Skip to content

Add condition to authorization evaluation#134

Merged
csarven merged 13 commits intomainfrom
feature/authorization-condition
Apr 22, 2026
Merged

Add condition to authorization evaluation#134
csarven merged 13 commits intomainfrom
feature/authorization-condition

Conversation

@csarven
Copy link
Copy Markdown
Member

@csarven csarven commented Mar 24, 2026

This PR supersedes #133 and closes #81 .


This PR introduces acl:condition as an additional requirement on an acl:Authorization, building on the notion of extensibility previously referenced in the Authorization Extensions section of the specification. The feature rests on a capability detection mechanism: servers that support specific condition types, e.g., acl:IssuerCondition and acl:ClientCondition (specified in this version of the specification), advertise them via Link headers on the effective ACL resource. Clients discover supported condition types from those headers and deploy condition-bearing authorizations accordingly. Condition types not signalled by the server are not used in Authorization Evaluation. When multiple conditions are present, they are conjunctive, i.e., all must be satisfied for an Authorization to be applicable. This mechanism paves the way for additional condition types to be incorporated in the future based on needs and implementations in the ecosystem, e.g., time-based conditions or ODRL policies, as anticipated in Authorization Extensions.

The PR includes the following changes (also included in the #changelog of the specification) with correction classes:

Correction Class Description
1 Amend broken links, style sheets, or invalid markup.
2 Amend language and document details.
4 Add requirements for ACL Resource Condition Discovery.
4 Add Access Conditions section describing the condition requirement in an Authorization.
4 Update Authorization Conformance to include acl:condition as part of an applicable Authorization.
4 Add Condition Evaluation section describing the evaluation of conditions and their conjunctive requirement.
2 Add example query demonstrating access conditions with client condition and issuer condition.
2 Add security consideration advisement for client-issuer-agnostic control scenarios.
2 Add security consideration advisement for condition-unaware server scenarios.
2 Add privacy consideration advisement for client and issuer information exposure.
2 Amend first- and third-party context in security and privacy review.
2 Add note about discovering condition types via effective ACL resource without additional requests.
4 Add Access Condition Extensions section for describing the extension mechanism for new condition types.
2 Add security consideration advisement for preserving Authorization integrity with conditions.

Related TODOs (as separate PRs):

  • Update the ACL vocabulary with the new terms.
  • Update Conformance section to define classes of products and mark advisement levels.
  • ...

Other TODOs:

  • Call for reviews, implementations or commitment to implement.
  • Discuss in the community.

Preview

@csarven csarven added this to the cg-draft milestone Mar 24, 2026
@csarven csarven requested a review from uvdsl March 24, 2026 09:09
@csarven csarven self-assigned this Mar 24, 2026
@csarven csarven force-pushed the feature/authorization-condition branch from f470bc8 to 6e5a2ec Compare March 24, 2026 12:09
Comment thread index.html Outdated
@csarven csarven requested a review from TallTed March 28, 2026 10:31
Copy link
Copy Markdown
Member

@uvdsl uvdsl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you @csarven for putting this together!
I left some inline comments. And here are more general questions:

  1. Do we need to mention the new link header relation in #http-definitions?
  2. Do you consider the section #access-conditions to be appendable? Could we add additional conditions (time, attested attribute, ...) in that section going forward (when consensus is reached in the CG, of course)? Or how do you envision such specification evolution, if at all?

Comment thread index.html Outdated
Comment thread index.html Outdated
Comment thread index.html Outdated
<p id="consider-acl-resource-activities">Implementations are encouraged to use mechanisms to record activities about ACL resources for the purpose of accountability and integrity, e.g., by having audit trails, notification of changes, reasons for change, preserving provenance information.</p>
<p id="consider-provenance-accountability">Implementations that want to allow a class of write or control operations on resources are encouraged to require agents to be authenticated, e.g., for purposes of provenance or accountability.</p>
<p about="" id="consider-client-agnostic-control" rel="spec:advisement" resource="#consider-client-agnostic-control"><span property="spec:statement">Implementations are <span rel="spec:advisementLevel" resource="spec:Encouraged">encouraged</span> to consider scenarios in which Authorizations granting <code>acl:Control</code> are client-agnostic and issuer-agnostic, avoiding inadvertent <a href="#loss-of-control-mitigation" rel="rdfs:seeAlso">loss of control</a> if a client or issuer becomes unavailable or untrustworthy, as well as scenarios in which restricting control access to specific clients or issuers could expose the controller to manipulation through a malicious client or issuer.</span></p>
<p about="" id="consider-condition-legacy" rel="spec:advisement" resource="#consider-condition-legacy"><span property="spec:statement">Implementations are <span rel="spec:advisementLevel" resource="spec:StronglyEncouraged">strongly encouraged</span> to be aware that Authorizations including <code>acl:condition</code> values evaluated by a server without condition support, such as following data migration from a conditions-aware server, could result in elevated access rights. Implementations are strongly encouraged to verify Authorizations with conditions against the condition capabilities of the server prior to deployment.</span></p>
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Implementations are strongly encouraged to verify Authorizations with conditions against the condition capabilities of the server prior to deployment.

Would you consider making this statement normative in the discovery section, to be explicit about the expectation that a client may have about a server's support of authorization conditions? This relates to my above comment on the discovery section.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this statement in particular stands as advisory because it is something deployments should be aware of and not something that's testable as a requirement (at least within the scope of this specification).

I've updated the wording on #client-link-condition to signal the purpose better. #acl-condition also mentions discovery of supported condition types, and as a related matter for servers in #server-condition-evaluation that unrecognised is not part of evaluation.

There is always the possibility that a deployment will mess things up, and that's not limited to downgrading from a WAC 1.1 to 1.0 server meanwhile using the same ACL resources. For instance, even while at WAC 1.1. the server may switch authentication mechanisms or even not provide the necessary information to WAC about issuer/client for instance. Of course, these are all possible and some may be (un)likely. But I think the current text in the specification is adequate.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you, this works for me.

Comment thread index.html Outdated
Comment thread index.html
Copy link
Copy Markdown
Contributor

@TallTed TallTed left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Generally looks OK to me. A few small tweaks to be made.

Note: I have not reviewed with a fine tooth comb. If that is desired, please request another review, preferably with pointer to specific sections about which you're concerned.

Comment thread index.html
<section id="acl-resource-condition-discovery" inlist="" rel="schema:hasPart" resource="#acl-resource-condition-discovery">
<h3 property="schema:name">ACL Resource Condition Discovery</h3>
<div datatype="rdf:HTML" property="schema:description">
<p about="" id="server-link-condition" rel="spec:requirement" resource="#server-link-condition"><span property="spec:statement">When a server wants to enable applications to discover supported condition types (<cite><a href="#access-conditions" rel="rdfs:seeAlso">Access Conditions</a></cite>) for a given <a href="#effective-acl-resource">effective ACL resource</a>, the <span rel="spec:requirementSubject" resource="spec:Server">server</span> <span rel="spec:requirementLevel" resource="spec:MUST">MUST</span> advertise each supported condition type by responding to an HTTP request on the effective ACL resource including a <code>Link</code> header with the <code>rel</code> value of <code>http://www.w3.org/ns/auth/acl#condition</code> and the condition type as link target [<cite><a class="bibref" href="#bib-rfc8288">RFC8288</a></cite>].</span></p>
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My first thought would be to discover it in Storage Description, LWS advertises capabilities this way https://w3c.github.io/lws-protocol/lws10-core/#storage-description-capabilities

Does WAC expect that available conditions may differ across resources in the same storage. In that case it seems that mechanism to manage that variability is left out of scope.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Placing condition signalling in the HTTP response header of the effective ACL resource means clients cannot alter what is supported or enforced for a given resource. Variability across resources is accommodated by the per effective ACL resource discovery and ultimately left to the URI owner to manage as appropriate. How a resource server manages that variability internally is deliberately out of scope, keeping the specification simpler and orthogonal to resource server implementation choices ( #http-interactions ).

csarven and others added 2 commits March 31, 2026 23:55
Co-authored-by: Jesse Wright <63333554+jeswr@users.noreply.github.com>
Co-authored-by: Christoph Braun <braun@kit.edu>
@csarven csarven force-pushed the feature/authorization-condition branch from eb2f500 to cafa174 Compare March 31, 2026 22:01
@csarven
Copy link
Copy Markdown
Member Author

csarven commented Mar 31, 2026

@uvdsl , thanks for co-authoring and reviewing.

Do we need to mention the new link header relation in #http-definitions?

#http-definitions was intended to indicate parts that can be defined or registered elsewhere. Extension relation types (as with http://www.w3.org/ns/auth/acl#condition) don't need to be registered with IANA (as per Web Linking).

Do you consider the section #access-conditions to be appendable? Could we add additional conditions (time, attested attribute, ...) in that section going forward (when consensus is reached in the CG, of course)? Or how do you envision such specification evolution, if at all?

Yes, other condition types can be added to this section given need, consensus, and interest to implement. It should stay consistent with what's intended by #authorization-extensions. (Though I hope that we don't end up extending indefinitely because that'd make WAC more complicated than it was ever intended. Simple > Complex. Easier to add, harder to remove.)

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 1, 2026

Thank you @csarven, this looks good now.

I think the option to add more condition types is valuable, and I agree that proposals must be carefully considered before adding to not end up with an "open registry".

@csarven
Copy link
Copy Markdown
Member Author

csarven commented Apr 1, 2026

We at dokieli Enterprises commit to implementing the client features as described in this PR.

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 1, 2026

I plan to implement checking the client and issuer conditions as well as providing the URLs of supported conditions for servers to advertise in my Java implementation https://github.com/uvdsl/solid-wac-java

@elf-pavlik
Copy link
Copy Markdown
Member

Plans for updating https://github.com/solid-contrib/specification-tests/tree/main/web-access-control
would also be great 🤞

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 1, 2026

@Potherca, would you be interested in supporting client and/or issuer restrictions with WAC in the Nextcloud plugin and the PHP Solid Server? This PR might be of interest to you and your team.

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 1, 2026

@gibsonf1, would you be interested in supporting client and/or issuer restrictions with WAC in your TwinPod? This PR might be of interest to you and your team.

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 1, 2026

@damooo, would you be interested in supporting client and/or issuer restrictions with WAC in Manas? This PR might be of interest to you.

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 1, 2026

@woutermont, given that you implemented such checks for clients in the past, or maybe also @joachimvh, would you be interested in supporting client and/or issuer restrictions with WAC in CSS?

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 1, 2026

@bourgeoa, would you be interested in supporting client and/or issuer restrictions with WAC in NSS? This PR might be of interest to you.

melvincarvalho added a commit to melvincarvalho/web-access-control-spec that referenced this pull request Apr 3, 2026
Changes from PR solid#134:

- Fail-closed evaluation: unsupported condition types make the
  Authorization non-applicable (instead of being silently ignored)
- Write-time validation: server SHOULD respond 422 when ACL contains
  unsupported condition types
- Monotonicity: adding a condition can only restrict access, never expand
- Migration safety: less-capable servers deny rather than expand access

All other aspects of PR solid#134 are preserved: condition syntax,
capability discovery, Client/Issuer conditions, conjunctive evaluation.
@melvincarvalho
Copy link
Copy Markdown
Member

I have published a fail-closed variant building on PR #134:

https://melvincarvalho.github.io/web-access-control-spec/

This is a work in progress. It incorporates acl:condition with the same syntax and condition types proposed here, but with fail-closed evaluation semantics that prevent silent privilege expansion. Servers must opt in to these guarantees, and it is positioned as a 2.0 major version rather than a minor update.

The diff from PR #134 is ~10 lines. Contributions and review are welcome.

melvincarvalho#1

@csarven
Copy link
Copy Markdown
Member Author

csarven commented Apr 3, 2026

Expanding on my clarification from the public-solid mailing list ( https://lists.w3.org/Archives/Public/public-solid/2026Mar/0034.html ):

Thank you for the exhaustively outlined review and the offer to help, both are appreciated.

To clarify the two cases:

  1. A WAC 1.1 server will only evaluate the condition types it supports and signals. Unsupported condition types are ignored in the evaluation. See #server-link-condition, #server-condition-evaluation, #server-condition-evaluation-conjunctive.

  2. A WAC 1.0 server has no knowledge of acl:condition, in the same way it has no knowledge of rdfs:label or any other predicate outside its evaluation scope. Unknown predicates have always been outside WAC's evaluation. WAC 1.1 conforming clients are required to discover supported condition types before relying on them. See #client-link-condition.

The RDF graph remains monotonic throughout: triples are added, not retracted. The normative requirements above address mitigation at the specification level, beyond advisory. An ACL moved to a WAC 1.0 server is in the same position as any ACL containing predicates that server does not evaluate, which has always been the case.

@melvincarvalho
Copy link
Copy Markdown
Member

rdfs:label has no authorization semantics. acl:condition does. Ignoring a label is safe. Ignoring a security constraint is not.

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 3, 2026

There is indeed a risk - as I had pointed out in a comment to my PR myself. But this risk exists in WAC 1.0 already :

The described issue boils down to managing client expectations: Only if a client expects that a condition is honored, but the server does not support it, then there is "elevation of access" as perceived by the client. This is not perceived by the server because the server has no such external expectation.

But this is already possible in WAC 1.0. Take our work from 2021 for example, see data model section. WAC 1.0 allows for such extensions, see here. So, if I use my client from the 2021 work on a regular WAC 1.0 server, then the thus client-supplied rule with the time constraint will also not "fail-close" in the sense as desired by @melvincarvalho.

At the core of this risk is the client's expectation "how much" access a server is allowed to grant based on the client-supplied rule. And if the server does not fulfill this expectation, then it is an elevation of access rights in the sense that the "excess access right" was not intended to be granted by the client.

But indeed, a conforming 1.1 client does mitigate this risk because a conforming 1.1 MUST discover the supported conditions and security considerations outline secure behavior.

The argument that a WAC 1.0 server will grant more access than intended if a condition is present is simply based on the false expectation that the condition MUST apply. This assumption is false because WAC 1.0 does not require supporting custom conditions (neither does 1.1). So, I argue that this then is not the server's fault that it grants more access than desired by a client. It is the client's fault for supplying a rule to a server that lacks the functionality to enforce it. And this is already present in WAC 1.0 (as exemplified by our 2021 work).

I am not saying that this risk does not exist, but rather that this risk is already present in WAC 1.0 and we are addressing this risk, the missing client expectation guidance, with this PR for WAC 1.1.


On your draft for WAC 2.0, @melvincarvalho, which could and maybe should have been suggested changes to this PR:

Your changes do not address the exact issue you outline but considering backwards compatability. That is, that a WAC 1.0 server would ignore unsupported conditions and grant "too much" access. Your proposal exhibits the exact same problem.

If you really wanted to mitigate that problem once and for all, WAC-next MUST use a different namespace than WAC 1.0. I have outlined in this comment a proposal for CWAC with sufficient formal grounding. However, in the discussion we reached the rough consensus that is reflected in this PR at hand.

@melvincarvalho
Copy link
Copy Markdown
Member

@uvdsl Thank you for the detailed response. I've restored your author credit, apologies for the oversight.

On the technical point: you're right that neither proposal can fix WAC 1.0 servers retroactively. The difference is what happens on servers that implement the new spec:

  • 1.1: a conforming server silently ignores unsupported conditions. The spec permits this.
  • 2.0: a conforming server treats unsupported conditions as non-applicable. The spec requires this.

The migration risk from 1.0 is identical for both, agreed. But 2.0 ensures that every server implementing the spec is fail-closed by default. 1.1 does not.

@uvdsl
Copy link
Copy Markdown
Member

uvdsl commented Apr 3, 2026

@melvincarvalho, thank you for acknowledging the above.

In particular, thank you for acknowledging that the behavior of the proposed WAC 1.1 aligns with its predecessor WAC 1.0 where unsupported extensions/conditions might also be ignored. For the changes proposed in this PR at hand, version number 1.1 is thus appropriate.

The above does not take away anything from your concern about the applicability of Authorizations linking to non-supported conditions. I think this comment provides a good summary of what would be required to address this issue. However! Addressing this particular issue of applicability of Authorizations linking to non-supported conditions is out-of-scope for this particular PR. This PR keeps the existing model of WAC 1.0 untouched.

Therefore, I agree that if that model was changed, e.g. with modifications re applicability of Authorizations, then this would constitute a major update to WAC, where a discussion would need to happen (or maybe it already happened in the past?) if that is still WAC or a separate extension / a new mechanism that builds in parts on WAC. However, such significant changes are not proposed in the PR at hand.

I do acknowledge your concerns. At the same time, I believe they are not substantive to the contents of this PR for the reasons outlined above.

That said, absolutely feel free to check whether there already exists an open an issue already voicing your concerns about the applicability of Authorizations linking to non-supported conditions or extension in general in WAC. If non found, feel free to open a corresponding issue. If you do, please link to the discussion in this PR and in #133. Thank you very much for your contribution.

Going forward, there is but one thing I would like to kindly ask you to consider:
Suggest changes in the particular PR to directly discuss the problems on the matter of the proposal, rather than forking the specification because you do not agree with particular wording. This has been a quite disruptive, and it was not a good experience for me today. Thank you.

@melvincarvalho
Copy link
Copy Markdown
Member

@uvdsl Thank you. I appreciate the engagement and take your point about process, I’ll open an issue for the broader discussion about authorization applicability as suggested.

To be clear: the fork is not a rejection of this work. It's a variant that differs by a few lines. The condition types and syntax are something I value. My point is simply that authorization correctness must be enforced at the server, not depend on client expectations, and that requires a breaking change and a new major version.

I'll continue implementing fail-closed semantics in JSS. If the community moves toward that model in future, the spec and implementation are ready.

@elf-pavlik
Copy link
Copy Markdown
Member

CG Reports come with 0 guarantees for stability.
WG drafts start signaling stability with CR promotion.
IMO marking WAC as 1.0 might have been a mistake in a first place.

If adding this functionality will require breaking change and marking WAC as 2.0 I think it is something that should be considered.

I've mostly seen versioned JSON-LD contexts but not versioned vocabularies. It my be worthwhile to document separate from any PR why breaking change in a spec will require new vocab terms, even if just new version of namespace.

@csarven
Copy link
Copy Markdown
Member Author

csarven commented Apr 10, 2026

The changes are additive. Existing WAC 1.0 servers and ACL resources continue to work as before. Nothing in WAC 1.1 makes a conforming WAC 1.0 implementation non-conforming. That is not a breaking change by any standard definition.

The new terms follow the existing patterns in the specification and do not require a new namespace version.

@TallTed
Copy link
Copy Markdown
Contributor

TallTed commented Apr 10, 2026

My standard definition for breaking change includes a change where software and/or data conforming to the newer spec does not have the same interaction with software and/or data also conforming to the newer spec, as it does with software and/or data conforming to the older spec, and vice versa.

Changes, breaking or otherwise, do not come into play when all software and/or data conforms to the newer spec and so interacts only with other software and/or data also conforming to the newer spec, nor when all software and/or data conforms to the older spec and so interacts only with other software and/or data also conforming to the older spec.

The challenge with breaking changes is how to detect that there is a mix of older and newer conformance in a given interaction, especially when conformance with the older spec does not include consideration of such a mix nor even the possibility of the existence of the newer spec. In such a scenario, conformance requirements in the newer spec MUST include some mention of (and hopefully some way of detecting) the possibility of such a mix including its possible impacts, as so the need for such detection, and upon such detection, some way to operate that will not result in loss or (worse!) corruption of data.

A new version of a spec never disrupts software and/or data conforming to the older spec so long as that software and/or data never encounters software and/or data conforming to the newer spec. Likewise, an existing older version of a spec never disrupts software and/or data conforming to the newer spec so long as that software and/or data never encounters software and/or data conforming to the older spec. If you can assure such segregation, life is eaiser for everyone, but as I do not believe we can make such assurance, we must discuss such detection as I've described above, and provide some way to address the impacts of interactions between software and/or data conforming to the mixed versions of the spec.

@csarven
Copy link
Copy Markdown
Member Author

csarven commented Apr 20, 2026

Thanks all for the feedback and discussion!

Ted, your comment was the kind of push I/we needed to map things out a bit further. So, I created a table that looks at the interaction between different classes of products for a closer inspection. It helped me to see certain scenarios better so I updated the PR based on that.

I've updated #consider-condition-legacy to take clients into account, in particular a WAC 1.x client not recognising a condition type or conditions altogether.

Added #consider-condition-control as a security consideration advisement for preserving Authorization integrity as a mitigation against a WAC 1.x client potentially wiping it unintentionally.

Also added the #access-condition-extensions section explaining the extension mechanism for conditions, which was initially derived from the #access-modes-extensions - essentially better outlining how new conditions can be defined and handled.

Product A Product B Requirements Advisements Notes
WAC 1.0 client WAC 1.0 server WAC 1.0 - No change needed
WAC 1.1 client WAC 1.1 server #acl-resource-condition-discovery, #access-conditions, #authorization-conformance, #condition-evaluation, #server-link-condition, #client-link-condition #consider-condition-legacy, #consider-client-issuer-agnostic-control Intended interaction. No change needed.
WAC 1.0 client WAC 1.1 server - - No action needed.
WAC 1.1 client WAC 1.0 server #client-link-condition #consider-condition-legacy No change needed.
WAC 1.0 client ACL 1.0 resource WAC 1.0 - No change needed.
WAC 1.1 client ACL 1.0 resource - - Backwards compatible. No change needed.
WAC 1.0 client ACL 1.1 resource - #consider-condition-legacy, #consider-condition-control Inadvertent condition removal via Control access is a risk.
WAC 1.1 client ACL 1.1 resource (condition type unsupported) #access-condition-extensions - Client processes Authorization without evaluating unrecognised condition.
WAC 1.1 client ACL 1.1 resource (condition type supported) #access-conditions, #condition-evaluation, #match-accessto-agent-mode-conditions - No change needed.
WAC 1.0 server ACL 1.0 resource WAC 1.0 - No change needed
WAC 1.1 server ACL 1.0 resource - - Backwards compatible. No change needed.
WAC 1.0 server ACL 1.1 resource - #consider-condition-legacy Migration risk. Server grants access up to its conformance ceiling.
WAC 1.1 server ACL 1.1 resource #acl-resource-condition-discovery, #condition-evaluation, #authorization-conformance #consider-condition-legacy, #consider-client-issuer-agnostic-control No change needed.
WAC 1.1 server ACL 1.1 resource (migrated from server with different capability) #condition-evaluation #consider-condition-legacy Sub-case of migration risk. Server grants access up to its conformance ceiling.
WAC 1.1 client or server ACL 1.1 resource (client or issuer condition present) #access-conditions #consider-client-issuer-privacy Client and issuer information exposure applies.
Any client or server ACL resource (condition type discovery) #acl-resource-condition-discovery, #condition-discovery-via-effective-acl-resource - No additional HTTP request needed for discovery.

@melvincarvalho
Copy link
Copy Markdown
Member

Thanks @csarven the new sections help clarify the client-side considerations and the extension mechanism.

The server-side evaluation semantics for unsupported condition types remain as before (ignored rather than treated as non-applicable), which is the core security concern. I've opened #135, as requested, to continue that discussion with a concrete proposal.

Copy link
Copy Markdown
Member

@uvdsl uvdsl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@csarven, thank you for clarifying and elaborating. These changes look good for this PR. I think this is sufficient at this stage.

Comment thread index.html Outdated
Co-authored-by: Christoph Braun <braun@kit.edu>
@csarven
Copy link
Copy Markdown
Member Author

csarven commented Apr 22, 2026

Merged following 2026-04-22 Solid CG meeting (Minutes to be published)

@Potherca
Copy link
Copy Markdown

Potherca commented May 5, 2026

@Potherca, would you be interested in supporting client and/or issuer restrictions with WAC in the Nextcloud plugin and the PHP Solid Server? This PR might be of interest to you and your team.

@uvdsl Thanks for the ping, much appreciated.

Yes, we intend to support this in the PHP based Solid Server(s) and the underlying packages.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Client identification

7 participants