https://www.w3.org/2019/wot/security#
URI | https://www.w3.org/2019/wot/security#APIKeySecurityScheme |
---|---|
Description |
API key authentication security configuration identified by the term |
Super-classes |
SecuritySchemec |
URI | https://www.w3.org/2019/wot/security#BasicSecurityScheme |
---|---|
Description |
Basic authentication security configuration identified by the term |
Super-classes |
SecuritySchemec |
URI | https://www.w3.org/2019/wot/security#BearerSecurityScheme |
---|---|
Description |
Bearer token authentication security configuration identified by the term |
Super-classes |
SecuritySchemec |
URI | https://www.w3.org/2019/wot/security#ComboSecurityScheme |
---|---|
Description |
A combination of other security schemes identified by the Vocabulary Term |
Super-classes |
SecuritySchemec |
URI | https://www.w3.org/2019/wot/security#DigestSecurityScheme |
---|---|
Description |
Digest authentication security configuration identified by the term |
Super-classes |
SecuritySchemec |
URI | https://www.w3.org/2019/wot/security#NoSecurityScheme |
---|---|
Description |
A security configuration corresponding to identified by the term |
Super-classes |
SecuritySchemec |
URI | https://www.w3.org/2019/wot/security#OAuth2SecurityScheme |
||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Description |
OAuth 2.0 authentication security configuration for systems conformant with [[!RFC6749]], [[!RFC8252]] and (for the
Note that the table below lists these elements as "optional". In fact whether they are mandatory or not depends on the flow. The If multiple flows are available (for example, multiple OAuth 2.0 security schemes with different flows are given for a The device authorization endpoint technically uses a different protocol than the authorization endpoint used by other flows, and it might be possible for a developer to confuse the two. However, since the |
||||||||||||||||
Super-classes |
SecuritySchemec |
URI | https://www.w3.org/2019/wot/security#PSKSecurityScheme |
---|---|
Description |
Pre-shared key authentication security configuration identified by the term |
Super-classes |
SecuritySchemec |
URI | https://www.w3.org/2019/wot/security#SecurityScheme |
---|---|
Description |
Metadata describing the configuration of a security mechanism. The value assigned to the name For all security schemes, any private keys, passwords, or other sensitive information directly providing access should be shared and stored out-of-band and MUST NOT be stored in the TD. The purpose of a TD is to describe how to access a Thing if and only if a Consumer already has authorization, and is not meant be used to grant that authorization. Security schemes generally may require additional authentication parameters, such as a password or key. The location of this information is indicated by the value associated with the name
combo security scheme and allOf . In some cases parameters may not actually be secret but a user may wish to leave them out of the TD to help protect privacy. As an example of this, some security mechanisms require both a client identifier and a secret key. In theory, the client identifier is public however it may be hard to update and pose a tracking risk. In such a case it can be provided as an additional security parameter so it does not appear in the TD.
The names of URI variables declared in a |
Sub-classes |
OAuth2SecuritySchemec BasicSecuritySchemec DigestSecuritySchemec PSKSecuritySchemec BearerSecuritySchemec ComboSecuritySchemec NoSecuritySchemec APIKeySecuritySchemec |
URI | https://www.w3.org/2019/wot/security#allOf |
---|---|
Description |
Array of two or more strings identifying other named security scheme definitions, all of which must be satisfied for access. |
URI | https://www.w3.org/2019/wot/security#authorization |
---|---|
Description |
URI of the authorization server. |
URI | https://www.w3.org/2019/wot/security#oneOf |
---|---|
Description |
Array of two or more strings identifying other named security scheme definitions, any one of which, when satisfied, will allow access. Only one may be chosen for use. |
URI | https://www.w3.org/2019/wot/security#proxy |
---|---|
Description |
URI of the proxy server this security configuration provides access to. If not given, the corresponding security configuration is for the endpoint. |
URI | https://www.w3.org/2019/wot/security#alg |
---|---|
Description |
Encoding, encryption, or digest algorithm. |
URI | https://www.w3.org/2019/wot/security#format |
---|---|
Description |
Specifies format of security authentication information. |
URI | https://www.w3.org/2019/wot/security#identity |
---|---|
Description |
Identifier providing information which can be used for selection or confirmation. |
URI | https://www.w3.org/2019/wot/security#in |
---|---|
Description |
Specifies the location of security authentication information. |
URI | https://www.w3.org/2019/wot/security#name |
---|---|
Description |
Name for query, header, cookie, or uri parameters. |
URI | https://www.w3.org/2019/wot/security#qop |
---|---|
Description |
Quality of protection. |
URI | https://www.w3.org/2019/wot/security#scopes |
---|---|
Description |
Set of authorization scope identifiers provided as an array. These are provided in tokens returned by an authorization server and associated with forms in order to identify what resources a client may access and how. The values associated with a form should be chosen from those defined in an |
https://www.w3.org/2019/wot/security#
http://purl.org/dc/elements/1.1/
http://purl.org/dc/terms/
http://xmlns.com/foaf/0.1/
http://www.w3.org/2002/07/owl#
http://www.w3.org/ns/prov#
http://www.w3.org/1999/02/22-rdf-syntax-ns#
http://www.w3.org/2000/01/rdf-schema#
http://schema.org/
https://schema.org/
http://www.w3.org/2004/02/skos/core#
http://purl.org/vocab/vann/
http://www.w3.org/2003/06/sw-vocab-status/ns#
http://www.w3.org/2001/XMLSchema#
c | Classes |
op | Object Properties |
fp | Functional Properties |
dp | Data Properties |
dp | Annotation Properties |
p | Properties |
ni | Named Individuals |