- Justin B
- e Pavlik
JB: I like linking from Primer to the relevant parts of the spec.
EP: Any references to definitions should link to the definition in the spec document
JB: I think we can start simple so that people don't get overwhelmed right from the beginning.
EP: I started with my 'non-trivial' example. But yes we can start simple and build up to it.
- Ability to click on a given resource and go to the snippet (like a definition autolink)
- Will use physical containment for the infrastructure of the interop hierarchy (aligning with spec), but will also continue to research how we can get "flatter" over time and further leverage shapetree virtual hierarchy for those purposes
- Include multiple variants of similar scenarios to check if spec covers all those variants (e.g., registration exists during authz or not)
-
Alice and Bob are collaborating on project data, using different apps for project management
-
Explaining the Agent (Alice)
- Explaining Alice's profile document
- Emphasizing privacy focused design (principle of least privilege)
- Talk about the registry set/registry pattern
- (Can also tie-in/link to other parts of the primer where this compartmentalization is demonstrated, e.g., application registration flow)
-
Explaining the Application (Acme Project)
- Explain Application's profile document
- Emphasize that the profile document is a public manifest that agents in the ecosystem can use to help them make decisions about whether to use the app, the access the app needs, how trustworthy the app is, etc.
- (Can tie-in/link-to app registration/authorization workflows where this information is employed)
-
We start with Alice, who has one identity, and one pod that's been bootstrapped
- Profile points to registry sets
- Pod has been provisioned with empty registries
-
Alice wants to manage projects and tasks, and has no project/task data (or data registrations) yet in the pod
-
Alice finds a pod-compatible project management application online
-
Alice goes through the application request's access flow (from the spec)
- Through Alice's Trusted Authz Agent
- Alice registers the app
- App is going to ask for the ability to read/write project data (she has none yet)
- Alice says OK - data registrations are created for that data from authz agent
- Through Alice's Trusted Authz Agent
-
Alice creates a project - makes some tasks, deletes one, changes them
-
Alice shares the project with Bob
- Go through the Controller Shares Access workflows
- Bob gets a receipt pushed to his access inbox
- Bob's trusted authz agent processes it
- Presents the share to him
- Identifies the compatible registered project management application to use (which already has the necessary access to PM data) - he could have the option to use another (like Acme Project), but decides on this one.
- Updates his Remote Data Registry
- Bob loads up his project management app and sees the remote project
- Bob collaborates with Alice in the shared project
- Bob has authorization for app to access shared projects (all, whitelist, blacklist)