# Solid Authorization Panel
December 2nd, 2020
## Present
- Emmet T
- Henry S
- Sarven C
- Justin B
- elf Pavlik
- Tom P
## Agenda
* ACP Updates (Emmet T)
* How to work on ACP
* Admin
* neutral Jitsi instance is proposed for all solid spec / panel meetings: https://gitter.im/solid/authentication-panel?at=5fc501ecba0b7a0fc53af86c
* PRs
* Use case for client to discover access privileges: [PR 136](https://github.com/solid/authorization-panel/pull/136)
* Issues
* List of WAC implementations [issue 139](https://github.com/solid/authorization-panel/issues/139)
* WAC-Allow vs Link: rel="..." [issue 141](https://github.com/solid/authorization-panel/issues/141)
* acp:apply* relations are confusing [issue 143](https://github.com/solid/authorization-panel/issues/143)
* From Pavlik - Discuss [OAuth is not User AUthorization](https://www.scottbrady91.com/OAuth/OAuth-is-Not-User-Authorization)
## Minutes
### ACP Updates
Emmet: Have updated documentation around logic of ACP evaluation. Section 4 has been updated:
(Operations are pseudo-typescript)
https://github.com/solid/authorization-panel/blob/master/proposals/acp/enforcement-propagation.md
Going into any of those now will have logic explained in
typescript with comments on relevant / important functions.
### https://github.com/solid/authorization-panel/issues/141
HT: Tension between WAC spec and ACP related to WAC-Allow
ET: Is meant to be a functional replacement for WAC-Allow
### https://github.com/solid/authorization-panel/issues/143
HS: Can this be simplified?
### https://github.com/solid/authorization-panel/issues/139
HS: Try to get / track down as many WAC implementations / implementors involved as possible
JB: Also should track down those who have created some custom authz systems when WAC was not sufficient and get roadblocks documented.