[foaf-dev] generating FOAF - dumb or smart?

Peter Williams pwilliams at rapattoni.com
Sun Mar 2 22:09:57 GMT 2008


Concerning Twinkle and access controls:

Setting the JRE/JDK system proxy allows control to be stripped from the app=
lication. In my case, my (scriptable) client-side proxy now responds to the=
 SPARQL server's authentication challenge.

For fun, I went beyond having the proxy respond to the 401 basic authentica=
tion Challenge. I had the server issue an openid2 challenge. The (scriptabl=
e, extensible) proxy provides the responding openid2 assertion back - to au=
thenticate and authorize the already delivered SPARQL request. (*)

Its probably important that the security model for SPARQL is standard and b=
ased on the communication layer rather than the information layer, ontlogie=
s or data model . It obviously should not be based on any proprietary (secu=
rity) features specific to the SPARQL client, the RDF library, or the  VM (=
.NET, JRE, etc)


(*) To be truthful it redirects to the openid assertion agent, which itself=
 redirects through a chain of SAML agents which do std authentication and a=
thorization processing. But, noone know this - it "looks like" openid.

If I summarize

1. I can generate FOAF files by template
2. I can generate FOAF streams by SPARQL CONSTRUCT
3. I can generate FOAF individuals from rdfs:subproperty, rdfs:subclass inf=
erences (using OWL Full)
4. I can impose an agent-centric websso security model, with comsec semanti=
cs

With this, I think I have most of the infrastructure in place to now focus =
on Henry's problem: impose access controls on properties. =


For that, I assume ill need a "community-endorsed" ontology for expressing =
an overlay of access control "security" facets on top of the object/data ty=
pes associated with particular RDFS properties.

Peter.


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D
.
  JAVA: java
.
  JAVA_OPTS: -Dprogram.name=3Drun.bat -DproxySet=3Dtrue -DproxyHost=3Dlocal=
host -DproxyPort=3D8888 -Xms128m -Xmx512m
.
  CLASSPATH:
.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D


From: Leigh Dodds
Sent: Sat 2/23/2008 10:53 AM
To: Peter Williams
Cc: foaf-dev at lists.foaf-project.org
Subject: Re: [foaf-dev] generating FOAF - dumb or smart?


>  Meantime, I got tired of using http basic auth to the SPARQL server. (Ne=
ver did get
> Twinkle2.0 to talk to my http endpoint accepting SPARQL protocol, which r=
equired at least
> basic auth - as there is no obvious way to configure the twinkle client a=
gent for security).

Thats because the 2.0 version doesn't support access control on SPARQL
endpoints. I've been waiting for the recent ARQ release, which
includes some changes I requested to the API. One of those was having
a bit more control over the construction of the endpoint URL
parameters than was previously available. I need that particular
change to support endpoints with access tokens.

So the 2.1 release which I'll hopefully have time for next week should
include the feature you need.

L.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.usefulinc.com/pipermail/foaf-dev/attachments/20080302/829=
c109a/attachment.htm


More information about the foaf-dev mailing list