-
Notifications
You must be signed in to change notification settings - Fork 304
Description
WebID is based on the notion that a WebID is a HTTP URI that identifies an Agent.
WebID-TLS is an authentication protocol that authenticates a WebID based an TLS-handshake enhancement that looks up profile claims in a WebID-Profile doc discovered via the WebID placed in the SAN of an X.509 Cert used in a successful TLS-handshake.
All of the above holds true when I use a SoLiD POD deployed using a solid-sever instance that supports the WebID-TLS protocol.
The above doesn't happen if I use a SoLiD POD deployed using a solid-server instance that supports the WebID-OIDC protocol. The following block code pretty much ensures the problem in question.
allowsSessionFor (userId, origin) {
// Allow no user or an empty origin
if (!userId || !origin) return true
// Allow the server's main domain
if (origin === this.serverUri) return true
// Allow the user's subdomain
const userIdHost = userId.replace(/([^:/])\/.*/, '$1')
if (origin === userIdHost) return true
// Disallow everything else
return false
}
Links
[1] https://solid.openlinksw.com:8443 -- WebID-TLS (with optional Delegation support) IdP
[2] https://kidehen3.solid.openlinksw.com:8443 -- WebID-TLS (plus optional Delegation support) POD
[3] https://solid.openlinksw.com:8444 -- WebID-OIDC IdP
[4] https://kidehen7.solid.openlinksw.com:8444 -- WebID-OIDC POD