authorization-panel icon indicating copy to clipboard operation
authorization-panel copied to clipboard

Github repository for the Solid Authorization Panel

Results 86 authorization-panel issues
Sort by recently updated
recently updated
newest added

I think whatever flows we come up with for granting / changing / revoking authorizations for applications we need clear way to identify those applications. We most likely will represent...

_This issue is to highlight aspects where interaction between issues from the [Authorization Panel](https://github.com/solid/app-authorization-panel) and [Authentication Panel](https://github.com/solid/authentication-panel) come together, and where looking at them together makes issues visible that would...

This is documenting an issue we discussed during today's panel meeting that I think should be highlighted. Currently, access control is handled by the resource server by the `acl`s. The...

I'd like to submit my long-standing patch to WAC for your consideration: https://github.com/solid/web-access-control-spec/pull/37 Since I think cachability is one of the key success criteria for caching, I believe granular metadata...

Of course we'd like a complete formalization of the current WebACL specification (https://github.com/solid/web-access-control-spec), but very specifically we need practical answers for the following questions: - [ ] - A formal...

currently [privilege-request-protocol.md](https://github.com/solid/app-authorization-panel/blob/master/privilege-request-protocol.md) uses `x-permission-request` as a placeholder for the link relation type for the privilege request endpoint URI. let's think of a good link relation type. i believe this should...

help wanted

I believe there's already been a proposal to move trusted apps from the `profile` to the individual `.acl` files. Though, I think "trusted apps" are too use-case specific. It should...

Suppose Alice has a resource on her pod, and gives Bob read access to it. Bob wants to use a web app to view the resource. This is currently allowed...

In the [14 August 2019 meeting](https://hackmd.io/-h49_wR0SYKrIxJvJtql4A) Michael Thornburgh seemed to be working with a number of constraints that should be made explicit so that they can be addressed. The ones...

It could be based on http://openscience.adaptcentre.ie/ontologies/GConsent/docs/ontology