WD-DALI-1.1-20160415
Markus Demleitner
msdemlei at ari.uni-heidelberg.de
Tue Apr 19 10:49:40 CEST 2016
Hi,
On Mon, Apr 18, 2016 at 10:14:24PM +0100, Mark Taylor wrote:
> Pat,
>
> On Mon, 18 Apr 2016, Patrick Dowler wrote:
>
> > I appreciate that the base URL concept looks a lot simpler and we
> > tried to us that concept within CADC and CANFAR... but eventually had
> > to move toward the one proposed. The first sore spot is that
> > VOResource places securityMethod under interface under capablity. That
> > means that for one "feature" defined by a standardID you have one
> > capability and one or more interfaces (possibly) differing by
> > securityMethod.
>
> I agree that VOResource design is not helping here.
Now that you mention it: I'm currently overhauling VOResource in
preparation for having DOIs (and ORCIDs), fixing some minor
annoyances on the way.
While I want to be careful not to break anything that already works,
I'd like to mention that
select distinct(ivoid) from rr.res_detail where detail_xpath like '%securityMethod%';
just yields
ivo://sao.ru/community
ivo://sao.ru/vospace-service
-- both of which look a bit orphaned to me.
So, I'd say if you have better ideas, a point could be made that the
securityMethod design should be changed. The
service/capaility/interface model, on the other hand, is probably
sacrosant at this point.
However, I've always had the feeling securityMethod wasn't a terribly
useful piece of metadata in the first place -- as present now, it
doesn't help in discovery I'd say, since you cannot tell by its
presence whether you'll be able to access the data.
And I've always been a great fan of using authentication that doesn't
work against HTTP. Now, in HTTP, if there's a resource that needs
authentication lists the supported authentication methods in the
headers of the 401 response (WWW-Authenticate, 14.47 of RFC 2616).
You can even include WWW-Authenticate in a 200 response to indicate
that clients that can authenticate get to see more.
So, my (not terribly strong) feeling would be that Mark's
>
> /sync
> /tables
> /capabilities
> /examples
endpoints should simply spit out the proper headers -- they can still
redirect to more specialised endpoints if that makes the software
design simpler.
A client must/could, if it sees a WWW-Authenticate together with a
403/{200,301,303} response from either of these endpoints, ask the
user if she wants to authenticate once and cache the response --
which I think is a reasonable UI.
No discovery is involved; if later people want to assess from the
registry whether a service likely has data readable by them, we'll
have to figure out something going beyond vr:securityMethod anyway.
Admittedly, I've always shyed away from even trying to show different
users different tables on my TAP endpoint. So, it's quite likely I'm
overlooking problems here. But it's a nice dream, no?
Cheers,
Markus
More information about the dal
mailing list