-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Launcher App proposal #47
Conversation
Put in proposals folder |
Nice! Could the launcher app also just edit the ACL files? So then there would basically be no spec changes needed, right? |
The Launcher App could edit the ACL files, though it could also delegate the task to a wACL editor app. But I am not sure why the Launcher App being or not able to edit files would mean that there would be no spec changes. I suppose it depends which spec changes :-) There are quite a few things that would need to be spec-ed out, such as defining AppIds, vocabularies to tell the app where it should or not authenticate which apps too, where to publish AppKeys (if needed), etc.... |
I was referring to how your proposal seems to rely on the app launcher keeps keys and issues or signs tokens. If the goal is purely that to decide which access a launched or "installed" app gets, then why not just store that information in |
There are a number of advantages of having the launcher app over relying on the
Having said that the The Launcher App then can provide many additional services for the user.
|
Re your first point 3 (individuation of a User/App instance pair), that sounds promising, nice! That may be a reason to change how our bearer tokens work, yes. But to make that work, the launcher app would need some sort of server-side secret, right? Otherwise the first person to use the launcher app would get access to whatever secret the launcher app uses to produce those signatures? And yes, our existing So until then I think it would also be interesting to explore how we can build a launcher app that works with the current spec (i.e., one that just edits the |
The Launcher App can securely create public/private keys and store the private key in the browser storage using JS Crypto API. I implemented that 4 years ago or so to test it. It can be done in a way that it is impossible to ever see the private key. But yes, one should try to first get the Launcher App to work with some simple code (trying that now) and then with existing protocols, to see how far one can go with it. |
This is a full (but initial) description of a Launcher App, that plays the role of an Admin App and a KeyChain for all the other apps as discussed in #45 .
It comes with three sections to address the Problems Solved, the Use Cases and the Success Criteria set by the Panel.
A lot of pieces relating to ontologies and other parts of the acl ecosystem would need then to be worked on for it to be able to address all issues the panel wanted to address.
Much more could be done if COWL were developed further in browsers and if it were to taking into account this use case.