- Notifications
You must be signed in to change notification settings - Fork 305
Description
WebID is based on the notion that a WebID is a HTTP URI that identifies an Agent.
WebID-TLS is an authentication protocol that authenticates a WebID based an TLS-handshake enhancement that looks up profile claims in a WebID-Profile doc discovered via the WebID placed in the SAN of an X.509 Cert used in a successful TLS-handshake.
All of the above holds true when I use a SoLiD POD deployed using a solid-sever instance that supports the WebID-TLS protocol.
The above doesn't happen if I use a SoLiD POD deployed using a solid-server instance that supports the WebID-OIDC protocol. The following block code pretty much ensures the problem in question.
allowsSessionFor (userId, origin){// Allow no user or an empty origin if (!userId || !origin) return true // Allow the server's main domain if (origin === this.serverUri) return true // Allow the user's subdomain const userIdHost = userId.replace(/([^:/])\/.*/, '$1') if (origin === userIdHost) return true // Disallow everything else return false } Links
[1] https://solid.openlinksw.com:8443 -- WebID-TLS (with optional Delegation support) IdP
[2] https://kidehen3.solid.openlinksw.com:8443 -- WebID-TLS (plus optional Delegation support) POD
[3] https://solid.openlinksw.com:8444 -- WebID-OIDC IdP
[4] https://kidehen7.solid.openlinksw.com:8444 -- WebID-OIDC POD