This HTML5 document contains 119 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n20http://ods.openlinksw.com/dataspace/services/wiki/
n47http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/js14.
n30http://docs.openlinksw.com/virtuoso/rdfsparql.html#
n21http://rdfs.org/sioc/services#
n19http://ods.openlinksw.com/dataspace/dav#
n42http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/js18.
dchttp://purl.org/dc/elements/1.1/
n49http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/https2a.
n11http://ods.openlinksw.com/dataspace/owiki/wiki/ODS/ODSWebIDIdP/sioc.
n7https://virtuoso.openlinksw.com/download/
n18https://foaf.me/simpleLogin.
dctermshttp://purl.org/dc/terms/
n16http://ods.openlinksw.com/dataspace/person/owiki#
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n28http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http1.
atomhttp://atomowl.org/ontologies/atomrdf#
n43http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/js15.
n26http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http3.
n6http://ods.openlinksw.com/dataspace/person/dav#
n45http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/https3.
n36http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http5.
n34http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http7.
n31http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http9.
n52http://id.myopenlink.net/ods/webid_verify.
xsdhhttp://www.w3.org/2001/XMLSchema#
n37http://docs.openlinksw.com/virtuoso/rdfsparql.
n2http://ods.openlinksw.com/dataspace/owiki/wiki/ODS/
siochttp://rdfs.org/sioc/ns#
n14http://ods.openlinksw.com/dataspace/%28NULL%29/wiki/ODS/
n29http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http1a.
n48http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/https2.
n39http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http3a.
n41http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/js17.
n46http://id.myopenlink.net/ods/webid_demo.
oplhttp://www.openlinksw.com/schema/attribution#
n33http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/https1.
n13http://ods.openlinksw.com/dataspace/owiki/wiki/
n51http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/js19.
n24http://id.myopenlink.net/certgen/.
n53http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/js20.
n32http://docs.openlinksw.com/virtuoso/
foafhttp://xmlns.com/foaf/0.1/
n25http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http2.
n40http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http4.
n17http://esw.w3.org/topic/foaf+
n9http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/
n38http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http6.
siocthttp://rdfs.org/sioc/types#
n35http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/http8.
n15http://test.foafssl.org/cert/
n22http://id.myopenlink.net/certgen/,
n44http://ods.openlinksw.com:80/wiki/main/ODS/ODSWebIDIdP/js16.
n8http://ods.openlinksw.com/dataspace/owiki#
Subject Item
n6:this
foaf:made
n2:ODSWebIDIdP
Subject Item
n20:item
n21:services_of
n2:ODSWebIDIdP
Subject Item
n8:this
sioc:creator_of
n2:ODSWebIDIdP
Subject Item
n13:ODS
sioc:container_of
n2:ODSWebIDIdP
atom:entry
n2:ODSWebIDIdP
atom:contains
n2:ODSWebIDIdP
Subject Item
n19:this
sioc:creator_of
n2:ODSWebIDIdP
Subject Item
n2:ODSSetupSSL
sioc:links_to
n2:ODSWebIDIdP
Subject Item
n2:OdsConfig
sioc:links_to
n2:ODSWebIDIdP
Subject Item
n2:ODSWebIDIdP
rdf:type
atom:Entry sioct:Comment
dcterms:created
2017-06-13T06:06:39.673542
dcterms:modified
2018-04-05T18:07:04.211517
rdfs:label
ODSWebIDIdP
foaf:maker
n6:this n16:this
dc:title
ODSWebIDIdP
opl:isDescribedUsing
n11:rdf
sioc:has_creator
n8:this n19:this
sioc:attachment
n25:png n26:png n28:png n29:png n31:png n33:png n34:png n35:png n36:png n38:png n39:png n40:png n41:png n42:png n43:png n44:png n45:png n47:png n48:png n49:png n51:png n53:png
sioc:content
%META:TOPICPARENT{name="ODSIndex"}% ---+ Delegated WebID Verification Service %TOC% ---++What? A delegated (proxy) service that provides WebID verification to 3rd party HTTP applications. This service currently uses WebIDs based on the following URI schemes: <code>http:</code>, <code>ldap:</code>, <code>mailto:</code>, <code>acct:</code>. Other URI schemes will be added over time. ---++Why? WebID shouldn't require developers and end-users to build every layer of the technology stack en route to exploitation. This service provides a simple URL pattern for existing HTTP applications seeking to verify WebIDs via the WebID verification protocol. ---++How? This service takes the following inputs via URL parameters: * a callback URL (for your actual authentication service endpoint); * optional X.509 certificate for the identity being verified by the calling service. It returns the following payload via URL parameters: * verified WebID; * error: error code if verification fails; * ts: timestamp in ISO 8601 format; * RSA-SHA1 digest (digital signature) of the URL returned to the calling service. ---+++ Examples of using the Web ID Verification Service Endpoint with requesting Web ID authentication Service Endpoint These examples make use of the following endpoints: 1 http://id.myopenlink.net/ods/webid_demo.html -- an authentication service that delegates WebID verification to a proxy service 1 http://id.myopenlink.net/ods/webid_verify.vsp -- actual proxy (delegated) service. ---++++ Prerequisites If you want to use your own Virtuoso instance for this exercise, please ensure the following steps are performed: 1 Start Virtuoso server instance (locally, remote, EC2 AMI, etc. ); 1 Configure an [[ODSSetupSSL][HTTPS Listener]] for handling HTTPS requests from HTTP user agents (clients); 1 Install the [[https://virtuoso.openlinksw.com/download/][ODS Framework VAD package]]; 1 Install the [[https://virtuoso.openlinksw.com/download/][HTML based Certificate Generator VAD package]]; 1 Create an [[ODSGenerateX509Certificate][X.509 Certificate]] with WebID watermark. Otherwise, simply use the live certificate generation service at: http://id.myopenlink.net/certgen/. ---++++ Example 1 1 Go to http://id.myopenlink.net/ods/webid_verify.vsp : %BR%%BR%<img src="%ATTACHURLPATH%/http1.png" />%BR% <img src="%ATTACHURLPATH%/http2.png" />%BR%%BR% 1 Using the form presented, fill in the following: * "Requesting service endpoint:": http://id.myopenlink.net/ods/webid_demo.html * Leave the X.509 certificate input area empty: %BR%%BR% <img src="%ATTACHURLPATH%/http5.png" /> %BR%%BR% <img src="%ATTACHURLPATH%/http6.png" /> 1 Click "Verify". 1 As result you should be redirected to the callback URL and in this case the verification will fail since it doesn't have an X.509 certificate to verify, but a new form is presented due to the effects of the callback URL of the calling service: %BR%%BR% <img src="%ATTACHURLPATH%/http7.png" /> 1 Click on the "Check" button and you will be challenged to presented an X.509 certificate, and if the certificate presented bears a WebID watermark in its Subject Alternative Name (SAN) slot, verification will be successful. %BR%%BR% <img src="%ATTACHURLPATH%/http8.png" /> %BR%%BR% <img src="%ATTACHURLPATH%/http9.png" /> ---++++ Example 2 1 Go to http://id.myopenlink.net/ods/webid_verify.vsp : %BR%%BR%<img src="%ATTACHURLPATH%/http1.png" /> %BR%<img src="%ATTACHURLPATH%/http2.png" />%BR%%BR% 1 Using the form presented, fill in the following: * "Requesting service endpoint:": http://id.myopenlink.net/ods/webid_demo.html * Paste a base64 DER or PEM encoded representation of the X.509 certificate (that has a WebID watermark in its SAN slot) into the X.509 certificate input area: %BR%%BR% <img src="%ATTACHURLPATH%/http3.png" /> <img src="%ATTACHURLPATH%/http3a.png" />%BR%%BR% 1 Click "Verify". 1 As result you should be redirected to the callback URL and in our case the verification is successful - the WebID, Subject, RSA-SHA1 digest (digital signature) of the callback URL returned, and timestamp in ISO 8601 format will be presented. %BR%%BR% <img src="%ATTACHURLPATH%/http4.png" />%BR%%BR% ---+++ Examples Using cURL ---++++ Prerequisites If you want to use your own Virtuoso instance for this exercise, please ensure the following steps are performed: 1 Start Virtuoso server instance (locally, remote, EC2 AMI, etc. ); 1 Configure an [[ODSSetupSSL][HTTPS Listener]] for handling HTTPS requests from HTTP user agents (clients); 1 Install the [[https://virtuoso.openlinksw.com/download/][ODS Framework VAD package]]; 1 Install the [[https://virtuoso.openlinksw.com/download/][HTML based Certificate Generator VAD package]]; 1 Create an [[ODSGenerateX509Certificate][X.509 Certificate]] with WebID watermark. Otherwise, simply use the live certificate generation service at: http://id.myopenlink.net/certgen/. 1 Using the service at: http://id.myopenlink.net/certgen/, export the generated X.509 Certificate and its associated private key to a local PKCS#12 (.p12 of .pfx) file system e.g., the file: "demo.p12" and password: "test"; or simply export to a PEM file. 1 Alternatively, you can achieve the same using OpenSSL utilities by executing the following from the command line: <verbatim> openssl pkcs12 -in demo.p12 -out demo.pem -nodes </verbatim> ---++++Example 1: Call the Web ID Verification Service with Certificate and Callback URL Parameters In this example the cURL command includes the "<code>-E</code>" parameter which provides the X.509 certificate required by the proxy verification service: <verbatim> curl -i -k -E demo.pem:test https://id.myopenlink.net/ods/webid_verify.vsp?callback=http://id.myopenlink.net/ods/webid_demo.html HTTP/1.1 302 Found Server: Virtuoso/06.03.3131 (Linux) x86_64-generic-linux-glibc25-64 VDB Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Date: Mon, 06 Feb 2012 12:55:55 GMT Accept-Ranges: bytes Location: http://id.myopenlink.net/ods/webid_demo.html?webid=http%3A%2F%2Fid.myopenlink.net%2Fdataspace%2Fperson%2Fdemo%23this&ts=2012-02-06T07%3A55%3A55.000011-05%3A00&signature=vVhmk%2Fni1WN%2BEahDdnslPOd%2F8RCXdfdK1Syo4hDrIwCBf%2FDpGIMQjI%2FAhyIZW%2BsvV%2BKlWRBeFsDWyVZjRK6bkx2sC%2B4R4Pj1zH8539p7j8H0j8BLqBV9E3yhVvwTUhf4YdqVbXAzGBVwkuaxpfePWCjFhmvwAtkHH25Mo1wwvCE%3D Content-Length: 0 </verbatim> 1 In case of successful WebID verification, the WebID should be returned, as above: <verbatim> webid=http%3A%2F%2Fid.myopenlink.net%2Fdataspace%2Fperson%2Fdemo%23this </verbatim> 1 Additionally a timestamp in ISO 8601 format should be returned, as above: <verbatim> ts=2012-02-06T07%3A55%3A55.000011-05%3A00 </verbatim> ---++++Example 2: Call the Web ID Verification Service without Certificate and Callback URL Parameters In this example the cURL command excludes the "<code>-E</code>" parameter. Thus, an X.509 certificate isn't presented to the proxy verification service: <verbatim> curl -i -k https://id.myopenlink.net/ods/webid_verify.vsp?callback=http://id.myopenlink.net/ods/webid_demo.html HTTP/1.1 302 Found Server: Virtuoso/06.03.3131 (Linux) x86_64-generic-linux-glibc25-64 VDB Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Date: Mon, 06 Feb 2012 13:02:28 GMT Accept-Ranges: bytes Location: http://id.myopenlink.net/ods/webid_demo.html?error=noCert&ts=2012-02-06T08%3A02%3A28-05%3A00&signature=Kp99KHmQwv8Ar7R4L5Iofh3ZO63uPUkZu%2FZiS%2FUz%2BF8pdXMQiS4Mjy5vH3WGkqCGLLrEJv1Rth%2BTfZ7TXohtwNrIveZR6jIymLYyacaTY70VZ6Em%2B6SbJxuE3mzfKlmEOeKGIZQkDQcn67PjI2TQ42830ybXjobDr9t9DoNZTHE%3D Content-Length: 0 </verbatim> 1 In case of any error, the service returns "<code>error=..</code>" as it is in our example showing there is no certificate to verify: <verbatim> error=noCert </verbatim> cURL showcases how the client of a WebID authentication client and proxy service can exchange messages using REST patterns via HTTP. ---+++ Client Using the Web ID Verification Service Sample Scenarios The following examples include Virtuoso PL (VSP), JavaScript, and PHP variants. Each has as part of their prototype (or call signature) an Address (a URL) that is used by the <code>webid_verify.vsp</code> service. ---++++ Virtuoso Server Pages (VSP) Example This example presents a VSP client leveraging service with an X.509 Cert bearing a standard http: scheme URI re. its SAN hosted WebID watermark. * View the code [[ODSWebIDIdPVSPEx1][here]]; * <b>Note</b>: The VSP pages can be tested/used both in case they are located in OS file system / or DAV. [[ODSWebIDIdPVSPModify][See more details]]. Trying the service via <b>http</b>: 1 Access http://&lt;cname&gt;/ods/webid/webid_demo.vsp: %BR%%BR%<img src="%ATTACHURLPATH%/js14.png" />%BR%%BR% 1 Click the "Check" button. 1 As a result you should be challenged to present an certificate that has WebID watermark: %BR%%BR%<img src="%ATTACHURLPATH%/js15.png" />%BR%%BR% 1 Click "Ok". 1 As a result you should be redirected to a page with URL including the signature and timestamp REST pattern parameters, and in case of successful authentication, you should be presented the WebID extracted value and timestamp in ISO 8601 format: %BR%%BR%<img src="%ATTACHURLPATH%/js16.png" />%BR%%BR% ---++++ Javascript Example This example presents a JavaScript client leveraging service with an X.509 Cert bearing a standard http: scheme URI re. its SAN hosted WebID watermark. * View the code [[ODSWebIDIdPJScriptEx1][here]]; * <b>Note</b>: The Javascript pages can be tested/used both in case they are located in OS file system / or DAV. [[ODSWebIDIdPJavascriptModify][See more details]]. Trying the service via <b>http</b>: 1 Access http://&lt;cname&gt;/ods/webid/webid_demo.html : * Note: Optionally you can hatch "Check Certificate Expiration": %BR%%BR%<img src="%ATTACHURLPATH%/js17.png" />%BR%%BR% 1 Click the "Check" button. 1 As a result you should be challenged to present an certificate that has WebID watermark: %BR%%BR%<img src="%ATTACHURLPATH%/js15.png" />%BR%%BR% 1 Click "Ok". 1 As a result you should be redirected to a page with URL including the signature and timestamp REST pattern parameters, and in case of successful authentication, you should be presented the WebID extracted value, Subject, MD5, SHA1 and timestamp in ISO 8601 format: %BR%%BR%<img src="%ATTACHURLPATH%/js18.png" />%BR%%BR% ---++++ PHP Example This example presents a PHP client leveraging service with an X.509 Cert bearing a standard http: scheme URI re. its SAN hosted WebID watermark. * View the code [[ODSWebIDIdPPHPEx1][here]]; * <b>Notes</b>: The PHP pages can be tested/used only when they are located in OS file system. [[ODSWebIDIdPPHPModify][See more details]]. Trying the service via <b>http</b>: 1 Access http://&lt;cname&gt;/ods/webid/webid_demo.php : %BR%%BR%<img src="%ATTACHURLPATH%/js19.png" />%BR%%BR% 1 Click the "Check" button. 1 As a result you should be challenged to present an certificate that has WebID watermark: %BR%%BR%<img src="%ATTACHURLPATH%/js15.png" />%BR%%BR% 1 Click "Ok". 1 As a result you should be redirected to a page with URL including the signature and timestamp REST pattern parameters, and in case of successful authentication, you should be presented the WebID extracted value and timestamp in ISO 8601 format: %BR%%BR%<img src="%ATTACHURLPATH%/js20.png" />%BR%%BR% ---++Related * [[ODSWebIDIdpProxy][Using Virtuoso's WebID Identity Provider (IdP) Proxy Service with an X.509 certificate bearing an LDAP scheme WebID]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtSPARQLEndpointProtection][Safeguarding your Virtuoso-hosted SPARQL Endpoint]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtTipsAndTricksGuideSPARQLEndpointProtection][SPARQL Endpoint Protection Methods Collection]] * [[http://docs.openlinksw.com/virtuoso/][Virtuoso documentation]] * [[http://docs.openlinksw.com/virtuoso/rdfsparql.html#rdfsupportedprotocolendpoint][SPARQL Service Endpoint]] * [[http://docs.openlinksw.com/virtuoso/rdfsparql.html#rdfsupportedprotocolendpointuri][Service Endpoint Security]] * [[http://docs.openlinksw.com/virtuoso/rdfsparql.html#sparqwebservicetbl][Managing a SPARQL Web Service Endpoint]] * [[http://docs.openlinksw.com/virtuoso/rdfsparql.html][SPARQL]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtTipsAndTricksGuide][Virtuoso Tips and Tricks Collection]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtSPARQLDET][SPARQL Endpoint DET Configuration Guide]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtSPARQLSecurityWebID][WebID Protocol & SPARQL Endpoint ACLs Tutorial]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtOAuthSPARQL][SPARQL OAuth Tutorial]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtTipsAndTricksGuideSPARQLEndpoints][Securing SPARQL endpoints]] * [[OdsSPARQLAuth][SPARUL over SPARQL using the http://cname:port/sparql-auth endpoint]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtAuthServerUI][Virtuoso Authentication Server UI]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtSPARQLSSL][Manage a SPARQL-WebID based Endpoint]] * [[VirtODSSecurityWebID][WebID Protocol Support in OpenLink Data Spaces]]. * Manage ODS Datadspaces Objects WebID Access Control Lists (ACLs): * [[ODSBriefcaseWebID][ODS Briefcase WebID based ACL Guide]] * [[ODSBriefcaseWebIDPerson][Person Entity WebID based ACL Guide]] * [[ODSBriefcaseWebIDGroup][Group Entity WebID based ACL Guide]] * [[ODSBriefcaseWebIDPublic][Public WebID based ACL Guide]] * [[ODSFeedManagerWebIDACL][ODS Feed Manager WebID based ACL Guide]] * [[ODSFeedManagerWebIDACLPerson][Person Entity Specific ACL]] * [[ODSFeedManagerWebIDACLGroup][Group Entity Specific ACL]] * [[ODSFeedManagerWebIDACLPublic][Public Specific ACL for anyone with a WebID]] * [[ODSCalendarWebIDACL][ODS Calendar WebID based ACL Guide]] * [[ODSCalendarWebIDACLPerson][Person Entity Specific ACL]] * [[ODSCalendarWebIDACLGroup][Group Entity Specific ACL]] * [[ODSCalendarWebIDACLPublic][Public Specific ACL for anyone with a WebID]] * [[ODSBookmarksWebIDACL][ODS Bookmark Manager WebID based ACL Guide]] * [[ODSBookmarksWebIDACLPerson][Person Entity Specific ACL]] * [[ODSBookmarksWebIDACLGroup][Group Entity Specific ACL]] * [[ODSBookmarksWebIDACLPublic][Public Specific ACL for anyone with a WebID]] * [[ODSAddressBookWebIDACL][ODS Addressbook WebID based ACL Guide]] * [[ODSAddressBookWebIDACLPerson][Person Entity Specific ACL]] * [[ODSAddressBookWebIDACLGroup][Group Entity Specific ACL]] * [[ODSAddressBookWebIDACLPublic][Public Specific ACL for anyone with a WebID]] * [[ODSPkiSetup][Guide for Set up a X.509 certificate issuer and HTTPS listener and generate ODS user certificates]] * [[ODSSetupSSL][Configure Virtuoso+ODS instance as an X.509 Certificate Authority and HTTPS listener]] * [[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/VirtSetupSSL][Configure Virtuoso instance as an X.509 Certificate Authority and HTTPS listener]] * [[VirtODSPubSubHub][Setting up PubSubHub in ODS]] * [[VirtPubSubHub][PubSubHubBub Demo Client Example]] * [[VirtFeedPubSubHub][Feed subscription via PubSubHub protocol Example ]] * [[VirtPubSubHubACL][Setting Up PubSubHub to use WebID Protocol or IP based control lists]] * [[OdsKeyImport][CA Keys Import using Conductor]] * [[ODSGenerateX509Certificate][Generate an X.509 Certificate hosted WebID Guide]] * [[ODSGenerateWebIDX509CertOSKeystore][Generate an X.509 Certificate (with a WebID watermark) to be managed by host operating system keystore]] * [[ODSGenerateWebIDX509CertBrsKeystore][Generate an X.509 Certificate (with a WebID watermark) to be managed by a browser-based keystore]] * [[ODSBriefcaseWebIDShareFile][ODS Briefcase WebID Protocol Share File Guide]] * [[http://esw.w3.org/topic/foaf+ssl][WebID Protocol Specification]] * [[https://foaf.me/simpleLogin.php][Test WebID Protocol Certificate page]] * [[http://test.foafssl.org/cert/][WebID Protocol Certificate Generation page]]
sioc:id
d7c9ce24376025b414fee3bbc47a6fb1
sioc:link
n2:ODSWebIDIdP
sioc:has_container
n13:ODS
n21:has_services
n20:item
atom:title
ODSWebIDIdP
sioc:links_to
n2:ODSWebIDIdPVSPModify n2:OdsSPARQLAuth n7: n2:ODSWebIDIdPPHPEx1 n9:VirtOAuthSPARQL n9:VirtSPARQLSSL n9:VirtAuthServerUI n9:VirtTipsAndTricksGuideSPARQLEndpointProtection n2:ODSWebIDIdPJavascriptModify n2:ODSWebIDIdPPHPModify n2:ODSWebIDIdPVSPEx1 n2:ODSWebIDIdPJScriptEx1 n2:ODSGenerateWebIDX509CertBrsKeystore n14:JavaScript n14:WebIDs n2:VirtPubSubHub n14:WebID n2:VirtPubSubHubACL n2:ODSBriefcaseWebIDShareFile n2:VirtFeedPubSubHub n15: n17:ssl n18:php n2:ODSAddressBookWebIDACLPerson n2:ODSWebIDIdpProxy n2:OdsKeyImport n2:ODSAddressBookWebIDACLGroup n2:ODSGenerateWebIDX509CertOSKeystore n2:ODSBriefcaseWebIDGroup n2:ODSPkiSetup n2:ODSCalendarWebIDACLPerson n22: n2:ODSGenerateX509Certificate n2:ODSAddressBookWebIDACL n2:ODSAddressBookWebIDACLPublic n2:VirtODSPubSubHub n24: n2:ODSBookmarksWebIDACLGroup n2:VirtODSSecurityWebID n2:ODSBookmarksWebIDACLPublic n2:ODSBookmarksWebIDACL n30:rdfsupportedprotocolendpointuri n30:sparqwebservicetbl n32: n30:rdfsupportedprotocolendpoint n2:ODSBookmarksWebIDACLPerson n9:VirtSetupSSL n37:html n2:ODSCalendarWebIDACLGroup n9:VirtSPARQLEndpointProtection n2:ODSCalendarWebIDACLPublic n46:html n9:VirtSPARQLSecurityWebID n2:ODSFeedManagerWebIDACLPublic n9:VirtTipsAndTricksGuideSPARQLEndpoints n9:VirtTipsAndTricksGuide n9:VirtSPARQLDET n2:ODSCalendarWebIDACL n2:ODSFeedManagerWebIDACLPerson n2:ODSFeedManagerWebIDACLGroup n14:OpenSSL n2:ODSBriefcaseWebIDPublic n2:ODSFeedManagerWebIDACL n2:ODSBriefcaseWebID n52:vsp n2:ODSBriefcaseWebIDPerson
atom:source
n13:ODS
atom:author
n6:this
atom:published
2017-06-13T06:06:39Z
atom:updated
2018-04-05T18:07:04Z
sioc:topic
n13:ODS