@@ -73,7 +73,7 @@ documents called *Access Control List Resources* (or simply *ACLs*).
7373The WAC system assumes that web documents are placed in hierarchical containers
7474or folders. For convenience, users do not have to specify permissions on each
7575individual resource -- they can simply set permissions on a container, add a
76- [ ` acl:defaultForNew ` ] ( #default-inherited-authorizations ) predicate, and have all
76+ [ ` acl:default ` ] ( #default-inherited-authorizations ) predicate, and have all
7777of the resources in that container [ inherit] ( #acl-inheritance-algorithm ) those
7878permissions.
7979
@@ -164,13 +164,13 @@ A request (to read or write) has arrived for a document located at
164164 ` /documents/papers/ ` container (in which the document resides) has its own
165165 ACL resource (here, ` /documents/papers/.acl ` ). If it finds that, the server
166166 reads each authorization in the container's ACL, and if any of them contain an
167- ` acl:defaultForNew ` predicate, the server will use them (as if they were
167+ ` acl:default ` predicate, the server will use them (as if they were
168168 specified in ` paper1.acl ` ). Again, if any such authorizations are found, the
169169 process stops there and no other statements apply.
1701703 . If the document's container has no ACL resource of its own, the search
171171 continues upstream, in the * parent* container. The server would check if
172172 ` /documents/.acl ` exists, and then ` /.acl ` , until it finds some authorizations
173- that contain ` acl:defaultForNew ` .
173+ that contain ` acl:default ` .
1741744 . Since the root container (here, ` / ` ) MUST have its own ACL resource, the
175175 server would use the authorizations there as a last resort.
176176
@@ -320,9 +320,6 @@ of *all* agents (the general public). For example:
320320 acl:accessTo <https://alice.databox.me/profile/card>. # to the public profile
321321```
322322
323- Note that this is a special case of ` acl:agentClass ` usage, since it doesn't
324- point to a Class Listing document that's meant to be de-referenced.
325-
326323### Authenticated Agents (Anyone logged on)
327324
328325Authenticated access is a bit like public access
@@ -488,9 +485,9 @@ be able to change their access levels at a later point (since they retain
488485As previously mentioned, not every document needs its own individual ACL
489486resource and its own authorizations. Instead, one can can create an
490487Authorization for a container (in the container's own ACL resource), and then
491- use the ` acl:defaultForNew ` predicate to denote that any resource within that
488+ use the ` acl:default ` predicate to denote that any resource within that
492489container will * inherit* that authorization. To put it another way, if an
493- Authorization contains ` acl:defaultForNew ` , it will be applied * by default* to
490+ Authorization contains ` acl:default ` , it will be applied * by default* to
494491any resource in that container.
495492
496493You can override the default inherited authorization for any resource by
@@ -512,16 +509,12 @@ An example ACL for a container would look something like:
512509 acl:Write,
513510 acl:Control;
514511
515- # defaultForNew says: this authorization (the statements above)
512+ # default says: this authorization (the statements above)
516513 # will also be inherited by any resource within that container
517514 # that doesn't have its own ACL.
518- acl:defaultForNew <https://alice.databox.me/docs/>.
515+ acl:default <https://alice.databox.me/docs/>.
519516```
520517
521- ** Note:** The ` acl:defaultForNew ` predicate will soon be renamed to
522- ` acl:default ` , both in the specs and in implementing servers. The semantics, as
523- described here, will remain the same
524-
525518## See also
526519
527520[ Background on CORS] ( https://solid.github.io/web-access-control-spec/Background )
0 commit comments