afs commented on PR #1291: URL: https://github.com/apache/jena/pull/1291#issuecomment-2568415414
Closing due to age and the fact a lot has changed in Fuseki. The context needs are possibly addressed by work that happened after this PR. For the more general issues raised by [JENA-2339](https://issues.apache.org/jira/projects/JENA/issues/JENA-2339) / PR #1441 where control of security is made external to Fuseki, there is now a 3rd party system for Jena -- rdf-abac (https://github.com/telicent-oss/rdf-abac) which puts the policy control concern outside of the Fuseki engine that might be applicible to the use case. It provides per-quad filtering of data coming out of a TDB2 database. A query operation only gets to see RDF data that it is permitted to see by policy. Each per gets a request specific dynamic view of the RDF data so query execution is only based on permitted data. The policy engine is accessed at request time. For text query, either check for triples (and hence security permissions) after text index access or enhance the text search service to apply system-wide policies hared with the graph database. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
