Re: ISSUE-40: Drill-down access to all security information is not \'nice,\' it\'s required (by UAAG 1.0). (public comment)

We should certainly not be reinventing any requirements wrong. In 
wsc-usecases, we shouldn't be putting forward any requirements or 
recommendations at all. And we should not at any stage re-state 
requirements from another WG (since they, not we, are the cannonical 
source of them). 

I propose we remove this text:

   Access to security information beyond what is available through the
   recommended presentation may be desireable in many scenarios, such
   as debugging. User agents are encouraged to provide this access, but
   in a way that does not interfere with the recommended presentation.

I think I was one of the few people really hot on keeping debugging 
scenarios in mind. From a product perspective, they're incredibly 
important from a Total Cost of Ownership point of view. I'll syphon my 
energy on this point to 
http://www.w3.org/2006/WSC/wiki/FuturesAndOnePluses

          Mez

Mary Ellen Zurko, STSM, IBM Lotus CTO Office       (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect




Web Security Context Issue Tracker <dean+cgi@w3.org> 
Sent by: public-wsc-wg-request@w3.org
04/15/2007 10:54 AM
Please respond to
Web Security Context WG <public-wsc-wg@w3.org>


To
public-wsc-wg@w3.org
cc

Subject
ISSUE-40: Drill-down access to all security information is not \'nice,\' 
it\'s required (by UAAG 1.0).  (public comment)








ISSUE-40: Drill-down access to all security information is not 'nice,' 
it's required (by UAAG 1.0).  (public comment)

http://www.w3.org/2006/WSC/Group/track/issues/40

Raised by: Bill Doyle
On product: Note: use cases etc.

>From public comments
raised by: Al Gilman Alfred.S.Gilman@ieee.org

http://lists.w3.org/Archives/Public/public-usable-
authentication/2007Apr/0000.html


Drill-down access to all security information is not 'nice,' it's required 
(by 
UAAG 1.0). 
where it says, in (non-goals) 3.1 Presentation of all security information

   Access to security information beyond what is available through the
   recommended presentation may be desireable in many scenarios, such
   as debugging. User agents are encouraged to provide this access, but
   in a way that does not interfere with the recommended presentation.
you must change
This statement is too weak.  Mention and link the fact that access to all 
this 
information is required by UAAG 1.0, Guideline 2.
Why? 
The User Agent Accessibility Guidelines 1.0 is already a Recommendation. 
The 
current work is not chartered to undercut its requirements.  Don't 
re-invent 
this requirement wrong; just pass through the relevent authoritatve 
requirement. 

Received on Wednesday, 18 April 2007 14:22:01 UTC