020

this is just "log in to this web server with your WebID". for example, this is what happens if you go to

https://zenomt.zenomt.com/testauth/

and then try to load any page that's protected (like check.html).

in my implementation of WAC, every request has an effective origin (even if there's no explicit origin, like with anOrigin header or app ID). in the absence of an explicit Origin for a request authenticated with a cookie, the "same origin" is assumed. there's no implicit permission for the same origin; a resource's ACL MUST grant permission for the same origin for a "local login" to have access to that resource. in my implementation you can say that with acl:origin </>.

@elf-pavlik
Copy link
Member Author

It appears that Solid Protocol will not require support for direct access via a web browser: solid/specification#382

We can reopen this issue if that feature would ever be required.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants