﻿<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="IssuesToHtml.xsl" title="Generate Issue List"?>
<issues xmlns="http://docs.oasis-open.org/ws-sx/issues/Issues.xsd" xmlns:h="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://docs.oasis-open.org/ws-sx/issues/Issues.xsd Issues.xsd">
  <head>
    <uri>http://docs.oasis-open.org/ws-sx/issues/</uri>
    <title>WS-SX TC Issues List</title>
    <date>Date: 2007/10/17</date>
    <revision>Revision: 82</revision>
    <protocols>
      <protocol name="ws-sc">
        <revision artifact="contrib" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/15978/oasis-wssx-ws-secureconversation-1.0.pdf" />
        <revision artifact="ed-01-r3" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/16287/ws-secureconversation-1.3-spec-ed-01-r03-diff.pdf" />
        <revision artifact="ed-01-r4" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17401/ws-secureconversation-1.3-spec-ed-01-r04.pdf" />
        <revision artifact="ed-01-r5" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17734/ws-secureconversation-1.3-spec-ed-01-r05.pdf" />
        <revision artifact="ed-01-r6" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18840/ws-secureconversation-1.3-spec-ed-01-r06-diff.pdf" />
        <revision artifact="ed-01-r8" stage="ed" href="http://www.oasis-open.org/committees/download.php/20008/ws-secureconversation-1.3-spec-ed-01-r08-diff.pdf" />
        <revision artifact="ed-01-r9" stage="ed" href="http://www.oasis-open.org/committees/download.php/20140/ws-secureconversation-1%203-spec-ed-01-r09-diff.pdf" />
        <revision artifact="cd-01" stage="cd" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/20158/ws-secureconversation-1.3-spec-cd-01.pdf" />
        <revision artifact="cs-01" stage="cs" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/21307/ws-secureconversation-1.3-spec-cs-01.pdf" />
        <revision artifact="v1.3" stage="os" href="http://www.oasis-open.org/specs/index.php#wssecconv1.3" />
      </protocol>
      <protocol name="ws-sp">
        <revision artifact="contrib" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/15979/oasis-wssx-ws-securitypolicy-1.0.pdf" />
        <revision artifact="ed-01-r3" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/16289/ws-securitypolicy-1.2-spec-ed-01-r03-diff.pdf" />
        <revision artifact="ed-01-r5" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf" />
        <revision artifact="ed-01-r6" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17889/ws-securitypolicy-1.2-spec-ed-01-r06.pdf" />
        <revision artifact="ed-01-r7" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18837/ws-securitypolicy-1.2-spec-ed-01-r07.pdf" />
        <revision artifact="ed-01-r8" stage="ed" href="http://www.oasis-open.org/committees/download.php/20012/ws-securitypolicy-1.2-spec-ed-01-r08-diff.pdf" />
        <revision artifact="ed-01-r9" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/20152/ws-securitypolicy-1.2-spec-ed-01-r09-diff.pdf" />
        <revision artifact="ed-01-r10" stage="ed" href="http://www.oasis-open.org/committees/download.php/20578/ws-securitypolicy-1.2-spec-ed-01-r10-diff.pdf" />
        <revision artifact="cd-02" stage="cd" href="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/ws-securitypolicy-1.2-spec-cd-02-diff.pdf" />
        <revision artifact="cs-01" stage="cs" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/23822/ws-securitypolicy-1.2-spec-cs.doc" />
        <revision artifact="v1.2" stage="os" href="http://www.oasis-open.org/specs/index.php#wssecpolv1.2" />
      </protocol>
      <protocol name="ws-trust">
        <revision artifact="contrib" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/15980/oasis-wssx-ws-trust-1.0.pdf" />
        <revision artifact="ed-01-r3" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/16288/ws-trust-1.3-spec-ed-01-r03-diff.pdf" />
        <revision artifact="ed-01-r4" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17403/ws-trust-1.3-spec-ed-01-r04.pdf" />
        <revision artifact="ed-01-r5" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17737/ws-trust-1.3-spec-ed-01-r05-diff.pdf" />
        <revision artifact="ed-01-r7" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18086/ws-trust-1%5B1%5D.3-spec-ed-01-r07-diff.pdf" />
        <revision artifact="ed-01-r8" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18833/ws-trust-1%5B1%5D.3-spec-ed-01-r08-diff.pdf" />
        <revision artifact="cd-01" stage="cd" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/20160/ws-trust-1.3-spec-cd-01.pdf" />
        <revision artifact="cs-01" stage="cs" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/21285/ws-trust-1.3-spec-cs-01.pdf" />
        <revision artifact="v1.3" stage="os" href="http://www.oasis-open.org/specs/index.php#wstrustv1.3" />
      </protocol>
      <protocol name="interop">
        <revision artifact="05" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/19328/ws-sx-interop-ed-05.doc" />
        <revision artifact="10" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/20954/ws-sx-interop-ed-10.doc" />
      </protocol>
      <protocol name="examples">
        <revision artifact="contrib" stage="contrib" href="tbd"/>
        <revision artifact="13" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/23404/ws-sp-usecases-examples-draft-13-02.doc"/>
        <revision artifact="14" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/24008/ws-sp-usecases-examples-draft-14-02.doc"/>
        <revision artifact="15" stage="ed" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/24579/ws-sp-usecases-examples-draft-15-01.doc"/>
      </protocol>
    </protocols>
    <targets>
      <target>spec</target>
      <target>schema</target>
      <target>soap</target>
      <target>wsdl</target>
      <target>policy</target>
      <target>all</target>
      <target>interop</target>
    </targets>
    <states>
      <state>New</state>
      <state>Active</state>
      <state>Pending</state>
      <state>Review</state>
      <state>Deferred</state>
      <state color="#ccc">Closed</state>
      <state color="#ccc">Dropped</state>
    </states>
  </head>
  <issue id="i001" status="Closed">
    <title>
      Revocation versus cancelation of security tokens
    </title>
    <description>
      <h:p>
        The specification is not clear in the difference between revocation and canceling a security token.
      </h:p>
      <h:p>
        Assume the following scenario:<h:br />
        A WS consumer requests a token from a STS and includes the token in a SOAP message sent to the WS provider.
        Now the WS consumer may cancel the token at any point of time. The specification does not state the consequences
        of canceling a token.
      </h:p>
      <h:p>
        During our discussion, we came to following clarification:<h:br />
        The cancel operation is a purely local operation on the STS. After canceling a token, a STS MUST not validate
        or renew the token. A STS MAY initiate the revocation of a token, however, revocation is out of scope of this
        specification and a client MUST not rely on it.
      </h:p>
    </description>
    <protocol revision="contrib">ws-trust</protocol>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00013.html">Martijn DeBoer</origin>
    <owner>Editors</owner>
    <proposal>
      <h:p>
        I'd suggest the following wording for clarification for "chapter 8: Cancel Binding":
      </h:p>
      <h:p>
        <h:b>Cancel</h:b> - When a previously issued token is no longer needed, the Cancel binding can be used to cancel
        the token. <h:i>
          After canceling a token at the issuer, a STS MUST not validate or renew the token. A STS MAY
          initiate the revocation of a token, however, revocation is out of scope of this specification and a client
          MUST NOT rely on it.
        </h:i> If a client needs to ensure the validity of a token, it must validate the token at the
        issuer.
      </h:p>
    </proposal>
    <resolution date="2006-01-11">
      <h:p>
        Proposal 1 accepted on <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00024.html">Jan 11 TC call</h:a></h:p>
      <h:p>
        Moved to review at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00038.html">Jan 18th TC call</h:a> based on changes in ws-trust ed-01-r3
      </h:p>
      <h:p>
        Moved to closed at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00073.html">Jan 25th TC call</h:a>.
      </h:p>
    </resolution>
  </issue>
  <issue id="i002" status="Dropped">
    <title>Signed parts clarifications</title>
    <description>
      Section 5.1<h:br />
      Not clear with signed parts when you sign the body you can't sign the pieces<h:br />
      No way to sign a child element of body, need to use signed elements for that
    </description>
    <protocol revision="contrib">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">First F2F</origin>
    <resolution date="2006-01-11">
      Closed as duplicate of <h:a href="#i011">i011</h:a> on <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00024.html">Jan 11 TC call</h:a></resolution>
    <relid>i011</relid>
  </issue>
  <issue id="i003" status="Closed">
    <title>Use of term "binding" in specs</title>
    <description>Evaluate the use of the term binding in the specs.</description>
    <protocol revision="contrib">ws-sc</protocol>
    <protocol revision="contrib">ws-sp</protocol>
    <protocol revision="contrib">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">First F2F</origin>
    <owner href="mailto:prateek.mishra@oracle.com">Prateek Mishra</owner>
    <proposal date="2006-02-21" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00122.html">
      <h:p>
        Line 228 - Add "Note that services might accept messages containing more
        tokens than those specified in policy" as a second sentence.
      </h:p>
      <h:p>
        Line 229 - Change to read "Any necessary key transport mechanisms"
      </h:p>
      <h:p>
        Line 230 - Change to read "Any required message elements (e.g.
        timestamps) in the wsse:Security header."
      </h:p>
      <h:p>
        Line 233 - Remove this bullet.
      </h:p>
      <h:p>
        Add a new bullet ( after line 232 ) that reads;
      </h:p>
      <h:p>
        "Various parameters, including those describing the algorithms to be
        used for canonicalization, signing and encryption."
      </h:p>
    </proposal>
    <resolution date="2006-02-22" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00124.html">
      Proposal 1 accepted on Feb 22nd TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i004" status="Closed">
    <title>
      Transitive closure spec dependencies
    </title>
    <description>Transitive closure spec dependencies</description>
    <protocol revision="contrib">ws-sc</protocol>
    <protocol revision="contrib">ws-sp</protocol>
    <protocol revision="contrib">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">First F2F</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200608/msg00048.html" />
    <resolution date="2006-08-23" href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00059.html">
      Proposal 1 accepted on August 23rd TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i005" status="Closed">
    <title>OASIS formatted specs</title>
    <description>
      Editors to produce OASIS template formatted version and provide docs before Jan. 11th meeting.
    </description>
    <protocol revision="contrib">ws-sc</protocol>
    <protocol revision="contrib">ws-sp</protocol>
    <protocol revision="contrib">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">First F2F</origin>
    <owner href="mailto:drsecure@ibm.com">Tony Nadalin</owner>
    <resolution date="2006-01-11">
      Editors completed and status changed to review per <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00024.html">Jan 11 TC call</h:a><h:p>
        Moved to closed at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00073.html">Jan 25th TC call</h:a>.
      </h:p></resolution>
  </issue>
  <issue id="i006" status="Closed">
    <title>Adopt errata of SP into initial drafts</title>
    <description>
      Editors to incorporate errata of WS-SP included in the contribution into initial draft before Jan. 11th meeting.
    </description>
    <protocol revision="contrib">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">First F2F</origin>
    <owner href="mailto:drsecure@ibm.com">Tony Nadalin</owner>
    <resolution date="2006-01-11">
      Editors completed and status changed to review per <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00024.html">Jan 11 TC call</h:a><h:p>
        Moved to closed at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00073.html">Jan 25th TC call</h:a>.
      </h:p></resolution>
    <relid>i005</relid>
  </issue>
  <issue id="i007" status="Closed">
    <title>Put schema and wsdl in well identified place</title>
    <description>
      Editors to put schema and wsdl in well identified place.
    </description>
    <protocol revision="contrib">ws-sc</protocol>
    <protocol revision="contrib">ws-sp</protocol>
    <protocol revision="contrib">ws-trust</protocol>
    <target>schema</target>
    <target>wsdl</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">First F2F</origin>
    <owner href="mailto:drsecure@ibm.com">Tony Nadalin</owner>
    <resolution date="2006-01-11">
      Editors completed and status changed to review per <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00024.html">Jan 11 TC call</h:a><h:p>
        Moved to closed at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00073.html">Jan 25th TC call</h:a>.
      </h:p></resolution>
    <relid>i005</relid>
  </issue>
  <issue id="i008" status="Closed">
    <title>
      Need well formed XML examples
    </title>
    <description>
      OASIS requirement<h:br />
      Need to pull out all examples as separate files
    </description>
    <protocol revision="contrib">ws-sc</protocol>
    <protocol revision="contrib">ws-sp</protocol>
    <protocol revision="contrib">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">First F2F</origin>
    <owner>Editors</owner>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Pending on Sept. 6th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Review on Sept. 6th. Edits applied in 
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/20158/ws-secureconversation-1.3-spec-cd-01.pdf">SC CD01</h:a>,
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/20160/ws-trust-1.3-spec-cd-01.pdf">Trust CD01</h:a>, 
      and <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/20152/ws-securitypolicy-1.2-spec-ed-01-r09-diff.pdf">SP ED01-r09</h:a>.
    </resolution>
    <resolution date="2006-09-13" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00035.html">
      Status changed to closed on Sept. 13th TC call.
    </resolution>
  </issue>
  <issue id="i009" status="Closed">
    <title>Support for different key pairs for sign and encrypt in SP</title>
    <description>
      Support for different key pairs for sign and encrypt in SP should be allowed in asymmetric binding.
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00023.html">See discussion thread.</h:a></description>
    <protocol revision="contrib">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">First F2F</origin>
    <owner href="mailto:hlockhar@bea.com">Hal Lockhart</owner>
    <proposal date="2006-02-14" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00057.html">
      <h:p>
        This proposal is intended to allow the Asymmetric Binding to permit the
        use of distinct key pairs for encryption and signing.
      </h:p>
      <h:p>
        Replace the text at the beginning of WS-SP section 8.5:<h:br />
        The AsymmetricBinding assertion is used in scenarios in which message
        protection is provided by means defined in WSS: SOAP Message Security.
        This binding has two binding specific token properties; [Initiator
        Token] and [Recipient Token]. If the message pattern requires multiple
        messages, this binding defines that the [Initiator Token] is used for
        the message signature from initiator to the recipient, and for
        encryption from recipient to initiator. The [Recipient Token] is used
        for encryption from initiator to recipient, and for the message
        signature from recipient to initiator.
      </h:p>
      <h:p>
        With:<h:br />
        The AsymmetricBinding assertion is used in scenarios in which message
        protection is provided by means defined in WSS: SOAP Message Security
        using asymmetric key (Public Key) technology. Commonly used asymmetric
        algorithms, such as RSA, allow the same key pair to be used for both
        encryption and signature. However it is also common practice to use
        distinct keys for encryption and signature, because of their different
        lifecycles.
      </h:p>
      <h:p>
        This binding enables either of these practices by means of four binding
        specific token properties: [Initiator Token], [Recipient Token],
        [Initiator Signature Token], [Initiator Encryption Token], [Recipient
        Signature Token] and [Recipient Encryption Token].
      </h:p>
      <h:p>
        If the same key pair is used for signature and encryption, the
        [Initiator Token] and [Recipient Token] properties are used. If the
        message pattern requires multiple messages, this binding defines that
        the [Initiator Token] is used for the message signature from initiator
        to the recipient, and for encryption from recipient to initiator. The
        [Recipient Token] is used for encryption from initiator to recipient,
        and for the message signature from recipient to initiator.
      </h:p>
      <h:p>
        If distinct key pairs are used for signature and encryption, the
        [Initiator Signature Token], [Initiator Encryption Token], [Recipient
        Signature Token] and [Recipient Encryption Token] properties are used.
        If the message pattern requires multiple messages, the [Initiator
        Signature Token] is used for the message signature from initiator to the
        recipient. The [Initiator Encryption Token is used for the response
        message encryption from recipient to the initiator. The [Recipient
        Signature Token] is used for the response message signature from
        recipient to the initiator. The [Recipient Encryption Token is used for
        the message encryption from initiator to the recipient. Note that in
        each case, the token is associated with the party (initiator or
        recipient) who knows the secret.
      </h:p>
      <h:p>
        Immediately below the text:<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token
        assertions.
      </h:p>
      <h:p>
        Insert:<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorSignatureToken<h:br />
        This assertion indicates a requirement for an Initiator Signature
        Token. The specified token populates the [Initiator Signature Token]
        property and is used for the message signature from initiator to
        recipient.<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorSignatureToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token assertions.<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorEncryptionToken<h:br />
        This assertion indicates a requirement for an Initiator Encryption
        Token. The specified token populates the [Initiator Encryption Token]
        property and is used for the message encryption from recipient to
        initiator.<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorEncryptionToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token assertions.<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientSignatureToken<h:br />
        This assertion indicates a requirement for a Recipient Signature Token.
        The specified token populates the [Recipient Signature Token] property
        and is used for the message signature from recipient to initiator.<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientSignatureToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token assertions.<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientEncryptionToken<h:br />
        This assertion indicates a requirement for a Recipient Encryption
        Token. The specified token populates the [Recipient Encryption Token]
        property and is used for encryption from initiator to recipient.<h:br />
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientEncryptionToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token assertions.
      </h:p>
    </proposal>
    <proposal date="2006-02-27" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00143.html">
      <h:p>
        Replace the text at the beginning of WS-SP section 8.5:
      </h:p>
      <h:p>
        The AsymmetricBinding assertion is used in scenarios in which message
        protection is provided by means defined in WSS: SOAP Message Security.
        This binding has two binding specific token properties; [Initiator
        Token] and [Recipient Token]. If the message pattern requires multiple
        messages, this binding defines that the [Initiator Token] is used for
        the message signature from initiator to the recipient, and for
        encryption from recipient to initiator. The [Recipient Token] is used
        for encryption from initiator to recipient, and for the message
        signature from recipient to initiator.
      </h:p>
      <h:p>
        With:
      </h:p>
      <h:p>
        The AsymmetricBinding assertion is used in scenarios in which message
        protection is provided by means defined in WSS: SOAP Message Security
        using asymmetric key (Public Key) technology. Commonly used asymmetric
        algorithms, such as RSA, allow the same key pair to be used for both
        encryption and signature. However it is also common practice to use
        distinct keys for encryption and signature, because of their different
        lifecycles.
      </h:p>
      <h:p>
        This binding enables either of these practices by means of
        four binding specific token properties:
        [Initiator Signature Token], [Initiator Encryption Token], [Recipient
        Signature Token] and [Recipient Encryption Token].
      </h:p>
      <h:p>
        If the same key pair is used for signature and encryption, then
        [Initiator Signature Token] and [Initiator Encryption Token] will
        both refer to the same token. Likewise [Recipient Signature Token]
        and [Recipient Encryption Token] will both refer to the same token.
      </h:p>
      <h:p>
        If distinct key pairs are used for signature and encryption, then
        [Initiator Signature Token] and [Initiator Encryption Token] will
        refer to different tokens. Likewise [Recipient Signature Token]
        and [Recipient Encryption Token] will refer to different tokens.
      </h:p>
      <h:p>
        If the message pattern requires multiple messages, the [Initiator
        Signature Token] is used for the message signature from initiator to
        the recipient. The [Initiator Encryption Token] is used for the response
        message encryption from recipient to the initiator. The [Recipient
        Signature Token] is used for the response message signature from
        recipient to the initiator. The [Recipient Encryption Token] is used
        for the message encryption from initiator to the recipient. Note that in
        each case, the token is associated with the party (initiator or
        recipient) who knows the secret.
      </h:p>
      <h:p>
        Replace the text;
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorToken<h:br />
        This assertion indicates a requirement for an Initiator Token.
        The specified token populates the [Initiator Token] property and
        is used for the message signature from initiator to recipient,
        and encryption from recipient to initiator.
      </h:p>
      <h:p>
        With:
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorToken<h:br />
        This assertion indicates a requirement for an Initiator Token.
        The specified token populates the [Initiator Signature Token] and
        [Initiator Encryption Token] properties and is used for the message
        signature from initiator to recipient, and encryption from
        recipient to initiator.
      </h:p>
      <h:p>
        Replace the text:
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientToken<h:br />
        This assertion indicates a requirement for a Recipient Token.
        The specified token populates the [Recipient Token] property and
        is used for encryption from initiator to recipient, and for the
        message signature from recipient to initiator.
      </h:p>
      <h:p>
        With:
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientToken<h:br />
        This assertion indicates a requirement for a Recipient Token.
        The specified token populates the [Recipient Signature Token] and
        [Recipient Encryption Token] properties and is used for encryption
        from initiator to recipient, and for the message signature from
        recipient to initiator.
      </h:p>
      <h:p>
        Immediately below the text:
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token
        assertions.
      </h:p>
      <h:p>
        Insert:
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorSignatureToken<h:br />
        This assertion indicates a requirement for an Initiator Signature
        Token. The specified token populates the [Initiator Signature Token]
        property and is used for the message signature from initiator to
        recipient.
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorSignatureToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token assertions.
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorEncryptionToken<h:br />
        This assertion indicates a requirement for an Initiator Encryption
        Token. The specified token populates the [Initiator Encryption Token]
        property and is used for the message encryption from recipient to
        initiator.
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:InitiatorEncryptionToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token assertions.
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientSignatureToken<h:br />
        This assertion indicates a requirement for a Recipient
        Signature Token. The specified token populates the [Recipient Signature
        Token] property
        and is used for the message signature from recipient to initiator.
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientSignatureToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token assertions.
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientEncryptionToken<h:br />
        This assertion indicates a requirement for a Recipient Encryption
        Token. The specified token populates the [Recipient Encryption Token]
        property and is used for encryption from initiator to recipient.
      </h:p>
      <h:p>
        /sp:AsymmetricBinding/wsp:Policy/sp:RecipientEncryptionToken/wsp:Policy<h:br />
        The policy contained here MUST identify one or more token assertions.
      </h:p>
    </proposal>
    <resolution date="2006-03-01" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00010.html">
      Proposal 2 accepetd on March 1st TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i010" status="Closed">
    <title>Proof of possesion for security intermediaries</title>
    <description>
      How does a security intermediary presents a sec token? How does it provide proof of possession
      of that token in the current message structure? See <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/doc00001.doc">security agent use cases (.doc link)</h:a>.
      <h:p>
        Continuing discussion:<h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00016.html">msg00016</h:a><h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00044.html">msg00044</h:a><h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00050.html">msg00050</h:a><h:br /></h:p></description>
    <protocol revision="contrib">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00018.html">Prateek Mishra</origin>
    <owner href="mailto:prateek.mishra@oracle.com">Prateek Mishra</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00050.html" />
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Proposal 1 accepted on March 15th TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17403/ws-trust-1.3-spec-ed-01-r04.pdf">
      Revision 4 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i011" status="Closed">
    <title>WS-SX Charter XPath reqts and WS-SecurityPolicy use of XPath (5.1, 5.2) appear in conflict</title>
    <description>
      <h:p>
        The <h:a href="http://www.oasis-open.org/committees/wss/charter.php">WS-SX Charter</h:a> states on lines 212-222 (red-lined version from WS-SX F2F):<h:br /></h:p>
      <h:p>
        <h:i>
          "This work will specifically define the following: <h:br />
          1. Mechanism for specifying what parts of the message must <h:br />
          be secured, called protection assertions <h:br />
          a. Such protection assertions must be able to specify <h:br />
          integrity requirements at both the element and <h:br />
          header/body level in a security policy binding <h:br />
          (defined below) neutral manner. <h:br />
          b. Such protection assertions must be able to specify <h:br />
          confidentiality requirements at both the element and <h:br />
          header/body level in a security policy binding <h:br />
          (defined below) neutral manner. <h:br />
          c. Such mechanisms must not require the use of XPath [21] <h:br />
          but may provide it as an option." <h:br /></h:i>
      </h:p>
      <h:p>
        I think this clearly states that a mechanism will be defined that is
        able to specify integrity and confidentiality requirements at an
        element level without using XPath.
      </h:p>
      <h:p>
        However, section 5.1 of WS-SecurityPolicy states:
      </h:p>
      <h:p>
        <h:i>
          "5.1 Integrity Assertions<h:br />

          Two mechanisms are defined for specifying the set of
          message parts to integrity protect.
          One uses QNames to specify either message headers or
          the message body while the other uses XPath expressions
          to identify any part of the message."
        </h:i>
      </h:p>
      <h:p>
        A similar introduction exists in section 5.2 and in both sections the
        followup text elaborates consistent with introductions.
        My interpretation is that this is inconsistent with part c of the quoted
        text from the charter above, because neither mechanism allows the
        the addressing at the element level without XPath (the first does not
        allow element addressing at all, the second uses XPath).
        Finally, what raised my concern in the first place was that I was looking
        for an element-specific non-XPath mechanism, which I thought would
        be described in section 5.1.1.  I read the text several times, but only
        at the meeting when it was stated that SignedParts only applied to
        the Body as a whole did I realize that the text then was consistent.
        However, if only the Body can be addressed this does not meet the
        requirement of part a. in the quote from the charter above.
      </h:p>
      <h:p>
        Assuming my interpretation is correct, my suggestion is to either:<h:br />
        1. loosen the restriction in part c to say a mechanism such as
        XPath may be required<h:br />
        or<h:br />
        2. add a 3rd mechanism to sections 5.1, 5.2<h:br />
        My concern also is that I am not aware of any 3rd mechanism.
        Possibly wsu:Id or xml:id could be inserted to a target element,
        but that might cause xml validation issues.
      </h:p>
    </description>
    <protocol revision="contrib">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200512/msg00033.html">Richard Levinson</origin>
    <owner href="mailto:frederick.hirsch@nokia.com">Frederick Hirsch</owner>
    <proposal date="2006-01-18">
      <h:p>
        <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00021.html">Initial mail from Frederick</h:a>,
        prepared as charter clarification during <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00038.html">Jan 18th TC call</h:a>.
      </h:p>
    </proposal>
    <resolution date="2006-01-18">
      <h:p>
        Closed with new ballot for charter clarification drafted per proposal 1 with typo corrections during
        <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00038.html">Jan 18th TC call</h:a>.
        Chairs have action (<h:a href="#ai-08">ai-08</h:a>) to start a new ballot.
      </h:p>
    </resolution>
  </issue>
  <issue id="i012" status="Closed">
    <title>
      Examples should have &lt;ds:SignatureValue&gt; subelement, not &lt;ds:Signature&gt;
    </title>
    <description>
      While going over some details I noticed that it appears that each &lt;ds:Signature&gt;
      in the examples contains &lt;ds:Signature&gt;...&lt;/ds:Signature&gt;. This should probably
      be &lt;ds:SignatureValue&gt;...&lt;ds:SignatureValue&gt;.<h:br />
      See lines: 2376, 2604, 2626, 2751, 2973, 2990, 3124
    </description>
    <protocol revision="contrib">ws-sp</protocol>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00000.html">Richard Levinson</origin>
    <owner>Editors</owner>
    <proposal>Assuming the issue is correct change the tag names to ds:SignatureValue</proposal>
    <resolution date="2006-01-11">
      <h:p>
        Assigned to editors to make proposed change on
        <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00024.html">Jan 11 TC call</h:a></h:p>
      <h:p>
        Moved to review based at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00038.html">Jan 18th TC call</h:a> on changes in ws-sp ed-01-r3
      </h:p>
      <h:p>
        Moved to closed at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00073.html">Jan 25th TC call</h:a>.
      </h:p>
    </resolution>
  </issue>
  <issue id="i013" status="Closed">
    <title>Add the OASIS boilerplate to the XSD and WSDL files</title>
    <description>OASIS boilerplate (license, etc.) needs to be added to the XSD and WSDL files</description>
    <protocol revision="contrib">ws-sc</protocol>
    <protocol revision="contrib">ws-sp</protocol>
    <protocol revision="contrib">ws-trust</protocol>
    <target>schema</target>
    <target>wsdl</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00024.html">Jan 11 TC call</origin>
    <owner>Editors</owner>
    <proposal date="2006-01-18">
      <h:p>
        Editors prepared new drafts as
        <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/16290/oasis-wssx-ws-trust-1.0.xsd">oasis-wssx-ws-trust-1.0.xsd</h:a>,
        <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/16291/oasis-wssx-ws-trust-1.0.wsdl">oasis-wssx-ws-trust-1.0.wsdl</h:a><h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/16292/oasis-wssx-ws-secureconversation.xsd">oasis-wssx-ws-secureconversation.xsd</h:a></h:p>
    </proposal>
    <resolution date="2006-01-18">
      Proposal 1 accepted at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00038.html">Jan 18th TC call</h:a>, status changed to review.
      <h:p>
        Moved to closed at <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00073.html">Jan 25th TC call</h:a>.
      </h:p></resolution>
  </issue>
  <issue id="i014" status="Dropped">
    <title>
      Is the key agreement algorithm proposed in WS-Trust sound?
    </title>
    <description>
      <h:p>
        Section 6.2.4 proposes the use of P_SHA-1 algorithm taken from rfc
        2246 (TLS 1.0) for implementing a key agreement protocol.
        However, key agreement in rfc 2246 involves a somewhat different
        construction which uses P_SHA-1 only as a sub-component.
      </h:p>
      <h:p>
        (1) Is there an analysis or other material available to support the use
        of P_SHA-1 as proposed in WS-Trust?
      </h:p>
      <h:p>
        (2) P_SHA-1 is an iterative method that could theoretically generate
        keying material of unbounded size. It would seem that there would
        need to be some constraints on the sizes of Ent(req), Ent(resp) and the
        computed key. For example, would Ent(req) and Ent(resp) be
        required to be at least 160 bits? And, if so, what then would be the
        recommended size of the computed key?
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00061.html">Prateek Mishra</origin>
    <owner href="mailto:prateek.mishra@oracle.com">Prateek Mishra</owner>
    <proposal>
      Close with no action. "Chris suggested the only change would be to add a new derived key
      algorithm based on P-SHA256.  Prateek agreed this was orthogonal."
    </proposal>
    <resolution date="2006-02-08">
      Proposal 1 made and accepted on <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00028.html">Feb. 8 TC call</h:a>.
    </resolution>
  </issue>
  <issue id="i015" status="Dropped">
    <title>
      Support error handling in RequestSecurityToken extension
      mechanism
    </title>
    <description>
      <h:p>
        The extension mechanism in the RequestSecurityToken and the RequestSecurityTokenResponse require the
        recipient fault if an attribute or an element is found that is not understood.   The recipient can
        be required to return the attribute(s) or element(s) that it doesn't understand in defined format
        in the fault message.  The error information can help cross vendor interoperability and even among
        different versions of the same vendor implementation.  An implementation potentially can fall back
        to a mode of operation that does not use new extensions.
      </h:p>
      <h:p>
        Draft proposal: The recipient returns attribute name(s) and element name(s) that it doesn't understand in the fault message.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00067.html">C.Y. Chao</origin>
    <owner href="mailto:cyc@us.ibm.com">C.Y. Chao</owner>
    <proposal>
      <h:p>
        <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00080.html">From C.Y. Chao</h:a>:
      </h:p>
      <h:p>
        WS-Trust line 367-368 (also 369-371, 430-432, and 433-435)<h:br />

        Like ". . . If an element is found that is not understood, the recipient should fault. The recipient should list unrecognized elements and attributes in the detail element."<h:br />

        Line 2058-2067 Error Handling section, add<h:br />

        Error that occurred (faultstring) Unrecognized extensions found<h:br />
        Fault code (faultcode) wst:UnknownExtension<h:br />
        Fault detail (detail) . . .<h:br />
        &lt;UnknownElement&gt;element name&lt;/UnknownElement&gt;<h:br />
        &lt;UnknownAttribute&gt;attribute name&lt;/UnknownAttribute&gt;<h:br /></h:p>
    </proposal>
    <proposal date="2006-02-21" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00121.html">
      Close with no action.
    </proposal>
    <resolution date="2006-02-22" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00124.html">
      Agreed to proposal 2, close with no action, on feb 22nd Tc call.
    </resolution>
  </issue>
  <issue id="i016" status="Closed">
    <title>
      sp:SignedParts mechanism
    </title>
    <description>
      Should the sp:SignedParts mechanism (lines 592-605) allow specification
      of header elements targeted to a specific s11:actor or s12:role?
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00069.html">Michael McIntosh</origin>
    <owner href="mailto:mikemci@us.ibm.com">Michael McIntosh</owner>
    <proposal>
      <h:p>
        Section 4.1.1 SignedParts provides a mechanism to specify which "parts" of
        a message are required to be integrity protected. The current text
        indicates that, for the sp:SignedParts element, "If no child elements are
        specified, all message headers targeted at the UltimateReceiver role
        [SOAP12] or actor [SOAP11] and the body of the message MUST be integrity
        protected." However, it isn't clear whether sp:Header elements, when
        specified, impact all matching header elements or only those targeted at
        the UltimateReceiver. Also, there is currently no way to specify that a
        header not targeted to UltimateReceiver must be signed.
      </h:p>
      <h:p>
        Proposal:
      </h:p>
      <h:p>
        @ Line 575<h:br />
        Syntax<h:br />
        &lt;sp:SignedParts ...="" &gt;<h:br />
        &lt;sp:Body /&gt;?<h:br />
        &lt;sp:Header Name="xs:NCName"? Namespace="xs:anyURI" Target="xs:anyURI" ...="" /&gt;*<h:br />
        ...<h:br />
        &lt;/sp:SignedParts&gt;<h:br /></h:p>
      <h:p>
        @ Line 599<h:br />

        /sp:SignedParts/sp:Header/@Name<h:br />
        This optional attribute indicates the local name of the SOAP header to be
        integrity protected. If this attribute is not specified, all SOAP headers
        whose namespace and target match the Namespace and Target attributes are
        to be protected.<h:br />

        /sp:SignedParts/sp:Header/@Namespace<h:br />
        This required attribute indicates the namespace of the SOAP header(s) to
        be integrity protected.<h:br />

        /sp:SignedParts/sp:Header/@Target<h:br />
        This optional attribute indicates the role [SOAP12] or actor [SOAP11] of
        the SOAP header(s) to be integrity protected. If this attribute is not
        specified, all SOAP headers targeted at the UltimateReceiver role [SOAP12]
        or actor [SOAP11] whose namespace matches the Namespace attribute are to
        be protected.
      </h:p>
    </proposal>
    <proposal date="2006-03-29" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00103.html" />
    <resolution date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">
      Proposal 2 accepted at April 5th F2F.
    </resolution>
    <resolution date="2006-04-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17889/ws-securitypolicy-1.2-spec-ed-01-r06.pdf">
      Editor version with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-03" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00008.html">
      Moved to Closed at May 3rd TC call.
    </resolution>
  </issue>
  <issue id="i017" status="Dropped">
    <title>
      sp:RequiredElements mechanism
    </title>
    <description>
      Should the sp:RequiredElements mechanism (lines 735-740) allow
      specification of otherwise optional elements that are not children of
      soap:Header?
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00069.html">Michael McIntosh</origin>
    <owner href="mailto:mikemci@us.ibm.com">Michael McIntosh</owner>
    <proposal>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00019.html">Drop the issue.</h:a>
    </proposal>
    <proposal date="2006-02-07" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00018.html">
      Close with no action
    </proposal>
    <resolution date="2006-02-22" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00124.html">
      Agreed to proposal 2, close with no action, on feb 22nd Tc call.
    </resolution>
  </issue>
  <issue id="i018" status="Closed">
    <title>
      absolute XPath expressions
    </title>
    <description>
      Should there a be way to specify that a signature reference for a given
      SignedPart or SignedElement must use an absolute XPath expression?
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00069.html">Michael McIntosh</origin>
    <owner href="mailto:mikemci@us.ibm.com">Michael McIntosh</owner>
    <proposal>
      <h:p>
        <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00020.html">Rationale for proposal</h:a>
      </h:p>
      <h:p>
        Before Line 606 Add:<h:br />

        /sp:SignedParts/sp:Header/@UsePositionalReference<h:br />
        This optional attribute indicates that the specified SOAP header element
        must be integrity protected in a way that prevents repositioning the
        element in the message. If this attribute is "1" (true) and XML Signature
        is used to protect the integrity of the element, the reference must use an
        absolute path XPath expression. If this attribute is not specified the
        default is "0" (false).<h:br />

        Before Line 626 Add:<h:br />

        /sp:SignedElements/@UsePositionalReference<h:br />
        This optional attribute indicates that the specified element(s) must be
        integrity protected in a way that prevents repositioning the element(s) in
        the message. If this attribute is "1" (true) and XML Signature is used to
        protect the integrity of the element(s), the reference(s) must use an
        absolute path XPath expression. If this attribute is not specified the
        default is "0" (false).

      </h:p>
    </proposal>
    <proposal date="2006-03-29" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00104.html" />
    <proposal date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">Proposal 2 ammended during April 5th F2F discussion.</proposal>
    <resolution date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">
      Proposal 3 accepted at April 5th F2F.
    </resolution>
    <resolution date="2006-04-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17889/ws-securitypolicy-1.2-spec-ed-01-r06.pdf">
      Editor version with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-03" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00008.html">
      Moved to Closed at May 3rd TC call.
    </resolution>
  </issue>
  <issue id="i019" status="Dropped">
    <title>
      supported XPath expressions
    </title>
    <description>
      define a limited set of XPath expressions that MUST be supported
      by an implementation (and list explicitly )
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00036.html">Frederick Hirsch</origin>
    <owner href="mailto:frederick.hirsch@nokia.com">Frederick Hirsch</owner>
    <resolution date="2006-02-08">
      At <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00028.html">Feb. 8 TC call</h:a>
      Frederick reported that he was not able to get any concrete examples.
      His developers did agree that doing less is always better.
      Since there are no concrete examples the TC agreed to close this issue
      with no action.
    </resolution>
  </issue>
  <issue id="i020" status="Closed">
    <title>Describe minimum acceptable lengths for P_SHA1 inputs</title>
    <description>
      Section 6.2.4 of WS-Trust describes the use of the P_SHA1 function to generate computed keys.
      It does not provide guidance on minimum size of entropy required for this function. My crypto
      101 guess is that a minimum of 20 bytes is required for each parameter but I would like more
      informed guidance and have it included in the table. Is there any advantage to choosing longer
      strings for Ent(req) or Ent(res)?
    </description>
    <protocol revision="ed-01-r5">ws-sc</protocol>
    <protocol revision="ed-01-r5">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00012.html">Prateek Mishra</origin>
    <owner>Prateek Mishra</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00073.html" />
    <resolution date="2006-04-19" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00079.html">
      Proposal 1 accepted on April 19th TC Call.
    </resolution>
    <resolution date="2006-05-09" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18086/ws-trust-1%5B1%5D.3-spec-ed-01-r07-diff.pdf">
      Editor version with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-17" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00039.html">
      Accepted edits as applied.
    </resolution>
    <relid>AI-2006-05-03-04</relid>
  </issue>
  <issue id="i021" status="Closed">
    <title>Correct section numbers in SP</title>
    <description>
      OASIS template invalidated section numbers used to cross reference throughout SP. This needs to be corrected.
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00028.html">Feb 8th TC call</origin>
    <owner>Editors</owner>
    <proposal date="2006-02-28" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00000.html">
      See <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00000.html">this message</h:a> for detailed
      line number changes.
    </proposal>
    <resolution date="2006-03-01" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00010.html">
      Proposal 1 accepted on March 1st TC call.
    </resolution>
    <resolution date="2006-03-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17050/ws-securitypolicy-1.2-spec-ed-01-r04.doc">
      Editor version with resolution applied available for review.
    </resolution>
    <resolution date="2006-03-22" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00084.html">
      Accepted edits as applied.
    </resolution>
  </issue>
  <issue id="i022" status="Dropped">
    <title>XML tags of properties according to the properties</title>
    <description>
      In chapter 6 the spec introduces several properties to control some behaviour.
      The actual XML tags to set the properties is given in chapter 7. It is somehow difficult to
      link the properties defined in chapter 6 to the actual XML tags defined in chapter 7. For example:
      the [Protection Order] property can have several values. Chapter 7 then defines the real XML
      tags as e.g. &lt;sp:EncryptBeforeSigning /&gt; to set this property. Because this property can have
      several values there are several such XML tags to set this property. However, these XML names bear
      no direct link to the property.
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00031.html">Werner Dittmann</origin>
    <proposal>
      <h:p>
        Use the following notation to set a multi value property:<h:br />
        &lt;sp:ProtectionOrder value="EncryptBeforeSigning" /&gt;<h:br /></h:p>
      <h:p>
        Such a notation would also simplify parsing because a parser has to look for one tag name
        only and can use the attribute to set the property's value.
      </h:p>
      <h:p>
        Other properties are defined as boolean (true/false) properties. However, the actual XML
        tag names to set the property differ from the specified property name - this is somehow confusing.
        Take the Signature Protection property as an example: to set it you have to use the XML tag
        &lt;sp:EncryptSignature /&gt;. Why no use something like:<h:br />

        &lt;sp:SignatureProtection value="on" /&gt; or <h:br />
        &lt;sp:SignatureProtection value="Encrypt" /&gt; or just <h:br />
        &lt;sp:SignatureProtection /&gt;<h:br />

        or something similar to make clear which property is set or defined.
      </h:p>
    </proposal>
    <proposal date="2006-02-16" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00078.html">
      Close with no action.
    </proposal>
    <resolution date="2006-02-22" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00124.html">
      Proposal 2 accepted, to close with no action, at Feb 22nd TC call.
    </resolution>
  </issue>
  <issue id="i023" status="Closed">
    <title>
      Properties for Algorithm Suite missing or wrong
    </title>
    <description>
      <h:p>
        The table at line 1280ff defines two properties [Sym KS] and [Asym KS].
        Both propteries were not shown in the bullet list starting at line 1263. Should these two
        properties read [Sym Sig] and [Asym Sig]?
      </h:p>
      <h:p>
        The table starting at line 1282 defines a property [C14n]. This property name is the same
        as the abbreviation for C14n in table starting at line 1277. This is not wrong, but
        choosing different names would make it more clear.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00032.html">Werner Dittmann</origin>
    <proposal date="2006-02-14" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00061.html">
      <h:p>
        The table at line 1280ff defines two properties [Sym KS] and [Asym KS], these should read [Sym Sig]
        and [Asym Sig] which would match bullett list at line 1263.
      </h:p>
      <h:p>
        The table starting at line 1282 defines a property [C14n], this should be spelled out as a
        property name such as; [Canonicalization], [C14N algorithm] or [C14N Alg] or some such.
      </h:p>
    </proposal>
    <resolution date="2006-02-22" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00124.html">
      Editors to implement proposed changes (extracted and recorded in proposal 1), agreed on Feb 22nd TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i024" status="Dropped">
    <title>
      [Protection Order] Property using same source for keys
    </title>
    <description>
      <h:p>
        In "EncryptBeforeSigning" the spec states that both keys MUST derived from the same source.
        What does this mean? Use the same certificate for both actions (for example if a X509 cert is used).
        In that case this seems an unnecessary restriction. At least WS Security does not mandate this.
        Also using the same cert to encrypt and sign is not a good security practice.
      </h:p>
      <h:p>Proposed direction: Extend the ws-sp spec to support different key sources.</h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00033.html">Werner Dittmann</origin>
    <resolution date="2006-03-01" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00010.html">
      Determined duplicate of issue 9 on on March 1st TC call, closed with no action.
    </resolution>
    <relid>i009</relid>
  </issue>
  <issue id="i025" status="Closed">
    <title>
      Chap. 6.5 [Token protection] conflicts with chapter 8.3 and 8.4
    </title>
    <description>
      <h:p>
        If the policy uses EndorsingSupportingTokens _and_ sets [Token Protection] then I have the
        same behaviour as defined for SignedEndorsingSupportingTokens. Is that true?
      </h:p>
      <h:p>
        On the other hand if I use SignedEndorsingSupportingTokens and do _not_ set [Token Protection] -
        what should be the result in that case?
      </h:p>
      <h:p>
        Proposed direction: Clarify behaviour of these interdependencies.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00034.html">Werner Dittmann</origin>
    <proposal date="2006-02-16" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00079.html">
      <h:p>
        At the beginning of chap 8 add something like:
      </h:p>
      <h:p>
        How [Token Protection] interacts with supporting tokens
      </h:p>
      <h:p>
        If [Token Protection] is true, then each signature covers the
        token that generated it. So the main signature ( the one over the message headers
        and body ) covers the main token (e.g. [Protection Token] in a symmetric
        binding). Endorsing signatures cover the endorsing token.
      </h:p>
      <h:p>
        For a signed SupportingToken the supporting token is covered by the
        <h:b>main</h:b> message signature.
      </h:p>
      <h:p>
        If you have a SignedEndorsingSupportingToken <h:b>and</h:b> [Token Protection] is
        set to 'true' then the supporting token is signed twice, once by the
        main signature and once by the endorsing signature.
      </h:p>
    </proposal>
    <resolution date="2006-02-22" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00124.html">
      Editors to implement proposed changes (extracted and recorded in proposal 1) in section 8, agreed on Feb 22nd TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i026" status="Closed">
    <title>
      Chapter 6.7 [Security Header Layout]
    </title>
    <description>
      <h:p>
        Here the spec defines "LaxTimestampFirst" and "LaxTimestampLast", both define that a
        Timestamp MUST be included. On the other hand in chapter
        6.2 [Timestamp] the spec defines another way to switch Timestamps on/off. Which one rules?
      </h:p>
      <h:p>
        Proposed direction: Clarify behaviour of these interdependencies.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00035.html">Werner Dittmann</origin>
    <proposal date="2006-02-14" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00062.html">
      In order for [Security Header Layout] property values of
      LaxTimeStampFirst or LaxTimeStampLast to be valid [Timestamp] MUST be
      set to true. This is called out in the assertions description in section
      7.2 but should be called out in section 6 as well.
    </proposal>
    <resolution date="2006-02-22" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00124.html">
      Editors to implement proposed changes (extracted and recorded in proposal 1) to add Section from 7.2 to section 6.
      Agreed on Feb 22nd TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i027" status="Closed">
    <title>
      When to include a token?
    </title>
    <description>
      <h:p>
        Using token inclusion values (chap 5.1.1) one can specify when to include a token. On the other hand in chap 5.3.3 X509Token Assertion there are ways defined how to reference a X509 token. For example if "RequireIssuerSerialReference" is set and the inclusion value is
        "always": shall the token be included in the message? Which token shall the receipient take - the included one or the referenced?
      </h:p>
      <h:p>
        With respect to the WS Security specification I interpret the inclusion value "always*" or "once" without any additional "Require*"
        assertion as "include the token as a BinarySecurityToken and reference it using a Reference in the SecruityTokenReference". Is this a correct interpretation?
      </h:p>
      <h:p>
        Also, with respect to WSS how to interpret or act on the RequireEmbeddedRefernce assertion? WSS does not specify an "embedded"
        mechanism for X509 certificates.
      </h:p>
      <h:p>
        Proposed direction: Clarify behaviour of the "token inclusion" and "token reference"
        interworking to avoid misinterpretations and probable interop problems.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00037.html">Werner Dittmann</origin>
    <owner>Werner Dittmann</owner>
    <proposal date="2006-03-03" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00020.html">
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00032.html">See discussion of this proposal in March 8 TC call minutes</h:a>
    </proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00057.html" />
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Proposal 2 accepted on March 15th TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i028" status="Dropped">
    <title>
      Multiple supporting tokens of the same type?
    </title>
    <description>
      <h:p>
        Can a Policy have more than one supporting token (of the same type), e.g. multiple SupportingTokens or multiple EndorsingSupportingTokens?
      </h:p>
      <h:p>
        Proposed direction: IMHO we need an "overall" ws-sp outline to define which assertions are allowed at a specific level, for example similar to (a)symmetric binding outline but for to top level policy file.
      </h:p>
      <h:p>
        See continuing discussion:<h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00079.html">msg00079</h:a><h:br /></h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00038.html">Werner Dittmann</origin>
    <owner>Werner Dittmann</owner>
    <resolution date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">
      Closed with no action at April 5th F2F as the TC agreed that the answer to this question is yes..
    </resolution>
    <relid>i062</relid>
  </issue>
  <issue id="i029" status="Closed">
    <title>
      Which token to use to encrypt/sign in case of multiple tokens defined in a supporting token assertion?
    </title>
    <description>
      <h:p>
        Every supporting token can have more than one token assertion, e.g.
        X509 token assertions. If there are more than one such token assertion which on shall be used to sign/encrypt additional SignedParts or EncryptedParts if some are definied?
      </h:p>
      <h:p>
        Proposed direction: Define and insert some clarification.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00039.html">Werner Dittmann</origin>
    <proposal date="2006-02-14" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00065.html">
      <h:p>Add the following to section 8, supporting tokens:</h:p>
      <h:p>
        All of them (sic "tokens included in the supporting tokens") should
        sign and encrypt the various message parts. Ordering of elements
        (tokens, referencelists etc.) in the security header would have to be
        used to determine which order encryptions occurred in.
      </h:p>
    </proposal>
    <resolution date="2006-03-01" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00010.html">
      Proposal 1 accepted on March 1st TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i030" status="Closed">
    <title>
      Need a mechanism to identify token assertions
    </title>
    <description>
      <h:p>
        An implementation that uses Security Policy Language has to know how to populate the required
        tokens, e.g. UsernameToken or X509 tokens. Because a policy file usually contains several token
        assertions there should be a mechanism avaliable to identify a token assertion.
      </h:p>
      <h:p>
        For example if a policy requires two UsernameToken in a supporting token the application that
        creates the message needs a way to link the different UsernameToken assertions to the user
        data records that contains username, password, etc. To do so the application shall be able to
        identify the UsernameToken and use this identifier as a link to the user data record.
      </h:p>
      <h:p>
        Simliar mechanisms are required to locate the correct X509 certificate in a keystore, for example.
      </h:p>
      <h:p>
        Proposed direction: Add an Id or name attribute or to token assertions.  Any other ideas how to identify token in a Poliy file and associated them with real user/alias data?
      </h:p>
      <h:p>See AI-2006-03-15-01</h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00040.html">Werner Dittmann</origin>
    <owner>Werner Dittmann</owner>
    <proposal date="2006-03-07" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00029.html" />
    <proposal date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00030.html" />
    <resolution date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">
      Proposal 2 accepted at April 5th F2F.
    </resolution>
    <resolution date="2006-04-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17889/ws-securitypolicy-1.2-spec-ed-01-r06.pdf">
      Editor version with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-03" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00008.html">
      Moved to Closed at May 3rd TC call.
    </resolution>
  </issue>
  <issue id="i031" status="Closed">
    <title>
      Clarification for UsernameToken assertion
    </title>
    <description>
      <h:p>
        The UsernameToken defines additonal (optional) assertions that specify the WSS spec version.
        IMHO this is not enough to fully specify a UsernameToken. For example a UsernameToken may have
        a additonal elements such as a creation time. The WSS specs do not define in any way if such
        elements shall be included or not (some are recommended but no mandated).
      </h:p>
      <h:p>
        Proposed direction: The UsernameToken assertion should be extended to better reflect the WSS
        username token elements and attributes.
      </h:p>
      <h:p>
        *Note* depends on resolution to issue 30<h:br />
        See continuing discussion<h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00081.html">msg00081</h:a><h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00083.html">msg00083</h:a><h:br /></h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00041.html">Werner Dittmann</origin>
    <owner>Werner Dittmann</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00063.html">
      Revised from <h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00032.html">original</h:a>.
    </proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00034.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00059.html" />
    <resolution date="2006-06-07" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00017.html">
      Proposal 1 accepted with ammendmets on June 7th TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18837/ws-securitypolicy-1.2-spec-ed-01-r07.pdf">
      Revision 7 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied.
    </resolution>
    <relid>AI-2006-04-12-01</relid>
    <relid>AI-2006-04-12-02</relid>
  </issue>
  <issue id="i032" status="Closed">
    <title>
      WS-SP should permit Policy to specify the use of keys derived from passwords
    </title>
    <description>
      <h:p>
        At the end of section 5.3.1 it says:
      </h:p>
      <h:p>
        Note: While Username tokens could be used cryptographically, such usage
        is discouraged in general because of the relatively low entropy
        typically associated with passwords. This specification does not define
        a cryptographic binding for the Username token. A new token assertion
        could be defined to allow for cryptographic binding.
      </h:p>
      <h:p>
        I believe that WS-SP should enable all the functionality defined in the
        referenced specs. Specifically, WSS 1.1 defines an algorithm for
        deriving keys from passwords. I think WS-SP should support this and
        allow organizations decide for themselves if they wish to use them or
        not. There are already warnings about the issues in the security
        considerations section of the WSS 1.1 Username Token Profile Security
        Considerations section.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00059.html">Hal Lockhart</origin>
    <owner href="mailto:hlockhar@bea.com">Hal Lockhart</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00048.html" />
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Proposal 1 accepted on March 15th TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i033" status="Closed">
    <title>Identify security header components that are signed and/or encrypted</title>
    <description>
      <h:p>
        It appears that use of the SymmetricBinding and Asymmetric binding assertion implies encryption over several components of the security header, including the timestamp, Supporting tokens and SignedSupporting tokens.
        This is not stated in the specification but can be gleaned from the construction given in Appendix C.
      </h:p>
      <h:p>
        It would be helpful to implementors if this was made explicit in Sections 7.3 and 7.4
      </h:p>
      <h:p>
        Continuing discussion<h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00071.html">msg00071</h:a><h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00082.html">msg00082</h:a><h:br /></h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00088.html">Prateek Mishra</origin>
    <owner>Prateek Mishra</owner>
    <proposal>
      <h:p>
        Add the following sentence to  Sections 7.4 (at end of first paragraph) and  7.5 (at end of first paragraph):
      </h:p>
      <h:p>
        Use of this binding assertion implies that the following tokens, if
        present in the security header of the request or response message, MUST
        be encrypted: timestamp, Supporting tokens and SignedSupporting tokens.
      </h:p>
    </proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00035.html" />
    <resolution date="2006-05-31" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00071.html">
      Proposal 2 accepted on May 31st TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18837/ws-securitypolicy-1.2-spec-ed-01-r07.pdf">
      Revision 7 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied.
    </resolution>
    <relid>AI-2006-03-29-01</relid>
    <relid>AI-2006-05-10-01</relid>
  </issue>
  <issue id="i034" status="Closed">
    <title>
      Editorial comments on WS-Trust
    </title>
    <description>
      See proposal for details
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00101.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal date="2006-02-20" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00101.html">
      <h:p>
        1) Section 1.2, Remove line 54, modify line 55 to be
        "Establishing, managing and assessing trust relationships."
        ("Managing trusts" is unclear).
      </h:p>
      <h:p>
        2) Section 1.4<h:br />
        Neither schema (line 62) or wsdl (line 65) are located in the oasis docs directory. Should a draft be placed there?
      </h:p>
      <h:p>
        3) Remove material in 1.5 from lines 109-115<h:br />
        Replicated in next section where it belongs.
      </h:p>
      <h:p>
        4) Line 139 add [ for WS-PolicyAttachment
      </h:p>
      <h:p>
        5) line 261 s/. As well,/ or/
      </h:p>
      <h:p>
        6) Line 457, s/As well, /Additional
      </h:p>
      <h:p>
        7) move lines 478-480 to 472, replace "As well, it is" with "It is also"<h:br />
        The mechanisms defined in this specification apply to both symmetric and asymmetric keys. As an example, a Kerberos KDC could provide the services defined in this specification to make tokens available; similarly, so can a public key infrastructure.  In such cases, the issuing authority is the security token service.
        It should be noted that in practice, asymmetric key usage often differs as it is common to reuse existing asymmetric keys rather than regenerate due to the time cost and desire to map to a common public key.  In such cases a request might be made for an asymmetric token providing the public key and proving ownership of the private key.  The public key is then used in the issued token.
        A public key directory is not really a security token service per se; however, such a service MAY implement token retrieval as a form of issuance.  It is also possible to bridge environments (security technologies) using PKI for authentication or bootstrapping to a symmetric key.
      </h:p>
      <h:p>
        8) Line 490, replace "Subsequent" with "Additional". Line 492, remove " (e.g. multiple simultaneous exchanges) "
      </h:p>
      <h:p>
        9) Line 560 s/post-dated/postdated/
      </h:p>
      <h:p>
        10)  Line 694, change last OK in table to "Issuer scope".
      </h:p>
      <h:p>
        11) Line 743, s/and are/that is
      </h:p>
      <h:p>
        12) Line 762,  Is link really to Section 6.1 or to 4.1?
      </h:p>
      <h:p>
        13) Line 878,<h:br />
        Replace "Two or more RSTR elements are returned in the collection." with "Each RequestSecurityTokenResponse element is an individual RSTR."
        Add text "Two or more RSTR elements are returned in the collection." to end of line 876, for description of collection.
      </h:p>
      <h:p>
        14) Line 927 add "This element schema is defined using the RequestSecurityTokenResponse schema type."
        (this merely reiterates line 916 in the text describing the element).
      </h:p>
      <h:p>
        15) Line 1128 indicate request and response separately.
      </h:p>
      <h:p>
        16) Table entries at 1219 s/request/Trust service
      </h:p>
      <h:p>
        17) Table 1225, is example missing token to be validated?
      </h:p>
      <h:p>
        18) Any additional requirements/description on validation of envelope needed in section 7?
        e.g. validate for specific role?
      </h:p>
      <h:p>
        19) Is ws:LChallenge correct at line 1352?
      </h:p>
      <h:p>
        20) Section 8.6, generally sign with private key associated with certificate, not certificate... (lines 1447, 1484)
      </h:p>
      <h:p>
        21) 1699 s/binding/other bindings
      </h:p>
    </proposal>
    <resolution date="2006-03-08" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00032.html">
      Proposal 1 accepted on March 3rd conference call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17403/ws-trust-1.3-spec-ed-01-r04.pdf">
      Revision 4 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i035" status="Dropped">
    <title>
      Requester cannot fault upon response
    </title>
    <description>
      Text seems to imply requestor can fault upon receiving a response.

      See Line 386, also lines 432 and 435.

      It isn't clear how the receiver of a response (the requestor) can fault if the message exchange pattern is complete.
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00102.html">Frederick Hirsch</origin>
    <proposal date="2006-02-20" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00102.html">
      Proposal, remove lines 386-7.
      Likewise lines 432, 435.
    </proposal>
    <resolution date="2006-02-22" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00124.html">
      The TC discussed this issue and decided the document did not require any
      change. Closed with no action on Feb 22nd TC call.
    </resolution>
  </issue>
  <issue id="i036" status="Closed">
    <title>
      Clarify term pre-authentication
    </title>
    <description>
      Is "pre-authentication" a well defined term? What does it mean to pre-authenticate using SSL/TLS?
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00103.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal date="2006-02-20" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00103.html">
      At Line 232, section 2.
      Add sentence "Authenticating the server at the transport layer can mitigate the risk of spoofed
      servers."
    </proposal>
    <proposal date="2006-03-08" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00034.html">
      <h:p>
        Change the second sentence of the paragraph at lines 229-233 (second to last paragraph in section 2 introduction) to read as follows:
      </h:p>
      <h:p>
        "Network and transport protection mechanisms such as IPsec or TLS/SSL can be used in conjunction with this specification to support different security requirements and scenarios.  If available, requestors should consider using a network or transport security mechanism to authenticate the service when requesting, validating, or renewing security tokens, as an added level of security."
      </h:p>
      <h:p>
        Detailed changes are
      </h:p>
      <h:p>
        s/perform pre-authentication of the recipient/authenticate the service/<h:br />
        s/tokens//tokens,/
      </h:p>
    </proposal>
    <resolution date="2006-03-22" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00084.html">
      Proposal 2 accepted on March 22nd TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17403/ws-trust-1.3-spec-ed-01-r04.pdf">
      Revision 4 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i037" status="Closed">
    <title>
      Add element extensibility to RequestSecurityTokenResponseCollection/IssuedTokens schema
    </title>
    <description>
      Add element extensibility to RequestSecurityTokenResponseCollection schema. This would potentially allow bindings to define information associated with collection or to avoid repeating material in each SecurityTokenResponse, to give examples. Note that IssuedTokens shares the same schema as RequestSecurityTokenResponseCollection, so resolution applies to this element as well.
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <target>schema</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00104.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal date="2006-02-20" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00104.html">
      <h:p>
        1) Insert before line 879:<h:br />
        /wst:RequestSecurityTokenResponseCollection/{any}<h:br />
        This is an extensibility mechanism to allow additional elements, based on schemas, to be added.
      </h:p>
      <h:p>
        2) Insert before line 931<h:br />
        /wst:IssuedTokens/{any}<h:br />
        This is an extensibility mechanism to allow additional elements, based on schemas, to be added.
      </h:p>
      <h:p>
        3) Update schema accordingly.
      </h:p>
    </proposal>
    <resolution date="2006-03-08" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00032.html">
      Proposal 1 accepted on March 3rd conference call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17403/ws-trust-1.3-spec-ed-01-r04.pdf">
      Revision 4 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i038" status="Closed">
    <title>
      Clarify that ComputedKey optional
    </title>
    <description>
      Can a computed key mechanism be implicit and not indicated with a ComputedKey element? (lines 744, 757)
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00105.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal date="2006-02-20" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00105.html">
      At Line 744 s/is/may be/
      Add line to 757: "Use of the ComputedKey element is optional but SHOULD be used if a key needs to be computed."
    </proposal>
    <proposal date="2006-03-21" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00078.html" />
    <resolution date="2006-03-22" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00084.html">
      Proposal 2 accepted on March 22nd TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17403/ws-trust-1.3-spec-ed-01-r04.pdf">
      Revision 4 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i039" status="Dropped">
    <title>
      Define URI for no-correlation anonymous context case
    </title>
    <description>
      At Line 415, WS-Trust  does not define a "anonymous" URI for the generic case of no correlation -  but implies it is needed generically
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00106.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal date="2006-02-20" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00106.html">
      At Line 415, WS-Trust core define an "anonymous" URI for the generic case of no correlation -
      http://docs.oasis-open.org/ws-sx/ws-trust/200512/anonymous-context
    </proposal>
    <resolution date="2006-03-08" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00032.html">
      TC agreed to close with no action March 3rd conference call.
    </resolution>
  </issue>
  <issue id="i040" status="Closed">
    <title>
      What values can be carried in a /wst:RequestSecurityToken/wst:Claims
      element?
    </title>
    <description>
      <h:p>
        lines 530-535 of  ws-trust-1[1].3-spec-ed-01-r03-diff state:
      </h:p>
      <h:p>
        [quote]<h:br />
        /wst:RequestSecurityToken/wst:Claims<h:br />
        This optional element requests a specific set of claims.  In most cases, this element contains
        claims identified as required in a service's policy. Refer to [WS-Policy] for examples of how a
        service uses policy to specify claim requirements.  The @Dialect attribute specifies a URI to
        indicate the syntax of the claims.  No URIs are predefined; refer to profiles and other
        specifications to define these URIs.<h:br />
        [\quote]
      </h:p>
      <h:p>
        We are unable to follow what is meant here. What language is used to specify claims for
        different token types?
      </h:p>
      <h:p>
        There is a reference here to examples in WS-Policy (Sep 2004) but no other detail. WS-Policy
        (Sep 2004) does not specifically discuss this issue nor does it offer an example of a service
        using a policy to specify claim requirements.
      </h:p>
      <h:p>
        I am also not sure what the role of "profiles" and the @Dialect attribute is. Is this a
        reference to WSS 1.x profiles or to forthcoming profiles to developed as part of WS-SX?
      </h:p>
      <h:p>
        Is the intent here to allow policies from WS-SecurityPolicy to be expressed?
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00117.html">Prateek Mishra</origin>
    <owner>Prateek Mishra</owner>
    <proposal date="2006-02-21" href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00117.html">
      <h:p>
        *Note* from March 8th TC call "Prateek would like the "dialect" extensibility point to be described as
        just that.  Note that the proposal in msg00117 (this one) is wrong."
      </h:p>
      <h:p>
        My guess is that this should reference is WS-SecurityPolicy with language like:
      </h:p>
      <h:p>
        [quote]<h:br />
        This optional element requests a specific set of claims.  In most cases, this element contains
        claims identified as required in a service's policy.<h:br />
        Policy expressions taken from WS-SecurityPolicy may be used to describe the claims sought by the
        requestor.
        [\quote]
      </h:p>
      <h:p>
        But this still leaves open the role of @Dialect. So I need the questions given above to be
        answered first, before I can propose alternative text.
      </h:p>
    </proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00047.html" />
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Proposal 2 accepted on March 15th TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17403/ws-trust-1.3-spec-ed-01-r04.pdf">
      Revision 4 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i041" status="Closed">
    <title>
      Clarification on token propagation of SCT required
    </title>
    <description>
      <h:p>
        Clarification on token propagation of SCT required when STS has no prior knowledge of which parties the requester needs a token for.
      </h:p>
      <h:p>
        WS-SC defines SCT token propagation in order to distribute an SCT and its POP token to the requester (context initiator) and the other parties (endpoint for secured requests). Section 3 (lines 255 ff), Establishing Security Contexts, refers to the mechanisms in WS-Trust for token propagation. If the STS has no prior knowledge of which parties the requester needs a token for, WS-Trust provides two alternatives to define theses parties in the RST:
      </h:p>
      <h:p>
        wsp:AppliesTo in RST and RSTR, Section 4.2.1 (lines 677 ff):<h:br />
        Both the requestor and the issuer can specify a scope for the issued token using the &lt;wsp:AppliesTo&gt; element.<h:br />
        wsp:AppliesTo can be used to carry wsa:EndpointReference elements which contain endpoint URLs.
      </h:p>
      <h:p>
        Authorized Token Participants, Section 9.5 (lines 1969 ff):<h:br />
        This parameter is typically used when there are additional parties using the token or if the requestor needs to clarify the actual parties involved (for some profile-specific reason).<h:br />
        wst:ParticipantType can contain an arbitrary structure according to the ws-trust XSD.
      </h:p>
      <h:p>
        From the quotes above, my guess is that WS-SC should refer to the Authorized Token Participants extension element for the RST and should give an example or enhance the existing SCT Request Example (section 3.2, lines 323 ff) in section 3.3 of the WS-SC spec.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00136.html">Martin Raepple</origin>
    <owner>Martin Raepple</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00021.html">
      - Sec. 3.3: Add a paragraph that explains how the requester uses
      wsp:AppliesTo for Token Propagation if the STS has no prior knowledge of
      which parties the requester needs a token for<h:br />
      - Sec. 3.3: Add an SCT request example that uses wst:AppliesTo for this
      scenario
    </proposal>
    <resolution date="2006-03-08" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00032.html">
      Proposal 1 accepted on March 3rd conference call.
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17733/ws-secureconversation-1.3-spec-ed-01-r05-diff.doc">
      Revision 5 of SC contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
  </issue>
  <issue id="i042" status="Dropped">
    <title>
      WS-SC HTTP Binding
    </title>
    <description>
      <h:p>
        WS-SC introduces the Security Context (SCT) Token which contains a unique identifier for a shared security context among the context initiator (requester) and (1 to n) service endpoints. There are certainly cases where the service endpoint is actually not one system but a collection of systems (server farm) used for cluster computing. Server farms are typically co-located with a load balancer which enables communication between the different servers of the cluster and the users of the cluster and may perform some type of load balancing
      </h:p>
      <h:p>
        Based on the assumption that the servers in the cluster do not share a common address space or use any other means to synchronize stateful resources (such as the security context), the load balancer needs to send all subsequent requests for the same client to same server which has access to the previously created security context as part of the SCT establishment phase (see section 3.3).
      </h:p>
      <h:p>
        The load balancer could certainly look at the wsse:security/wsc:SecurityContextToken/wsc:Identifier element to determine the context identifier and route the request to the server according to same sort of mapping. But this could have an impact of the overall performance since the load balance has to look inside the content of the HTTP request and parse the content of the SOAP message.
      </h:p>
      <h:p>
        A much faster approach would be to carry the security context identifier in the HTTP header. Such an HTTP binding for WS-SC could specify the relationship between the WS-SC security context and the HTTP header and should define the name and semantics of new custom HTTP header(s).
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00137.html">Martin Raepple</origin>
    <resolution date="2006-03-01" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00010.html">
      Closed with no action as TC deemed out of scope on March 1st TC call.
    </resolution>
  </issue>
  <issue id="i043" status="Closed">
    <title>
      Missing enumeration for validate request type in the RequestTypeEnumdefinition
    </title>
    <description>
      In the definition of RequestTypeEnum (line #80) we should have one more
      enumeration with the value "http://schemas.xmlsoap.org/ws/XXXX/XX/trust/Validate"
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>schema</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00019.html">Ruchith Fernando</origin>
    <owner>Editors</owner>
    <proposal date="2006-03-03" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00019.html">
      Include the following in the RequestTypeEnum definition:
      &lt;xs:enumeration value='http://schemas.xmlsoap.org/ws/XXXX/XX/trust/Validate' /&gt;
    </proposal>
    <resolution date="2006-03-08" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00032.html">
      *Note* WS-Trust uses the missing URI: http://docs.oasis-open.org/ws-sx/ws-trust/200512/Validate<h:br />
      Proposal 1 accepted on March 3rd conference call.
    </resolution>
    <resolution date="2006-05-09" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18089/oasis-wssx-ws-trust-1.0.xsd">
      Editor version of schema with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-17" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00039.html">
      Accepted edits as applied.
    </resolution>
    <relid>AI-2006-05-03-05</relid>
  </issue>
  <issue id="i044" status="Closed">
    <title>
      What is an authorization token?
    </title>
    <description>

      line 1185:<h:br />

      ".  In other cases an authorization token MAY be returned. "<h:br />

      I dont know what an authorization token is; this should be clarified or
      this line removed.
      <h:p><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00033.html">See discussion</h:a></h:p></description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00030.html">Prateek Mishra</origin>
    <owner>Tony Nadalin</owner>
    <proposal date="2006-03-29" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00102.html" />
    <proposal date="2006-04-04">
      <h:p>
        WS-Trust line 1185:<h:br />
        "In other cases an authorization token MAY be returned."
      </h:p>
      <h:p>
        Proposed replacement text:<h:br />
        "In other cases a security token MAY be returned and used for authorization."
      </h:p>
      <h:p>
        WS-Trust Line 839:<h:br />
        "In this example a supporting authorization token is returned that has no separate proof-of-possession token as it is secured using the same proof-of-possession token that was returned."
      </h:p>
      <h:p>
        Proposed replacement text:<h:br />
        "In this example a supporting security token is returned that has no separate proof-of-possession token as it is secured using the same proof-of-possession token that was returned."
      </h:p>
    </proposal>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Proposal 2 accepted at April 4th F2F.
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17737/ws-trust-1.3-spec-ed-01-r05-diff.pdf">
      Revision 5 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
  </issue>
  <issue id="i045" status="Closed">
    <title>
      Duplicate Id attribute values in Security Context example
    </title>
    <description>
      The two Signature elements in the Security Context example in section
      8 have the same Id attribute values, "sig1" at lines 938 and 944.
    </description>
    <protocol revision="ed-01-r3">ws-sc</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00035.html">Frederick Hirsch</origin>
    <owner>Editors</owner>
    <proposal>
      Remove Id attributes from the two Signature elements in the example at lines 938 and 944.
    </proposal>
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Proposal 1 accepted on March 15th TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17401/ws-secureconversation-1.3-spec-ed-01-r04.pdf">
      Revision 4 of SC contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i046" status="Dropped">
    <title>
      Include BinarySecurityToken as an additional token assertion in WS-SP
    </title>
    <description>
      <h:p>
        The WSS 1.x specifications defines &lt;wsse:BinarySecurityToken&gt; as a container for carrying legacy or non-XML security tokens.
        WS-SP includes assertions for X.509 certificates and Keberberos tickets as specific instances of binary security tokens but does not include any way of referencing a generic binary security token of an arbitrary valuetype.
      </h:p>
      <h:p>
        The enterprise use-case of interest is a situation where a legacy requestor generates a SOAP message with a binary security token with value type set by prior agreement (e.g., LegacyFooToken). There is a corresponding use-case for a legacy responder, where the responder requires some form of pre-existing security token.
      </h:p>
      <h:p>
        In each case, it would aid interoperability if WS-SP supported expression of BinarySecurityToken with a certain value type. No other semantics would be associated with tokens conforming to this assertion.
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <target>schema</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00036.html">Prateek Mishra</origin>
    <proposal>
      <h:p>
        Include a new token type in Section 5.3
      </h:p>
      <h:p>
        Section 5.3.11
      </h:p>
      <h:p>
        This element represents a requirement to include an arbitrary binary security token in the security header.
        The assertion includes information about the URI that must be provided by the security token's ValueType attribute.
      </h:p>
      <h:p>
        /sp:BinarySecurityToken<h:br />
        This identifies a Binary Security Token assertion
      </h:p>
      <h:p>
        /sp:BinarySecurityToken/ValueType<h:br />
        This required element specifies the URI that must be provided by the corresponding security token's ValueType attribute.
      </h:p>
      <h:p>
        /sp:BinarySecurityToken/Policy<h:br />
        This optional element specifies additional requirements for the use of the sp:BinarySecurityToken assertion
      </h:p>
    </proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00057.html" />
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Closed with no action on March 15th TC call (per proposal 2). Prateek will open a new issue
      if he thinks additional material should be added to the specification. See AI-2006-03-15-01.
    </resolution>
  </issue>
  <issue id="i047" status="Closed">
    <title>
      Does IssuedTokenOverTransport require client-side digital signature?
    </title>
    <description>
      <h:p>
        There some ambiguity in the discussion under the
        "IssuedTokenOverTransport" in the interop document. Is the client
        supposed to sign the SAML
        token and SOAP payload with the key from the SAML token?  If this is the
        intent, it should be made clear in the text.
      </h:p>
      <h:p>
        Or is the intent to use a SAML bearer token? This is a legitimate
        use-case we would like to see captured in some interop scenario. If that
        is the intent,
        we need to ensure that the SAML token returned by STS is a bearer
        token.  This should be made clear in the text.
      </h:p>
      <h:p>
        Need to understand intent of the author; I can then propose changes (if
        needed).
      </h:p>
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <protocol revision="ed-01-r3">ws-sc</protocol>
    <target>interop</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00045.html">Prateek Mishra</origin>
    <owner>Marc Goodner</owner>
    <proposal date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Gudge suggested that this is a holder of key scenario.  Prateek
      suggested this could be explained in the scenario text (in the interop document).
    </proposal>
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Proposal 1 accepted on March 15th TC call. See AI-2006-03-15-02.
    </resolution>
    <resolution date="2006-05-03" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00003.html">
      Revised interop scenarios draft with change available for review.
    </resolution>
    <resolution date="2006-05-10" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00027.html">
      Moved to Closed at May 10th TC call.
    </resolution>
    <relid>AI-2006-03-15-02</relid>
    <relid>AI-2006-03-29-04</relid>
  </issue>
  <issue id="i048" status="Closed">
    <title>
      Binding Assertions should support Operation subjects
    </title>
    <description>
      <h:p>
        Appendix A states that Binding Assertions can only have Endpoint for their subject, or scope. I believe that Operation should also be allowed for the AsymmetricBindingAssertion and SymmetricBindingAssertion. We have seen situations where customers have defined different security around operations of a service, especially when building aggregate services. The constructs of the AsymmetricBindingAssertion in particular would be useful when defining security around these operations.
      </h:p>
      <h:p>
        Continuing discussion<h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00080.html">msg00080</h:a><h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00085.html">msg00085</h:a><h:br /></h:p>
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00051.html">Tony Gullotta</origin>
    <owner>Tony Gullotta</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00051.html">
      Add AsymmetricBindingAssertion and SymmetricBindingAssertion to section A.2.
    </proposal>
    <proposal date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00065.html" />
    <proposal date="2006-04-12" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00063.html" />
    <proposal date="2006-04-13" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00065.html" />
    <proposal date="2006-05-09" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00019.html" />
    <resolution date="2006-05-31" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00071.html">
      Proposal 5 accepted on May 31st TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18837/ws-securitypolicy-1.2-spec-ed-01-r07.pdf">
      Revision 7 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied.
    </resolution>
  </issue>
  <issue id="i049" status="Closed">
    <title>
      Clarify that [Algorithm Suite] applies to message level
      cryptography and NOT transport-level cryptography
    </title>
    <description>
      During some interop testing it was discovered that the spec is not clear
      that [Algorithm Suite] applies to message level cryptography and NOT
      transport-level cryptography when used in a Transport Binding.
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00053.html">Martin Gudgin</origin>
    <owner>Editors</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00053.html" />
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Proposal 1 amended as follows and accepted on March 15th TC call. Amendment to proposal 1: add text explaining the reason for this is that
      transport protocol (IPSEC and SSL) already have techniques for selecting
      the algorithm.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i050" status="Closed">
    <title>
      Clarify scope of Protection assertions
    </title>
    <description>
      Section 4 states, of Protection Assertions;<h:br />
      "These assertions SHOULD apply to [Message Policy Subject]."<h:br />
      but does not explicitly disallow their applicability at [Endpoint Policy
      Subject] or [Operation Policy Subject]
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00056.html">Martin Gudgin</origin>
    <owner>Editors</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00056.html" />
    <resolution date="2006-03-15" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00064.html">
      Proposal 1 accepted on March 15th TC call.
    </resolution>
    <resolution date="2006-03-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17389/ws-securitypolicy-1.2-spec-ed-01-r05.pdf">
      Revision 5 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Moved to Closed at April 4th F2F.
    </resolution>
  </issue>
  <issue id="i051" status="Closed">
    <title>sp:RequireDerivedKeys is underspecified</title>
    <description>
      Section 5.2 defines a [Derived Keys] property and Section 5.3 defines an
      sp:RequireDerivedKeys assertion that populates that property. Although
      WS-SecureConversation allows for two serialized forms of derived keys;
      implicit and explicit, WS-SecurityPolicy does not provide a mechanism to
      constrain derived keys to one or the other form.
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00100.html">Martin Gudgin</origin>
    <owner>Martin Gudgin</owner>
    <proposal date="2006-03-29" href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00100.html" />
    <resolution date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">
      Proposal 1 accepted at April 5th F2F.
    </resolution>
    <resolution date="2006-04-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17889/ws-securitypolicy-1.2-spec-ed-01-r06.pdf">
      Editor version with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-03" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00008.html">
      Moved to Closed at May 3rd TC call.
    </resolution>
  </issue>
  <issue id="i052" status="Closed">
    <title>
      Add single request for multiple tokens
    </title>
    <description>
      There are occasions where efficiency is important. Reducing the number of messages in a message exchange pattern can greatly improve efficiency. One way to do this in the context of WS-Trust is to avoid repeated round-trips for multiple related token requests. An example is requesting an identity token as well as tokens that offer other claims in a single operation.
    </description>
    <protocol revision="ed-01-r3">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00111.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00111.html" />
    <proposal date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">Edits from F2F discussion to proposal 1</proposal>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">
      Proposal 2 accepted at April 4 F2F. Also result of AI-2006-04-04-02 from April 4/5 F2F minutes.
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17737/ws-trust-1.3-spec-ed-01-r05-diff.pdf">
      Revision 5 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
  </issue>
  <issue id="i053" status="Closed">
    <title>
      Message parts to be protected using BootstrapPolicy
    </title>
    <description>
      SecureConversationToken has BootstrapPolicy which is used to secure the SecureConversation protocol messages.
      How are the Signed(Parts/Elements)/Encrypted(Parts/Elements)that are to be secured using the Bootstrap policy obtained . Are they implicit.
    </description>
    <protocol revision="ed-01-r5">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00116.html">Venu</origin>
    <owner>Venu</owner>
    <proposal date="2006-04-19" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00077.html" />
    <resolution date="2006-04-19" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00079.html">
      Proposal 1 accepted on April 19th TC Call.
    </resolution>
    <resolution date="2006-04-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17889/ws-securitypolicy-1.2-spec-ed-01-r06.pdf">
      Editor version with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-03" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00008.html">
      Moved to Closed at May 3rd TC call.
    </resolution>
  </issue>
  <issue id="i054" status="Dropped">
    <title>
      Clarification on Signature Protection property and various SupportingTokens
    </title>
    <description>
      How is SignatureProtection property(EncryptSignature assertion ) and its scope different from TokenProtection property ?. When
      SignatureProtection property is true how should one treat Signature elements belonging to SignedSupportingTokens/
      SignedEndorsingSupportingTokens/EndorsingSupportingTokens .
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00117.html">Venu</origin>
    <owner>Venu</owner>
    <resolution date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">
      Closed with no action as TC determined no changes required to spec at April 5th F2F.
    </resolution>
  </issue>
  <issue id="i055" status="Dropped">
    <title>
      Clarification on RequireDerivedKeys and X509Token under AsymmetricBinding
    </title>
    <description>
      What does it mean when we have X509Token( with RequireDerivedKeys assertion) under
      Initiator Token and Recipient Token of AsymmetricBinding. How are the keys derived when
      this is the policy configuration.

      Trying to apply lines 795 and 796 apply here, should one generate two symmetric keys one for
      Initiator Token and Recipient Token, both encrypted for the recipient ?.
      If the above is true then is the statement "encrypted with the key material associated with the token."
      on line 796 correct?.
      Eg: The Key associated with InitiatorToken on the client side is a client certificate and not the recipient certificate.
    </description>
    <protocol revision="ed-01-r3">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00118.html">Venu</origin>
    <owner>Venu</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00062.html" />
    <resolution date="2006-06-07" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00017.html">
      Closed with no action on June 7th TC call.
    </resolution>
    <relid>AI-2006-05-03-01</relid>
  </issue>
  <issue id="i056" status="Closed">
    <title>
      Add new Bearer Token KeyType
    </title>
    <description>
      <h:p>
        The WS-Trust specification defines a &lt;wst:KeyType&gt; element that allows
        the requestor to express the type of key desired in the issued security
        token. Currenly, WS-Trust specification defines two key types:<h:br />
        * public key<h:br />
        * symmetric key
      </h:p>
      <h:p>
        This issue proposes to add a third key type - a NoProofKey. This key
        type can be used by requestors to indicate that they want a security
        token to be issued without any key material to proof the possession of
        the issued security token.
      </h:p>
    </description>
    <protocol revision="ed-01-r4">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00005.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00005.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">Proposal 1 revised at April 4 F2F, see minutes.</proposal>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Proposal 2 accepted at April 4th F2F.
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17737/ws-trust-1.3-spec-ed-01-r05-diff.pdf">
      Revision 5 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
  </issue>
  <issue id="i057" status="Closed">
    <title>
      Final protocol message should always be an RSTRC
    </title>
    <description>
      <h:p>
        Make the final protocol leg always be an RSTRC (rather than either an RSTR or an RSTRC as it is currently). So the protocol becomes; RST, RSTR*, RSTRC.
        Currently a STS can use either RSTR or RSTRC to return the issued token(s) to the requestor. Even in the simplest case when a requestor ask for a token and STS immediately responds with a issued token in the reply, the requestor must be prepared to process both RSTR and RSTRC style responses because STS can use RSTRC even for a single token.
        This change makes the protocol easier to reason about and easier to implement because a requestor knows that the issued token will be always returned using RSTRC style response.
      </h:p>
    </description>
    <protocol revision="ed-01-r4">ws-trust</protocol>
    <protocol revision="ed-01-r6">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00006.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00006.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">Proposal 1 revised at April 4 F2F, see minutes.</proposal>
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Proposal 2 accepted at April 4th F2F.
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17737/ws-trust-1.3-spec-ed-01-r05-diff.pdf">
      Revision 5 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18840/ws-secureconversation-1.3-spec-ed-01-r06-diff.pdf">
      Revision 6 of SC contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied for SC.
    </resolution>
    <relid>i059</relid>
  </issue>
  <issue id="i058" status="Closed">
    <title>
      Validate binding should have a ValidateTarget
    </title>
    <description>
      <h:p>
        Add a wst:ValidateTarget element to the RST of the validate binding. This provides a determinisitic way of identifying the token that requires validation. Currently there is element defined that points to a security token that the requestor wants to be validated.
      </h:p>
      <h:p>
        We have wst:CancelTarget, wst:RenewTarget but we currently don't have wst:ValidateTarget. This proposal aligns the Validate binding request format with other bindings' request formats.
      </h:p>
    </description>
    <protocol revision="ed-01-r4">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00007.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00007.html" />
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Proposal 1 accepted at April 4th F2F.
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17737/ws-trust-1.3-spec-ed-01-r05-diff.pdf">
      Revision 5 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
    <relid>i034</relid>
  </issue>
  <issue id="i059" status="Closed">
    <title>
      Final protocol message should have a distinct action
    </title>
    <description>
      <h:p>
        Make the WS-Addressing action of the final protocol message distinct from that of intermediate message used for negotiation.
      </h:p>
      <h:p>
        Currently it is not possible to distinguish messages sent during the negotiation phase from the final message in the conversation without looking at the message body content of every message. The final message is different than the intermediary messages because it always carries the issued token that the requestor asked for in the initial RST message. The requestor might want to process the last message differently than the intermediary messages. Using a distinct WS-Addressing action helps to do that.
      </h:p>
    </description>
    <protocol revision="ed-01-r4">ws-trust</protocol>
    <target>spec</target>
    <target>wsdl</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00008.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00008.html" />
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Proposal 1 accepted at April 4th F2F.
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17737/ws-trust-1.3-spec-ed-01-r05-diff.pdf">
      Revision 5 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
    <relid>i057</relid>
  </issue>
  <issue id="i060" status="Closed">
    <title>
      New binding for STS starting the token cancellation process
    </title>
    <description>
      <h:p>
        Currently the WS-Trust spec does not provide a way for a STS to initiate the security token cancellation. Only the client is able to cancel the security token by sending a RST/Cancel message to the STS as described by the Cancel binding in section 6. This issue proposes to add a new option binding to the WS-Trust specification that will enable STS to cancel the security token by sending a one-way message to the client endpoint. This binding can be used only when the client has an addressable endpoint that the STS can use to send a one-way message to the client.
      </h:p>
    </description>
    <protocol revision="ed-01-r4">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00009.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00009.html" />
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Proposal 1 accepted at April 4th F2F. Note AI-2006-04-04-06
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17737/ws-trust-1.3-spec-ed-01-r05-diff.pdf">
      Revision 5 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
  </issue>
  <issue id="i061" status="Closed">
    <title>
      Add wsc:Length attribute to the Implied derived key
    </title>
    <description>
      <h:p>
        The section 7.3 describes how to use a shortcut mechanism to derive keys
        using security token reference. This issue proposes to add a wsc:Length
        attribute description to this section to define the length of the
        derived key.
      </h:p>
      <h:p>
        The reason for adding @wsc:Length is to allow sender to specify the
        length of the derived key for the recipient. Currently there is no way
        how to pass this information for implied derived keys. Additionally, no
        default value is currently defined for the implied derived key
        mechanism.
      </h:p>
    </description>
    <protocol revision="ed-01-r4">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00010.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00010.html" />
    <resolution date="2006-04-04" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">
      Proposal 1 accepted at April 4th F2F.
    </resolution>
    <resolution date="2006-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/17733/ws-secureconversation-1.3-spec-ed-01-r05-diff.doc">
      Revision 5 of SC contains resolution for review.
    </resolution>
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Moved to Closed at April 26th TC call.
    </resolution>
  </issue>
  <issue id="i062" status="Closed">
    <title>Where is UML generated schema more restrictive than the SP schema?</title>
    <description>
      Provide information on where the UML generated schema might be more restrictive than the SP schema when the SP spec reaches a more stable point.
    </description>
    <protocol revision="ed-01-r4">sp</protocol>
    <target>schema</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">AI-2006-03-22-01</origin>
    <resolution date="2007-02-21" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00052.html" >
      CLosed with no action.
    </resolution>
    <owner>Tony Nadalin</owner>
  </issue>
  <issue id="i063" status="Closed">
    <title>
      Error in the WS-SecurityPolicy Schema
    </title>
    <description>
      There are three minor problems in the WS-SecurityPolicy schema XSD file, oasis-wssx-ws-securitypolicy-1.0.xsd , version 2, http://www.oasis-open.org/apps/org/workgroup/ws-sx/document.php?document_id=16373.
    </description>
    <protocol revision="ed-01-r5">ws-sp</protocol>
    <target>schema</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00128.html">Symon Chang</origin>
    <owner>Editors</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00128.html" />
    <resolution date="2006-04-05" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00035.html">
      Proposal 1 accepted at April 5th F2F.
    </resolution>
    <resolution date="2006-05-09" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18088/oasis-wssx-ws-securitypolicy-1.0.xsd">
      Editor version of schema with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-17" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00039.html">
      Accepted edits as applied.
    </resolution>
    <relid>AI-2006-05-03-05</relid>
  </issue>
  <issue id="i064" status="Dropped">
    <title>Should SecureConversation support batch semantics as created by Issue 52?</title>
    <description>Should SecureConversation support batch semantics as created by Issue 52?</description>
    <protocol revision="ed-01-r4">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">F2F discussion of issue 52</origin>
    <owner>Tony Nadalin</owner>
    <resolution date="2006-05-03" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00008.html">
      No use case. Will reopen if one is presented.
    </resolution>
    <relid>AI-2006-04-05-03</relid>
  </issue>
  <issue id="i065" status="Closed">
    <title>Permitting requestors to avoid receiving cancel messages</title>
    <description>Permitting requestors to avoid recieving cancel messages</description>
    <protocol revision="ed-01-r4">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00027.html">F2F discussion of i060</origin>
    <owner>Tony and Jan</owner>
    <proposal date="2005-05-09" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00017.html" />
    <resolution date="2006-05-10" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00027.html">
      Proposal 1 accepeted at May 10th TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18833/ws-trust-1%5B1%5D.3-spec-ed-01-r08-diff.pdf">
      Revision 8 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied.
    </resolution>
    <relid>i060</relid>
    <relid>AI-2006-05-03-02</relid>
  </issue>
  <issue id="i066" status="Closed">
    <title>
      SecurityPolicy use cases
    </title>
    <description>
      SecurityPolicy use cases
    </description>
    <protocol revision="contrib">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00031.html">Ashok Malhotra</origin>
    <owner>Ashok Malhotra</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200611/msg00005.html">
      Updated from <h:a href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00025.html">original proposal</h:a>.
    </proposal>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18833/ws-trust-1%5B1%5D.3-spec-ed-01-r08-diff.pdf">
      Closed Closed in Nov 29th TC meeting. Updates to the Examples document shoudl be submitted as new issues.
    </resolution>
  </issue>
  <issue id="i067" status="Dropped">
    <title>
      Resolving Policies if more than one SecureConversationToken is
      present
    </title>
    <description>
      <h:p>
        When a service has more than one SecureConversationToken defined in a
        policy and if the Issuer is absent, then when a client sends a RST to
        the service for SignatureToken how will the service know if the request
        is for SignatureToken or Encryption Token. IMO RST does not have such
        information, it gets complicated for the service to pick the right
        bootstrap policy to verify the incoming message.
      </h:p>
      <h:p>
        I have attached a <h:a href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00059.html">sample policy file</h:a> to describe the problem. Appreciate
        if the spec recommends proper usage of SecureConversationToken and
        provides an ability to identify the tokens
        when multiple of them are allowed in the policy.
      </h:p>
    </description>
    <protocol revision="ed-01-r4">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00059.html">Venu</origin>
    <owner>Venu</owner>
    <resolution date="2006-07-19" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00057.html">
      Closed with no action <h:a href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00055.html">per AI-2006-05-03-03</h:a> on July 19th TC call.
    </resolution>
    <relid>AI-2006-05-03-03</relid>
  </issue>
  <issue id="i068" status="Closed">
    <title>
      Security considerations for relying parties
    </title>
    <description>
      Raised as result of AI-2006-04-04-06.
    </description>
    <protocol revision="ed-01-r5">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00083.html">AI-2006-04-04-06</origin>
    <owner>Editors</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00083.html" />
    <resolution date="2006-04-26" href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00089.html">
      Proposal 1 accepted on Apr 26th TC call.
    </resolution>
    <resolution date="2006-05-09" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18086/ws-trust-1%5B1%5D.3-spec-ed-01-r07-diff.pdf">
      Editor version with resolution applied available for review.
    </resolution>
    <resolution date="2006-05-17" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00039.html">
      Accepted edits as applied.
    </resolution>
    <relid>AI-2006-05-03-04</relid>
  </issue>
  <issue id="i069" status="Closed">
    <title>
      Default assertions and policy intersections
    </title>
    <description>
      WS-SecurityPolicy specifies default nested policy assertions and from policy intersection perspective, these assertions must be explicitly stated to avoid false negatives.
    </description>
    <protocol revision="ed-01-r6">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00016.html">Tony Nadalin</origin>
    <owner>Tony Nadalin</owner>
    <proposal date="2006-05-08" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00016.html" />
    <resolution date="2006-05-17" href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00039.html">
      Proposal 1 accepted on May 17th TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18837/ws-securitypolicy-1.2-spec-ed-01-r07.pdf">
      Revision 7 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied.
    </resolution>
  </issue>
  <issue id="i070" status="Dropped">
    <title>
      Clarify relationship between extensibility model and policy intersection
    </title>
    <description>
      <h:p>
        Section 11 of the WS-SecurityPolicy draft provides clear guidance on
        extending existing  policy assertions  or  defining new ones.
        However, the policy assertion matching rules  (Section 3.1.3) raise some
        questions about the use of assertions with extensions, specifically
        lines 364-365:
      </h:p>
      <h:p>
        [quote]<h:br />
        An assertion with an empty nested policy does not intersect with the
        same assertion without
        nested policy.<h:br />
        [quote]
      </h:p>
      <h:p>
        If a server offered a service with policy expression:
      </h:p>
      <h:p>
        &lt;sp:SupportingToken&gt;<h:br />
        &lt;wsp:Policy&gt;<h:br />
        &lt;sp:UserNameToken/&gt;<h:br />
        &lt;/wsp:Policy&gt;<h:br />
        &lt;sp:SupportingToken&gt;
      </h:p>
      <h:p>
        and the client policy includes nested policy assertion &lt;orcl:IncludesPassword=""&gt; as in:
      </h:p>
      <h:p>
        &lt;sp:SupportingToken&gt;<h:br />
        &lt;wsp:Policy&gt;<h:br />
        &lt;sp:UserNameToken&gt;<h:br />
        &lt;wsp:Policy&gt;<h:br />
        &lt;orcl:IncludesPassword&gt;<h:br />
        &lt;/wsp:Password&gt;<h:br />
        &lt;/wsp:Policy&gt;<h:br />
        &lt;sp:SupportingToken&gt;
      </h:p>
      <h:p>
        Then should not the two policy expressions match? As things stand, the
        two expressions will not match even though the client is fully able to
        satisfy the server's expectations.
      </h:p>
    </description>
    <protocol revision="ed-01-r6">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00030.html">Prateek Mishra</origin>
    <owner>Prateek Mishra</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00030.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00020.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00068.html" />
    <resolution date="2006-07-19" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00057.html">
      Closed with no action on July 19th TC call per following:<h:br />
      Decision to raise within WS-Policy.<h:br />
      Request to WS-Policy WG to provide section number with stable fragment ids we can use<h:br />
      Note, section 3.1 also removed per previous issue
    </resolution>
  </issue>
  <issue id="i071" status="Closed">
    <title>Guidance on Policy Application</title>
    <description>
      The only place in WS_SecurityPolicy which seems to address exactly what
      WS-SP is supposed to be used for is section 1. Currently it says:

      "WS-Policy defines a framework for allowing web services to express
      their constraints and requirements. [...] This document takes the
      approach of defining a base set of assertions that describe how messages
      are to be secured. [...] The intent is to provide enough information for
      compatibility and interoperability to be determined by web service
      participants along with all information necessary to actually enable a
      participant to engage in a secure exchange of messages."

      This seems to leave a lot of questions unanswered. Is a consumer
      required to use SP? Is SP suitable for expressing a Consumer's policy?
      Does an SP represent an enforceable access control policy? Can a Web
      Service reject messages which conform to its policy?

      It seems to me desirable that the spec provide more specific guidance on
      what is expected.
    </description>
    <protocol revision="ed-01-r6">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00065.html">Hal Lockhart</origin>
    <owner>Hal Lockhart</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00065.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00036.html" />
    <resolution date="2006-06-21" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00055.html">
      Proposal 2 ammended with
      "for example because a client certificate has expired" to "for
      example because a client certificate has been revoked"
      and accepted on June 21st TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i072" status="Closed">
    <title>Missing KeyWrapAlgorithm requirement in section 9.2</title>
    <description>
      Currently there is no way how to indicate KeyWrapAlgorithm requirement in the RST if the STS uses asymmetric key to protect the issued token for the relying party. This issue proposes this additional optional parameter to be added to the section 9.2
    </description>
    <protocol revision="ed-01-r7">ws-trust</protocol>
    <target>spec</target>
    <target>schema</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00000.html">Jan Alexander</origin>
    <owner>Editors</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00000.html" />
    <resolution date="2006-06-07" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00017.html">
      Proposal 1 accepted on June 7th TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18833/ws-trust-1%5B1%5D.3-spec-ed-01-r08-diff.pdf">
      Revision 8 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied.
    </resolution>
  </issue>
  <issue id="i073" status="Closed">
    <title>
      Key and Encryption Requirements Clarification
    </title>
    <description>
      Currently, the section 9.2 in WS-Trust specification defines various
      elements that can be used to request specific types of keys or
      algorithms for the returned token and the RSTRC message. The current
      description of some of those parameters is not clear enough for the
      reader to understand how they affect the issued token and the returned
      RSTRC message. This issue proposes an additional description to clarify
      those parameters.
      This issue already depends on the other issue that is being raised that
      proposes to add a new optional parameter to the RST - KeyWrapAlgorithm. (Issue 72)
    </description>
    <protocol revision="ed-01-r7">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00001.html">Jan Alexander</origin>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00001.html" />
    <resolution date="2006-06-07" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00017.html">
      Proposal 1 accepted on June 7th TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18833/ws-trust-1%5B1%5D.3-spec-ed-01-r08-diff.pdf">
      Revision 8 of Trust contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied.
    </resolution>
    <relid>i072</relid>
  </issue>
  <issue id="i074" status="Closed">
    <title>
      Add &lt;EncryptSupportingToken&gt; element to Sections 7.4 and7.5
    </title>
    <description>
      There are many security contexts in which supporting tokens in
      (a)symmteric bindings are required to be encrypted. Typically, the
      supporting token is a username, saml or proprietary token but other
      possibilities also exist. This note proposes the addition of an
      &lt;EncryptSupportingToken&gt; element to symm. and asymm. bindings within ws-sp.
    </description>
    <protocol revision="ed-01-r6">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00009.html">Prateek Mishra</origin>
    <owner>Prateek Mishra</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00009.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00021.html" />
    <resolution date="2006-06-21" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00055.html">
      Proposal 2 accepted on June 21st TC call.
      <!-- note this incorrectly said proposal 1 had been accepted, minutes say it was proposal 2--></resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i075" status="Closed">
    <title>HTTP Auth Subassertions</title>
    <description>We don't have a way in WS-SP to express HTTP authentication modes beyond 'use client certs' and 'don't use client certs'. It would probably behoove us to define nested assertions that would live inside sp:HttpsToken.</description>
    <protocol revision="ed-01-r7">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00014.html">Marc Goodner</origin>
    <owner>Marc Goodner</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00014.html" />
    <resolution date="2006-06-14" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00024.html">
      Proposal 1 accepted on June 14th TC call.
    </resolution>
    <resolution date="2006-06-20" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/18837/ws-securitypolicy-1.2-spec-ed-01-r07.pdf">
      Revision 7 of SP contains resolution for review.
    </resolution>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Accepted edits as applied.
    </resolution>
  </issue>
  <issue id="i076" status="Dropped">
    <title>How to reference a specific SC when initiating a session?</title>
    <description>
      This issue concerns the following use-case: a requestor wishes to
      participate in a multi-message session with a recipient.
      The requestor  acquires a SC token by some means from its local security
      system and adds it to the security header of a SOAP message.
      The SOAP message is meant to initiate a sequence of exchanges with the
      recipient, all of which are to be protected by the SC token. Notice that
      in general, the SOAP message may carry several security headers
      including other security tokens.

      How can the requestor indicate to the recipient that a specific SC token
      is to be used for the session?
    </description>
    <protocol revision="ed-01-r7">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00045.html">Prateek Mishra</origin>
    <owner>Prateek Mishra</owner>
    <resolution date="2006-06-28" href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00076.html">
      Closed with no action on June 28th TC call.
      There is already material in SC to use a freestanding RSTR in the response.
      Remaining part of issue is now documented in issue 77.
    </resolution>
    <relid>i077</relid>
  </issue>
  <issue id="i077" status="Dropped">
    <title>Use of Section 8 from WS-SC forces applications to be WSS schema aware</title>
    <description>
      <h:p>
        In many application processing protocols, there is a need to correlate
        security tokens with certain application messages.
        For example, there may be an expectation that a specific key is
        available when a certain message is processed.
        To deal with this requirement, we need some means of "connecting" one or
        more security tokens with an application message.
      </h:p>
      <h:p>
        Section 8 of WS-SC describes one solution to this problem. It suggests
        that application message itself can include a STR referring to a secuity
        token. While this solves the problem it does so at the cost of
        propagating knowledge of WSS schema (and version) to every application
        protocol that uses this technique. This is a very intrusive solution
        with a high cost in complexity.
      </h:p>
    </description>
    <protocol revision="ed-01-r7">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00061.html">Prateek Mishra</origin>
    <owner>Prateek Mishra</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00061.html" />
    <resolution date="2006-08-02" href="">
      Closed with no action on August 2nd TC call.
    </resolution>
  </issue>
  <issue id="i078" status="Closed">
    <title>
      Specify Reference Types for References to SCT
    </title>
    <description>
      <h:p>
        Chapter 8 says that a STR may be used to reference an SCT, but does not
        specify what reference types may be used as was done in the WSS Token
        Profiles. In particular there are use cases for referencing an SCT by
        its wsc:Identifier value.
      </h:p>
      <h:p>
        The example in Chapter 8 shows a reference being made using a wsu:Id,
        but the text does not really specify what is allowed or not allowed. For
        example, can an Absolute URI be used or only a relative one.
      </h:p>
      <h:p>
        There are a number of usecases where it would be desirable to reference
        an SCT by its wsc:Identifier value.
      </h:p>
      <h:p>
        1. When the SCT is only conveyed in the first message, especially if
        there is more than one context active.
      </h:p>
      <h:p>
        2. When reference is made from the Body or other Header element to the
        SCT it is desirable to have a message-independent means of referencing
        the SCT.
      </h:p>
    </description>
    <protocol revision="ed-01-r7">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00063.html">Hal Lockhart</origin>
    <owner>Hal Lockhart</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00091.html">
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00045.html">Original proposal</h:a>.
    </proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00024.html" date="2006-08-10" />
    <resolution date="2006-08-16" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00044.html">
      Proposal 2 accepted, moved to pending and assigned to editors on Aug. 16th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
    <relid>i076</relid>
  </issue>
  <issue id="i079" status="Closed">
    <title>
      Is Bootstrap policy a PolicyAssertion
    </title>
    <description>
      The SecurityPolicy spec does not clearly state if Bootstrap policy is to
      be treated as a PolicyAssertion and  should it be considered for policy
      normalization ?.
      If BootstrapPolicy is a PolicyAssertion , I would request it to be added
      to Appendix A .
    </description>
    <protocol revision="ed-01-r7">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00072.html">Venu</origin>
    <owner>Venu</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00041.html" />
    <proposal>Direct editors to add bootstrap policy to appendix a</proposal>
    <resolution date="2006-07-19" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00057.html">
      Proposal 2 accepted on July 19th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i080" status="Closed">
    <title>
      Handling EncryptParts specified under SupportingTokens
    </title>
    <description>
      It is not clear from the spec on how EncryptParts specified under
      supportingtokens need to be secured.
      eg :  If the X509Token present under a SupportingToken is that of the
      sender , how can it be used to encrypt the message parts identified by
      EncryptParts/Elements that are specified under the supporting token. <h:a href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00073.html">see mail for example</h:a></description>
    <protocol revision="ed-01-r7">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00073.html">Venu</origin>
    <owner>Venu</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00043.html" />
    <resolution date="2006-07-19" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00057.html">
      Proposal 1 accepted on July 19th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i081" status="Closed">
    <title>
      Provide policy statements and associated URIs that can be
      referenced from wsp:PolicyReference statements
    </title>
    <description>
      Policy statements will not successfully intersect if one has a nested
      policy statement and the other does not. This means that if one message
      participant wishes to accept all variations of an assertion, and the
      other specifies only one variant, it is necessary for the first to
      explicitly list all variations rather than none. This can be cumbersome
      and can have a negative impact on adoption, and interoperability if done
      incorrectly. WS-SX should provide common set of referenced security
      assertions and associated URIs.
    </description>
    <protocol revision="contrib">examples</protocol>
    <target>policy</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00079.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200606/msg00079.html" />
    <resolution date="2006-11-29" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00083.html">
       Closed with no action on Nov 29th TC call.
    </resolution>
    <relid>i066</relid>
  </issue>
  <issue id="i082" status="Closed">
    <title>
      Remove duplicate RFC2119 reference
    </title>
    <description>
      <h:p>
        two identical references with different tags:
      </h:p>
      <h:p>
        [RFC2119]         S. Bradner, Key words for use in RFCs to Indicate
        Requirement Levels, http://www.ietf.org/rfc/rfc2119.txt, IETF RFC 2119, March 1997.
      </h:p>
      <h:p>
        [KEYWORDS]         S. Bradner, "Key words for use in RFCs to Indicate
        Requirement Levels," RFC 2119, Harvard University, March 1997
      </h:p>
      <h:p>
        Keep first, more descriptive. Replace any KEYWORDS references with
        RFC2119 references in document.
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00006.html">Frederick Hirsch</origin>
    <owner>Editors</owner>
    <proposal>See description</proposal>
    <resolution date="2006-07-12" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00035.html">
      Proposal 1 accepted on July 12th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i083" status="Closed" closed="2006-10-11">
    <title>
      Remove shading from figures, possibly enlarge
    </title>
    <description>
      The shading in the figures obscures the text and makes the figures harder to read, without adding value. Remove the shading from the figures. In particular at lines 2630, 2914, 3064. If possible make these figures slightly larger.
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00000.html">Frederick Hirsch</origin>
    <owner>Editors</owner>
    <proposal>Remove the shading from the figures at lines 2630, 2914, 3064. If possible make these figures slightly larger.</proposal>
    <resolution date="2006-07-12" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00035.html">
      Proposal 1 accepted on July 12th TC call.
    </resolution>
    <resolution date="2006-10-11" href="http://www.oasis-open.org/archives/ws-sx/200610/msg00025.html">
      Edits applied in r10 of SP. Status changed to Closed on Oct. 11th TC call.
    </resolution>
  </issue>
  <issue id="i084" status="Closed">
    <title>
      Assertions with nested policy do not indicate it
    </title>
    <description>
      <h:p>
        The specification states at line 352:
        "Assertions MUST specify whether or not they contain nested policy."
      </h:p>
      <h:p>
        However most of the policy examples in the document do not do so.
        (Only the example on this topic at line 340 does)  Either this statement should be removed or the
        examples updated. This may be an issue with the stability of WS-Policy.
      </h:p>
      <h:p>
        Policy statements in particular: lines 21, 295, 318, 381, 406, 438, 467, 503, 3177
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00001.html">Frederick Hirsch</origin>
    <owner>Editors</owner>
    <proposal>Remove statement at line 352, no longer required in WS-Policy submission to W3C. Also remove example at line 340 and appropriate text.</proposal>
    <resolution date="2006-07-12" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00035.html">
      Proposal 1 accepted on July 12th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i085" status="Closed">
    <title>
      Replace ID with Id for Id attribute
    </title>
    <description>
      <h:p>
        At line 111, "specifications requiring such an ID or timestamp could reference it (as is done here)" replace ID with Id
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00002.html">Frederick Hirsch</origin>
    <owner>Editors</owner>
    <proposal>s/such an ID or timestamp/such an Id attribute or timestamp element/</proposal>
    <resolution date="2006-07-12" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00035.html">
      Proposal 1 accepted on July 12th TC call. Note editors to identify correct edit and notify TC.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i086" status="Closed" closed="2006-10-11">
    <title>
      No policy support for content encryption?
    </title>
    <description>
      <h:p>
        The EncryptedElements assertion requires element encryption, at line 724. There is no corresponding EncryptedContent assertion. So there is no way to require encryption of the content of an element (e.g.
        xenc Type xmlenc#Content), only an element itself. This could be a limitation to policy expressiveness, when element content needs to be secured but the element itself not.
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00003.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00029.html" />
    <resolution date="2006-09-20" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00049.html">
      Proposal 1 accepted on September 20th TC call.
    </resolution>
    <resolution date="2006-10-11" href="http://www.oasis-open.org/archives/ws-sx/200610/msg00025.html">
      Edits applied in r10 of SP. Status changed to Closed on Oct. 11th TC call.
    </resolution>
  </issue>
  <issue id="i087" status="Dropped">
    <title>
      Matching assertion with empty nested Policy with assertion with no nested policy
    </title>
    <description>
      <h:p>
        The spec states at line 372 "An assertion with an empty nested policy does not intersect with the same assertion without nested policy."
      </h:p>
      <h:p>
        This does not make sense, they both  mean exactly the same thing.
      </h:p>
      <h:p>
        Perhaps this is an issue for W3C Policy group, but &lt;assertion /&gt; and &lt;assertion&gt; &lt;policy /&gt; &lt;/assertion&gt; should mean the same thing?
        Shouldn't an engine treat them as equal?
      </h:p>
      <h:p>
        Should policy normalization process include this?
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00004.html">Frederick Hirsch</origin>
    <resolution date="2006-07-12" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00035.html">
      Closed with no action on July 12th TC call as there is a <h:a href="http://lists.w3.org/Archives/Public/public-ws-policy/2006Jul/0013.html">related issue in the W3C Policy WG</h:a>.
    </resolution>
  </issue>
  <issue id="i088" status="Closed">
    <title>
      No XPath default
    </title>
    <description>
      <h:p>
        In a number of places an optional attribute is used to indicate the version of XPath to use, with the text "This optional attribute contains a URI which indicates the version of XPath to use."
      </h:p>
      <h:p>
        Would it help interoperability to define the default version of XPath to use if attribute is not stated?
      </h:p>
      <h:p>
        Places where this occurs:<h:br />
        646 /sp:SignedElements/@XPathVersion<h:br />
        725 /sp:EncryptedElements/@XPathVersion<h:br />
        755 /sp:RequiredElements/@XPathVersion
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00005.html">Frederick Hirsch</origin>
    <owner>Editors</owner>
    <proposal>In every instance specify default to use if no attribute specified. Xpath 1.0 (as opposed to 2.0)?</proposal>
    <resolution date="2006-07-12" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00035.html">
      Proposal 1 accepted on July 12th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i089" status="Closed">
    <title>
      Minor editorial comments on security policy
    </title>
    <description>
      <h:p>
        a) Line 214, remove comma from "The intent of representing characteristics as assertions, is so that QName matching"
      </h:p>
      <h:p>
        b) Line 249<h:br />
      s/protection encryption/encryption/<h:br />
        in "The bindings are identified primarily by the style of protection encryption used to protect the message exchange."
      </h:p>
      <h:p>
        c) Line 653<h:br />
      Change "Multiple instances of this element may appear within this assertion and should be treated as separate references in the signature." to "Multiple instances of this element may appear within this assertion and should be treated as separate references in a signature when WSS is used."
      i.e., s/.$/ when WSS is used./<h:br />
        (Note that SignedElements may be satisfied using transport security, in which case no special action is required if all is protected).
      </h:p>
      <h:p>
        d) line 1460, are planning on defining the AbsXPath URI in the sp namespace, or do we have a candidate namespace in mind? Remember to replace TBD.
      </h:p>
      <h:p>
        e) add at line 3545, "This section may not apply when transport level security is applied."
        (or more generally, clarify what is required when transport security used - ie endorsing signatures)
      </h:p>
      <h:p>
        f) Remove Section F at line 3601. Stated earlier in document what is non-normative.
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00007.html">Frederick Hirsch</origin>
    <owner>Editors</owner>
    <proposal>See description</proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00023.html">Nits to original proposal</proposal>
    <resolution date="2006-07-12" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00035.html">
      Proposal 2 accepted on July 12th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i090" status="Closed" closed="2006-11-29">
    <title>
      Description of Strict Formatting seems wrong for EncryptedKey
    </title>
    <description>
      <h:p>
        Rules for strict format of security element seem incorrect in the case of encrypted key used with Asymmetric Key. It is my understanding that for every encryption, there will either be a ReferenceList (for
        Symmetric) or an EncryptedKey (for Asymmetric). However, the rules seem to require a tope level ReferenceList even when an EncryptedKey is present. This causes implementation problems, especially for WSS 1.0.
      </h:p>
      <h:p>
        Section 6.7.1 (lines 1528-1536) say:<h:br />
        ----<h:br />
        4.	If there are any encrypted elements in the message then a top
        level xenc:ReferenceList element MUST be present in the security header.
        The xenc:ReferenceList MUST occur before any xenc:EncryptedData elements in the security header that are referenced from the reference list.
        However, the xenc:ReferenceList is not required to appear before independently encrypted tokens such as the xenc:EncryptedKey token as defined in WSS.<h:br />
        5.	An xenc:EncryptedKey element without an internal reference list
        [WSS: SOAP Message Security 1.1] MUST obey rule (1).  An xenc:EncryptedKey element with an internal reference list MUST additionally obey rule (4).
        ----<h:br />
        But my understanding is that you use either an EncryptedKey or a ReferenceList, but not both. If this is not a simple error, but intentional, I will provide information about implementation difficulties.
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00028.html">Hal Lockhart</origin>
    <owner>Hal Lockhart</owner>
    <proposal>Change #4 to say ReferenceList or Encrypted Key.</proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00078.html">
      remove the words 'top level' from line 1503
    </proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00055.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00065.html" />
    <resolution date="2006-11-29" href="http://www.oasis-open.org/archives/ws-sx/200611/msg00003.html">
      Proposal 4 acceped on Nov. 1st TC call. Closed on Nov 29th TC call
    </resolution>
    <relid>AI-2006-07-12-02</relid>
  </issue>
  <issue id="i091" status="Closed">
    <title>
      security policy help for example C.3.2
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00008.html">See message.</h:a>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00007.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00065.html" />
    <resolution date="2006-07-26" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00083.html">
      Proposal 1 accepted on July 26th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i092" status="Closed">
    <title>Proposed SP change related to issue 52</title>
    <description>Opened to catch resolution to AI-2006-04-04-03</description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="">TC discussion</origin>
    <owner>Editors</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00042.html" />
    <resolution date="2006-07-19" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00057.html">
      Proposal 1 accepted on July 19th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
    <relid>AI-2006-04-04-03</relid>
    <relid>i052</relid>
  </issue>
  <issue id="i093" status="Dropped">
    <title>Need a holder for token assertions within the SupportingTokens assertions</title>
    <description>
      When listing the assertions within any of the SupportingTokens assertion types, the token(s) to use are placed at the same level as the other assertions describing the SupportingTokens assertion.
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00071.html">See message for complete description</h:a></description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00071.html">Tony Gullotta</origin>
    <owner>Tony Gullotta</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00071.html" />
    <resolution date="2006-08-02" href="">
      Closed with no action on August 2nd TC call based on <h:a href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00071.html">this rationale</h:a>.
    </resolution>
  </issue>
  <issue id="i094" status="Closed">
    <title>
      We need a definition for "domain" in WS-SecurityPolicy
    </title>
    <description>
      WS-SecurityPolicy uses the word "domain" in several places.  For
      example, in Section 3.1.3 bullet 4:
      "Assertions from one domain MUST NOT be nested inside assertions from
      another domain." ...
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00075.html">Ashok Malhotra</origin>
    <owner>Ashok Malhotra</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00075.html" />
    <resolution date="2006-08-09">
      Agreed to remove statement citing domain (in description of issue) on August 9th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i095" status="Closed">
    <title>
      Amend text for nested assertions in WS-SP
    </title>
    <description>
      Currently the description of the nested assertions in WS-SP reads
      something like;
      "This optional element indicates that ..."
      Some people have expressed confusion over whether such things are policy
      assertions or just elements.
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00075.html">Martin Gudgin</origin>
    <owner>Martin Gudgin</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00075.html" />
    <resolution date="2006-07-26" href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00083.html">
      Proposal 1 accepted on July 26th TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i096" status="Closed" closed="2006-10-11">
    <title>
      Ensure Appendix A is complete
    </title>
    <description>
      As we've mentioned in the calls several time, some assertions are
      missing from Appendix A.
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00077.html">Martin Gudgin</origin>
    <owner>Martin Gudgin</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00077.html" />
    <resolution date="2006-10-04">
      Status changed to Pending on Oct 4th TC call.
    </resolution>
    <resolution date="2006-10-11" href="http://www.oasis-open.org/archives/ws-sx/200610/msg00025.html">
      Edits applied in r10 of SP. Status changed to Closed on Oct. 11th TC call.
    </resolution>
  </issue>
  <issue id="i097" status="Closed">
    <title>
      No support for message level encryption of headers for WSS 1.0?
    </title>
    <description>
      Line 691-693 under /EncryptedParts/Header: "Such encryption will encrypt
      such elements using WSS 1.1 Encrypted Headers. As such, if WSS 1.1
      Encrypted Headers are not supported by a service, then headers cannot be
      encrypted using message level security."

      Does this mean ws-sp prohibits the encryption of headers using WSS 1.0?
      Or does this mean that *if* you're using WSS 1.1 you have to use
      EncryptedHeader? If the latter is the case, can /EncryptedParts/Header
      still be used to specify header encryption for WSS 1.0, or should
      EncryptedElements be used?
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00086.html">Corinna Witt</origin>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00092.html" />
    <resolution date="2006-08-02" href="">
      Proposal 1 accepted on August 2nd TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i098" status="Closed">
    <title>
      Inconsistencies related to SignedParts/* assertion
    </title>
    <description>
      <h:p>
        1. Line 605-607 about /SignedParts/Body say "...the entire body, that is
        the soap:Body element, it's attributes and content, of the message needs
        to be integrity protected". Line 608-618 about /SignedParts/Header don't
        say anything about whether the entire header needs to be integrity
        protected.
      </h:p>
      <h:p>
        2. Compare line 1796-1798 about
        /SymmetricBinding/Policy/OnlySignEntireHeadersAndBody "This assertion
        indicates that the [Entire Header And Body Signatures] property is set
        to 'true'."  with line 1499-1500 from 6.6 [Entire Header and Body
        Signatures] Property: "The default value for this property is 'false'."
        (same thing in asymmetric binding btw.)
      </h:p>
      <h:p>
        3. Assuming both SignedParts/Body and SignedParts/Headers are 'entire
        element' by default and OnlySignEntireHeadersAndBody is true by default,
        why do we need another assertion with the same default?
      </h:p>
      <h:p>
        4. It seems like a limitation to switch the default for 'entire element
        integrity protection' for headers and body wholesale - even more so if
        they turn out not to have the same default.
      </h:p>
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00089.html">Corinna Witt</origin>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00090.html" />
    <resolution date="2006-08-02" href="">
      Proposal 1 accepted on August 2nd TC call.
      Agreed to opening new issue(s) if needed for parts of the issue that Gudge 
      suggested there was no need to address.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i099" status="Dropped">
    <title>
      The &lt;IssuedTokens&gt; Element is not used by WS-SC
      </title>
    <description>
      WS-Trust (section 4.4) defines a &lt;wst:IssuedTokens&gt; element to be used to contain tokens 
      referenced by an RST or RSTR and also some other protocol. I am not entirely convinced that 
      this is all that useful, but I notice that it is NOT used by WS-SecureConversation. It seems 
      like it should be or should be dropped from WS-Trust.

        Presumably having a top level SOAP header element to contain tokens make it easier to find them. 
        It is not clear this has any benefit over putting then in the &lt;wsse:Security&gt;
        element. However, if it is a good idea, the WS-SC should use it as well.

        If it is used, the MustUnderstand semantics of it should be described as it is a top level element in the SOAP header.

    </description>
    <protocol revision="ed-01-r6">ws-sc</protocol>
    <protocol revision="ed-01-r8">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin>Hal Lockhart</origin>
    <owner>Hal Lockhart</owner>
    <proposal>
      a) Drop &lt;wst:IssuedTokens&gt;
        from WS-Trust.

      b) Add &lt;wst:IssuedTokens&gt;
        to WS-SC. Provide Rationale. Describe MustUnderstand semantics in both specs.

     </proposal>
    <resolution date="2006-08-23" href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00059.html">
      Closed with no action on August 23rd TC call.
    </resolution>
    <relid>i078</relid>
  </issue>
  <issue id="i100" status="Closed">
    <title>
      Lack of Rationale for choices of Authentication for WS-SC
    </title>
    <description>
      WS-SC defines 4 operations: Issue, Amend, Renew and Cancel.
      In the case of Amend, WS-SC does not specify what Authentication is required. In the case of Renew, it says the original claims must be re-authenticated. If the SCT has expired, its key must not be used to authenticate. The examples for Amend and Renew both show signatures which use both the long term Token and the SCT.
      In the case of Cancel, WS-SC says that the client must provide PoP of the SCT secret. The example shows only one signature, which uses the SCT.
      It is not clear a) the reason for these choices and b) why they are all different.


      For Amend and Renew, it seems to me that the Principle of Perfect Forward Secrecy suggests that the long term Identity be used in all these cases to authenticate the client. That way if the SCT secret is compromised, the request will still be protected. (If the long term secret is compromised, all bets are off anyway.)
      Also I don't understand why a Cancel requires specifically PoP of the SCT secret.
    </description>
    <protocol revision="ed-01-r6">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin>Hal Lockhart</origin>
    <owner>Hal Lockhart</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200608/msg00094.html" />
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Proposal 1 accepted and status changed to Review on Sept. 6th TC call. Edits were applied in SC ED01-r09 and 
      are reflected in CD01.
    </resolution>
    <resolution date="2006-09-13" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00035.html">
      Status changed to closed on Sept. 13th TC call.
    </resolution>
    <relid>i078</relid>
  </issue>
  <issue id="i101" status="Closed" closed="2006-11-29">
    <title>
      Need additional SamlToken Assertion Elements for Holder-of-Key and Sender-Vouches
    </title>
    <description>
      Comparable to the level of granularity defined for UsernameToken Assertions (lines 854-861 (NoPassword, HashPassword))
      and X509Token Assertions (lines 1004-1024 several token types), the SamlToken Assertion needs token types of
      sender-vouches and holder-of-key defined. As in the Username and
      X509 token cases, the WS 1.0 and WS 1.1
      Saml Token profiles identify these token types as explicit use cases that the profile supports.
      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0.pdf
      see line 495
      http://www.oasis-open.org/committees/download.php/16768/wss-v1.1-spec-os-SAMLTokenProfile.pdf
      see line 672
    </description>
    <protocol revision="contrib">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin>Rich Levinson</origin>
    <owner>Rich Levinson</owner>
    <proposal>
      Add the following lines after line 1322 in section 5.3.8:

      /sp:SamlToken/wsp:Policy/sp:WssSamlHolderOfKey
      This optional element identifies that a SAML holder-of-key token should be used as
      defined in [WSS: SAML Token Profile 1.0, 1.1].

      /sp:SamlToken/wsp:Policy/sp:WssSamlSenderVouches
      This optional element identifies that a SAML sender-vouches token should be used as
      defined in [WSS: SAML Token Profile 1.0, 1.1].

      The above proposal would require 2 elements to fully define the required token. An alternative
      approach would be to explicitly define the 2 tokens for all 3 supported versions as follows:

      /sp:SamlToken/wsp:Policy/sp:WssSamlV11Token10HolderOfKey
      This optional element identifies that a SAML Version 1.1 holder-of-key token should be used as
      defined in [WSS: SAML Token Profile 1.0].

      /sp:SamlToken/wsp:Policy/sp:WssSamlV11Token10SenderVouches
      This optional element identifies that a SAML Version 1.1 sender-vouches token should be used as
      defined in [WSS: SAML Token Profile 1.0].

      /sp:SamlToken/wsp:Policy/sp:WssSamlV11Token11HolderOfKey
      This optional element identifies that a SAML Version 1.1 holder-of-key token should be used as
      defined in [WSS: SAML Token Profile 1.1].

      /sp:SamlToken/wsp:Policy/sp:WssSamlV11Token11SenderVouches
      This optional element identifies that a SAML Version 1.1 sender-vouches token should be used as
      defined in [WSS: SAML Token Profile 1.1].

      /sp:SamlToken/wsp:Policy/sp:WssSamlV20Token11HolderOfKey
      This optional element identifies that a SAML Version 2.0 holder-of-key token should be used as
      defined in [WSS: SAML Token Profile 1.1].

      /sp:SamlToken/wsp:Policy/sp:WssSamlV20Token11SenderVouches
      This optional element identifies that a SAML Version 2.0 sender-vouches token should be used as
      defined in [WSS: SAML Token Profile 1.1].
    </proposal>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200609/msg00032.html">
      Updated from <h:a href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00058.html">original proposal</h:a>.
    </proposal>
    <resolution date="2006-11-29" href="http://www.oasis-open.org/archives/ws-sx/200611/msg00003.html">
      Status changed to Review on Nov. 1st TC call. See section 2.3 in 
      <h:a href="http://www.oasis-open.org/archives/ws-sx/200611/doc00003.doc">examples document</h:a> 
      for issue 66. Closed on Nov 29th TC call.
    </resolution>
    <relid>i078</relid>
    <relid>i066</relid>
  </issue>
  <issue id="i102" status="Closed">
    <title>
      Add section numbers and line numbers to interop document
    </title>
    <description>
      Ease ability to discuss, reference, review and comment on interop
      document.
    </description>
    <protocol revision="05">interop</protocol>
    <target>interop</target>
    <type>editorial</type>
    <origin>Frederick Hirsch</origin>
    <proposal>Add section numbers and line numbers to interop document</proposal>
    <resolution date="2006-08-16" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00044.html">
      Proposal accepted, applied by editors in <h:a href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00040.html">this draft</h:a>.
    </resolution>
    <resolution date="2006-08-23" href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00059.html">
      Edits accepted and status changed to closed on August 23rd TC call.
    </resolution>
  </issue>
  <issue id="i103" status="Closed" closed="2006-09-27">
    <title>
      Interop document - Clarify that RSTR is returned in RSTRC
    </title>
    <description>
      Replace "responds with a RSTR message with a SAML bearer token" with
      "responds with a RSTR within an RSTRC message with a SAML bearer token"
    </description>
    <protocol revision="05">interop</protocol>
    <target>interop</target>
    <type>editorial</type>
    <origin>Frederick Hirsch</origin>
    <proposal>
      Replace "responds with a RSTR message with a SAML bearer token" with
      "responds with a RSTR within an RSTRC message with a SAML bearer token"
    </proposal>
    <resolution date="2006-08-16" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00044.html">
      Proposal accepted, moved to pending and assigned to editors on Aug. 16th TC call.
    </resolution>
    <resolution date="2006-09-20" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00049.html">
      Changes reflected in rev 07 of interop doc, status changed to Review.
    </resolution>
    <resolution date="2006-09-27" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00058.html">
      Status changed to closed.
    </resolution>
  </issue>
  <issue id="i104" status="Closed" closed="2006-09-27">
    <title>
      Update interop documents to reflect what was actually tested.
    </title>
    <description>
      Update interop documents to reflect what was actually tested.
    </description>
    <protocol revision="05">interop</protocol>
    <target>interop</target>
    <type>editorial</type>
    <origin>Tony Nadalin</origin>
    <owner>Editors</owner>
    <proposal>
      Seems the interop documents don't reflect in all cases what was actually
      tested (XML)
    </proposal>
    <resolution date="2006-09-20" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00049.html">
      Proposal 1 accepted, reflected in rev 07 of interop doc, status changed to Review.
    </resolution>
    <resolution date="2006-09-27" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00058.html">
      Status changed to closed.
    </resolution>
  </issue>
  <issue id="i105" status="Closed">
    <title>
      SC label concatenation rules unclear
    </title>
    <description>
      <h:p>
        WS-SecureConversation mentions the following on using label while computing deriving keys,
      </h:p>
      <h:p>
        /wsc:DerivedKeyToken/wsc:Label<h:br />
        If specified, this optional element defines a label that is used in the key derivation function for this derived key. If this isn't specified, it is assumed that the recipient knows the label to use. The string content of this element is UTF-8 encoded to obtain the label used in key derivation. Note that once a label is used for a derivation sequence, the same label SHOULD be used for all subsequent derivations.
      </h:p>
      <h:p>
        It also specifies,
      </h:p>
      <h:p>
        The label is the concatenation of the client's label and the service's label. These labels can be
        discovered in each party's policy (or specifically within a &lt;wsc:DerivedKeyToken&gt;
        token).
        Labels are processed as UTF-8 encoded octets. If either isn't specified in the policy, then a
        default value of "WS-SecureConversation" (represented as UTF-8 octets) is used.
      </h:p>
      <h:p>
          When a label is specified it is not clear if you should simply use it or concatenate your own label together with it. It seems that when a value is specified it makes more sense to simply use it than apply the concatenation rule. There also is nothing in SecurityPolicy that would allow the discovery of the other party’s label if it was not sent in the wsc:DerivedKeyToken. So the concatenation rule doesn’t seem feasible. However, current products do use that rule making the normal default value “WS-SecureConversationWS-SecureConversation”.
      </h:p>
    </description>
    <protocol revision="ed-01-r6">ws-sc</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00050.html">Marc Goodner</origin>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200608/msg00050.html" />
    <resolution date="2006-08-23" href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00059.html">
      Proposal 1 accepted on August 23rd TC call.
    </resolution>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Status changed to Review on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Status changed to Closed on Sept. 6th TC call.
    </resolution>
  </issue>
  <issue id="i106" status="Dropped">
    <title>
      Why does a &lt;IssuedTokens&gt; element contain an RSTR instead of an RSTRC?
    </title>
    <description>
      Since a &lt;IssuedTokens&gt; element may need to contain Tokens issued as the result of multiple requests, why is it 
      not allowed to contain a &lt;RequestSecurityTokenResponseCollection&gt; element?
    </description>
    <protocol revision="ed-01-r8">ws-trust</protocol>
    <target>spec</target>
    <target>schema</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00054.html">Hal Lockhart</origin>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200608/msg00054.html" />
    <resolution date="2006-08-23" href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00059.html">
      Closed with no action on August 23rd TC call as <h:a href="http://lists.oasis-open.org/archives/ws-sx/200608/msg00060.html">IssuedTokens is semantically an RSTRC</h:a></resolution>
  </issue>
  <issue id="i107" status="Closed">
    <title>
      Apparent typo in WS-Sp Schema comments
    </title>
    <description>
      The WS-T and WS-SC Schemas contain comments saying "Actual content model is non-deterministic, hence wildcard. The following shows intended content model:"

      However in the WS-SP Schema the comment has morphed into "Accurate content model is nondeterministic". (in 5 places) I assume the latter is a typo and should be fixed to match WS-SC and WS-T.
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>schema</target>
    <type>editorial</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00066.html">Hal Lockhart</origin>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200608/msg00066.html">
      Fix 5 comments in WS-SP Schema file to match WS-SC and WS-T Schemas.
    </proposal>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Proposal 1 accepted on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06">
      Status changed to Review on Sept. 06, edits available in <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/download.php/20162/ws-securitypolicy-1.2.xsd">updated schema</h:a>.
    </resolution>
    <resolution date="2006-09-13" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00035.html">
      Status changed to closed on Sept. 13th TC call.
    </resolution>
  </issue>
  <issue id="i108" status="Closed">
    <title>
      Potential attack when using RST parameters from a target site - WS-Trust part
    </title>
    <description>
      When requestor inserts parameters into an RST request which come from a third party – for example relying party policy – there is a potential for an attack. Currently both requestor RST parameters and third party RST parameters are mixed together as a direct children of the wst:RequestSecurityToken element. This prevents STS to differentiate the RST parameters based on their source. This means that both kinds of RST parameters are trusted in the same way by the STS. This can open a potential attack vector because the third party is given control over the content of the RST message that the requestor sends to the STS and the STS cannot detect which parameters came from which source in order to determine how much it should trust a particular RST parameter.

      To mitigate the attack the RST should differentiate between parameters originated by the requestor and parameters not originated by the requestor.
    </description>
    <protocol revision="ed-01-r8">ws-trust</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00069.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200608/msg00069.html" />
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Proposal 1 accepted and status changed to Review on Sept. 6th TC call. Edits were applied in Trust ED01-r11 and
      are reflected in CD01.
    </resolution>
    <resolution date="2006-09-13" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00035.html">
      Status changed to closed on Sept. 13th TC call.
    </resolution>
    <relid>i109</relid>
  </issue>
  <issue id="i109" status="Closed">
    <title>
      Potential attack when using RST parameters from a target site - WS-SecurityPolicy part
    </title>
    <description>
      The RequestSecurityTokenTemplate parameter of the IssuedToken assertion is critical to allow generalized token issuance policy, but allows possible RST parameter attacks because the requestor's parameters cannot be separated from those specified for the target site. See the description of the attack in the related WS-Trust issue description.
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00070.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200608/msg00070.html" />
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Proposal 1 accepted and status changed to Review on Sept. 6th TC call. Edits were applied in SP ED01-r09.
    </resolution>
    <resolution date="2006-09-13" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00035.html">
      Status changed to closed on Sept. 13th TC call.
    </resolution>
    <relid>i108</relid>
  </issue>
  <issue id="i110" status="Closed" closed="2006-10-11">
    <title>
      QName support for specifying elements that need to be present in the message
    </title>
    <description>
      Security Policy specification should support specifying mandatory Header elements using LocalName and NamespaceURI. This will help implementations that want to avoid use of XPath where ever possible.
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00072.html">Venu</origin>
    <owner>Venu</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200609/msg00034.html">
      Expanded from <h:a href="http://www.oasis-open.org/archives/ws-sx/200608/msg00072.html">original proposal</h:a>.
    </proposal>
    <resolution date="2006-09-27" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00058.html">
      Proposal 1 accepted, status changed to pending.
    </resolution>
    <resolution date="2006-10-11" href="http://www.oasis-open.org/archives/ws-sx/200610/msg00025.html">
      Edits applied in r10 of SP. Status changed to Closed on Oct. 11th TC call.
    </resolution>
  </issue>
  <issue id="i111" status="Dropped">
    <title>Clarification on IssuedToken and SecureConversationToken assertions</title>
    <description>
      How can one find the security policy applicable to secure the message exchange in obtaining the token from the specified issuer? Is it using the issuer's WSDL?

      In the case of the SecureConversationToken, can we use the BootstrapPolicy as the security policy applicable to the message exchange with the issuer in the case where there's an Issuer specified?
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00085.html">Ruchith Fernando</origin>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Closed with no action on August 30th TC call.
    </resolution>
  </issue>
  <issue id="i112" status="Dropped">
    <title>Clarification: BootstrapPolicy to indicate the security context token created by one of the communicating parties</title>
    <description>
      Is it possible to use WS-SecurityPolicy to specify the case where the SCT is created by one of the communicating parties and sent in an unsolicited RSTR(C?) message? should and how do we indicate who creates the SCT?
    </description>
    <protocol revision="ed-01-r8">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00096.html">Ruchith Fernando</origin>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Closed with no action on August 30th TC call.
    </resolution>
  </issue>
  <issue id="i113" status="Closed">
    <title>Section 3 in SC needs to be updated for RSTRC</title>
    <description>
      Section 3 needs update to include RSTRC (line 277 of version 06)
    </description>
    <protocol revision="ed-01-r8">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200608/msg00096.html">Ruchith Fernando</origin>
    <proposal>Add the RSTRC</proposal>
    <resolution date="2006-08-30" href="http://www.oasis-open.org/archives/ws-sx/200608/msg00097.html">
      Proposal 1 accepted on August 30th TC call.
    </resolution>
    <resolution date="2006-09-06" href="http://lists.oasis-open.org/archives/ws-sx/200609/msg00018.html">
      Proposal 1 accepted and status changed to Review on Sept. 6th TC call. Edits were applied in SC ED01-r09 and 
      are reflected in CD01.
    </resolution>
    <resolution date="2006-09-13" href="http://www.oasis-open.org/archives/ws-sx/200609/msg00035.html">
      Status changed to closed on Sept. 13th TC call.
    </resolution>
  </issue>
  <issue id="i114" status="Closed" closed="2006-11-29">
    <title>
      Additional algorithm properties, assertions and references needed
    </title>
    <description>
      Additional algorithm properties, assertions and references needed
    </description>
    <protocol revision="ed-01-r10">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200610/msg00011.html">Frederick Hirsch</origin>
    <owner>Frederick Hirsch</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200610/msg00011.html" />
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200610/msg00049.html"/>
    <resolution date="2006-10-25" href="http://lists.oasis-open.org/archives/ws-sx/200610/msg00052.html">
      Proposal 2 accepted on October 25th TC call. Closed on Nov 29th TC call.
    </resolution>
  </issue>
  <issue id="i115" status="Closed" closed="2006-11-29">
    <title>
      Universal Encryption of UsernameToken (as specified by Appendix D, d.4, 3.) seems wrong
      </title>
    <description>
      <h:p>
        Appendix D, Section D.4 is "Elements that are encrypted"<h:br />
        3. says "Any wsse:UsernameToken when a transport binding is NOT being used."<h:br />
        This seems wrong on several counts.<h:br />
        Presumably the intent is to protect a cleartext password.<h:br />
        1. It makes no sense to routinely encrypt the Username and has negative effects in some cases.<h:br />
        2. When a hashed password is used it makes no sense to routinely encrypt the password.<h:br />
        3. When there is no password or password derivation is used, there is no password present and it makes no sense to routinely encrypt what is present.<h:br />
        4. When a UsernameToken is used as a supporting token to indicate a proxied identity in conjunction with a signing token, (see for example the WS-I Sample Apps) then it is critical that the signature include the Username, but encrypting it still makes no sense and may cause problems.<h:br />
        Note that I am not suggesting we prohibit encrypting these things, just that encryption should not be the default. Encryption of anything in the Security header can still be specified with a EncryptedElements assertion.<h:br />
        Finally, if this section is intended to be normative (see my next issue) then it should use the RFC 2119 keywords rather than a phrase like "Elements that are encrypted".
      </h:p>
    </description>
    <protocol revision="ed-01-r10">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200610/msg00018.html">Hal Lockhart</origin>
    <owner>Hal Lockhart</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200610/msg00018.html" />
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200610/msg00053.html"/>
    <resolution date="2006-11-01" href="http://www.oasis-open.org/archives/ws-sx/200611/msg00003.html">
      Proposal 2 accepted on Nov. 1 TC call.  Closed on Nov 29th TC call
    </resolution>
  </issue>
  <issue id="i116" status="Closed" closed="2006-11-29">
    <title>
      Is Appendix D Normative?
      </title>
    <description>
      <h:p>
        The last sentence of section 1 says "Section 11, all examples and all Appendices are non-normative." That suggests that Appendix D is a summary of normative information which is found elsewhere. However, I can not find any other source of the information in WS-SP. If Appendix D is non-normative, then I question why it is in the document at all.
      </h:p>
      <h:p>
        Note that Appendix A explicitly says it is non-normative, suggesting that some Appendices may be. Appendix B could conceivably be considered normative, it is hard to tell. Appendix C is examples, so it seems safe to assume they are not normative, however it might be good to say explicitly that if Appendix C conflicts with section 6.7 then 6.7 takes precedence.
      </h:p>
    </description>
    <protocol revision="ed-01-r10">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200610/msg00019.html">Hal Lockhart</origin>
    <owner>Marc Goodner</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200610/msg00046.html"/>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200610/msg00046.html"/>
    <resolution date="2006-11-01" href="http://www.oasis-open.org/archives/ws-sx/200611/msg00003.html">
      Proposal 2 accepted on Nov. 1 TC call. Closed on Nov 29th TC call.
    </resolution>
    <relid>i115</relid>
  </issue>
  <issue id="i117" status="Closed" closed="2006-11-29">
    <title>
      Element or Content Encryption on SignedEncryptedSupportingTokens Assertion
    </title>
    <description>
      Section 8.5 SignedEncryptedSupportingTokens does not define whether to use Element Encryption or Content Encryption to encrypt the token. This will be difficult to interop with different implementations and create some confusion to the user.  Section 8.6 EndorsingEncryptedSupportingTokens Assertions and Section 8.7 SignedEndorsing EncryptedSupportingToken Assertions have the same issue.
    </description>
    <protocol revision="ed-01-r10">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200610/msg00041.html">Hal Lockhart</origin>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200610/msg00041.html"/>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200610/msg00056.html"/>
    <resolution date="2006-11-01" href="http://www.oasis-open.org/archives/ws-sx/200611/msg00003.html">
      Proposal 2 accepted on Nov. 1 TC call. Closed on Nov 29th TC call.
    </resolution>
  </issue>
  <issue id="i118" status="Closed" >
    <title>
      Wrong ProtectionToken Policy in chapter 1.1
    </title>
    <description>
      The example security policy in chapter 1.1 (Example) uses a Kerberos V5 APREQ token for the ProtectionToken as follows:<h:br />
      See the proposal for complete description. <h:br /><h:br />

      Proposed Resolution:<h:br />
      Change the example in chapter 1.1 according to the above description.
    </description>
    <protocol revision="ed-01-r10">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00038.html">Martin Raepple</origin>
    <owner>Martin Raepple</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00038.html"/>
    <resolution date="2006-11-29" href="http://www.oasis-open.org/archives/ws-sx/200611/msg00003.html">
      Proposal accepted on Nov. 29th TC call. Status changed to Pending.
    </resolution>
    <resolution date="2006-12-06" href="http://www.oasis-open.org/archives/ws-sx/200612/msg00013.html">
      Status changed to closed on Dec. 6th TC call
    </resolution>
  </issue> 
  <issue id="i119" status="Closed" opened="2006-11-22" closed="2006-11-29" >
    <title>
      non-normative information in normative part
    </title>
    <description>
      <h:p>
        Section 2 as a whole is normative except for some parts explicitly marked as non-normative (i.e. Line 251 and 306).<h:br />

        Line 272-274 (in Section 2) provides just non-normative information (these lines are used only to introduce non-normative WS-Federation spec).<h:br />

        There might be cases where non-normative information is used to describe normative portion of spec. But this is not the case.<h:br />
        I cann't guess the reason why these lines are necessary here.<h:br /><h:br />

        Proposal:<h:br />
        Remove Line 272-274.<h:br />
      </h:p>
    </description>
    <protocol revision="cs-01">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-11-22" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00054.html">Toshiro Nishimura</origin>
    <owner>Toshiro Nishimura</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00054.html"></proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00059.html"></proposal>
    <resolution date="2006-11-29" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00083.html">
      Closed with no action in Nov 29th TC meeting
    </resolution>
  </issue>

  <issue id="i120" status="Closed" >
    <title>
      minor editorial comments on Trust and WS-SecureConversation
    </title>
    <description>
      <h:p>
        On WS-Trust:<h:br />

        Line 346-348,357: Duplicated description.
        Though L346-348 says using dateTime and UTC time is RECOMMENDED, L357 says all time references use dateTime and UTC.
        Remove L357, or modify L357 using "RECOMMENDED".<h:br />

        Line 422: "recipient" would be "requestor"<h:br />

        Line 431: change "RST" to "RSTR"<h:br />

        Line 677,679: change "wsp:Claims" to "wst:Claims"<h:br />


        On WS-SecureConversation:<h:br />

        Line 537-538: I think "over the security context signature created using ..." would be "over the security context using ..."<h:br />

        Line 819: remove "is as follows"<h:br />

        Line 857: change "label" to "nonce"<h:br />

        Line 779-781,883: different default value. I think L883 should be changed. (change "WS-SecureConversationWS-SecureConversation" to
        "WS-SecureConversation")<h:br />

        Line 884: duplicated periods ("..") at the end of line. remove one.<h:br />

        Line 1044: change "wsse:Security" to "wsse:Security"<h:br /><h:br />


        Proposal:
        As written above.
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sc</protocol>
    <protocol revision="cs-01">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-11-22" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00056.html">Toshiro Nishimura</origin>
    <owner>Toshiro Nishimura</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00058.html"></proposal>
    <resolution date="2006-11-29" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00058.html">
      Propsoal accepted in Nov 29 TC meeting. Status changed to Pending.
    </resolution>
    <resolution date="2006-12-06" href="http://www.oasis-open.org/archives/ws-sx/200612/msg00013.html">
      Status changed to closed on Dec. 6th TC call
    </resolution>
  </issue>

  <issue id="i121" status="Closed" opened="2006-11-29">
    <title>
      Reference to WS-Policy in WS-Trust
    </title>
    <description>
      <h:p>
        WS-Trust normatively references WS-Policy and WS-PolicyAttachment 1.2 (W3C Member Submissions) and uses some elements defined in its namespace (i.e. wsp:AppliesTo in RST and RSTR, wsp:Policy and wsp:PolicyReference in RST).
        WS-Policy/Attachment 1.5 is expected to be standardized near future and the elements will be defined in different namespace.<h:br /><h:br />

        What should we (WS-SX TC) do when WS-Policy/Attachment 1.5 is completed?
        Will we revise WS-Trust at that time?

      </h:p>
    </description>
    <protocol revision="cs-01">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-11-22" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00057.html">Toshiro Nishimura</origin>
    <owner>Toshiro Nishimura</owner>
    <resolution date="2006-11-29" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00083.html">
           Closed with no action on Nov @9th TC call.  Future W3C recommendations may be incorporated in a future rev of the spec.
    </resolution>
  </issue>
  <issue id="i122" status="Closed" opened="2006-11-28">
    <title>
      Use cases should include example messages and descriptions on how header content corresponds to policy.
    </title>
    <description>
      <h:p>
        Including example messages that conform to the policy examples would 
        make this document more effective in educating a broader audience.<h:br />
        
        Proposed Resolution:<h:br />
        
        In each use case include a simple message with a security header
        that conforms to the listed policy. Include text that highlights concepts
        introduced in the use case tying the message to the policy. So, for example, 
        in the first use case that introduces the inclusion of a user name token, highlight
        the lines in the sample message that represents the token and reference the lines in 
        the policy that called for it. In the first use case that introduces the inclusion of
        a password in the username token, identify the line with the password. The examples 
        I've just mentioned may seem obvious, but this approach will be very useful for some of 
        the more complex use cases later in the doc.
      </h:p>
    </description>
    <protocol revision="contrib">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2006-11-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00071.html">Tony Gullota</origin>
    <owner>Tony Gullota</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200612/msg00010.html">
      New draft of examples doc uploaded, contains two examples for review.
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00002.html">
    </proposal>
    <resolution date="2007-01-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00007.html" >
       Status changed to Pending.
    </resolution>
    <resolution date="2007-01-17" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00015.html" >
      Updated Draft posted. Status changed to Review
    </resolution>
    <resolution date="2007-01-17" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00052.html" >
      Closed 0n Jan 31, 2007 TC call
    </resolution>
  </issue>
  
  <issue id="i123" status="Closed" opened="2007-05-01">
    <title>  Example 2.1.1.2  </title>
    <description>
      Example 2.1.1.2<h:br />
      ==============<h:br />
      In example 2.1.1.2, sp:SupportingToken should be changed to be sp:SupportingTokens (plural).<h:br />
      In example 2.1.1.2, the SecurityPolicy schema needs to be updated with the NoPassword assertion in the UsernameToken assertion.<h:br />
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00016.html">Anthony Nadalin</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00016.html"></proposal>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Closed with no action.
    </resolution> </issue>

  <issue id="i124" status="Closed" opened="2007-05-01">
    <title>Example 2.1.1.3</title>
    <description>
      Example 2.1.1.3<h:br />
      ==============<h:br />
      In example 2.1.1.3, sp:SupportingToken should be changed to be sp:SupportingTokens (plural).<h:br />
      In example 2.1.1.3, sp:UserNameToken should be changed to be sp:UsernameToken (case change).<h:br />
    In example 2.1.1.3, the text talks about a Nonce and a Timestamp, but no such elements appear in the message.<h:br />
    In example 2.1.1.3, the SecurityPolicy schema needs to be updated with the HashPassword assertion in the UsernameToken assertion.<h:br />
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00014.html">Anthony Nadalin</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00014.html"></proposal>
    <resolution date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html" >
      Updated Draft posted. Status changed to Review
    </resolution>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Closed on 5/30/07 TC call
    </resolution>
  </issue>

  <issue id="i125" status="Closed" opened="2007-05-01">
    <title>Example 2.1.2.1</title>
    <description>
      Example 2.1.2.1<h:br />
      ==============<h:br />
      In example 2.1.2.1, sp:SupportingToken should be changed to be sp:SupportingTokens (plural).
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00015.html">Anthony Nadalin</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00015.html"></proposal>
    <resolution date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html" >
      Updated Draft posted. Status changed to Review
    </resolution>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Closed on 5/30/07 TC call
    </resolution>
  </issue>

  <issue id="i126" status="Closed" opened="2007-05-01">
    <title>   Example 2.1.3  </title>
    <description>
      Example 2.1.3<h:br />
      ==============<h:br />
      In example 2.1.3, AlwaysToRecpt should be changed to be http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200512/IncludeToken/AlwaysToRecipient.<h:br />
      In example 2.1.3, AlwaysToRecipient should be changed to be http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200512/IncludeToken/AlwaysToRecipient.<h:br />
      In example 2.1.3, Never should be changed to be http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200512/IncludeToken/Never.
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00018.html">Anthony Nadalin</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00018.html"></proposal>
    <resolution date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html" >
      Updated Draft posted. Status changed to Review
    </resolution>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Closed on 5/30/07 TC call
    </resolution>
  </issue>

  <issue id="i127" status="Closed" opened="2007-05-01">
    <title>  Example 2.1.4  </title>
    <description> 
       Example 2.1.4<h:br />
    ==============<h:br />
      In example 2.1.4, the description of the scenario says that the UsernameToken should be encrypted, but the example XML does not show this, and the policy identifies the UsernameToken as a SignedSupportingToken, not a SignedEncryptedSupportingToken.
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00017.html">Anthony Nadalin</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00017.html"></proposal>
    <resolution date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html" >
      Updated Draft posted. Status changed to Review
    </resolution>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Closed on 5/30/07 TC call
    </resolution>
  </issue>

  <issue id="i128" status="Closed" opened="2007-05-01">
    <title> Example 2.2.1   </title>
    <description>
      Example 2.2.1<h:br />
    ==============<h:br />
      In example 2.2.1, AlwaysToRecpt should be changed to be http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200512/IncludeToken/AlwaysToRecipient.<h:br />
    In example 2.2.1, Never should be changed to be http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200512/IncludeToken/Never.<h:br />
      In example 2.2.1, Id="WSS10Anonymous with Certificates_input_policy" should be changed to Id="WSS10Anonymous_with_Certificates_input_policy"<h:br />
    In example 2.2.1, Id="WSS10anonymous with certs_output_policy" should be changed to Id="WSS10anonymous_with_certs_output_policy"<h:br />
      The XML sample is missing the EncryptedKey element, which implies that the soap:Body content was encrypted with one of the asymmetric keys, which would be incorrect. Once this EncryptedKey element is added, the description will need to refer to it
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00019.html">Anthony Nadalin</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00019.html"></proposal>
    <resolution date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html" >
      Updated Draft posted. Status changed to Review
    </resolution>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Closed on 5/30/07 TC call
    </resolution>
  </issue>

  <issue id="i129" status="Closed" opened="2007-05-01">
    <title>Example 2.2.3 and 2.2.4, Trust10 should be changed to Trust13</title>
    <description>
        Trust10 is old assertion from ws-securitypolicy-1.2-spec-ed-12. The current spec has renamed Trust10 assertion into Trust13 assertion. The example 2.2.3 and 2.2.4 should be changed accordingly. This includes Lines: 1551, 1557, 1601, 1766, 1772, and 1822, to change from “Trust10” to “Trust13”.
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00021.html">Symon Chang</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00021.html"></proposal>
    <resolution date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html" >
      Updated Draft posted. Status changed to Review
    </resolution>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Closed on 5/30/07 TC call
    </resolution>
  </issue>

  <issue id="i130" status="Closed" opened="2007-05-01" closed="2007-06-27" >
    <title>Example 2.3.2.1</title>
    <description> 
      In example 2.3.2.1, AlwaysToRecpt should be changed to be http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200512/IncludeToken/AlwaysToRecipient.
      The policy specifies the SAML token to be a SignedSupportingToken, but the XML does not show that the SAML token is signed via Web Services Security.
      Is the XML incorrect, or should the policy have specified just SupportingToken?
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00020.html">Anthony Nadalin</origin>
    <owner>Anthony Nadalin</owner>
    <resolution date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html" >
      Closed with no action
    </resolution>
  </issue>

  <issue id="i132" status="Closed" opened="2007-05-03" closed="2007-05-15">
    <title>Absence of a Confirmation to Nonce</title>
    <description>
      <h:p>
        Presuming that this is the right forum to post this suggestion.
        The UsernameTokenProfile 1.1 talks about usage of &lt;Nonce&gt;
        , the semantics of which are as follows:
      </h:p>
        &lt;wsse:UsernameToken wsu:Id="ID"&gt;<h:br />
      &lt;wsse:Username&gt; ... &lt;/wsse:Username&gt;<h:br />
      &lt;wsse:Password Type="..."&gt; ... &lt;/wsse:Password&gt;<h:br />
      &lt;wsse:Nonce EncodingType="..."&gt; ... &lt;/wsse:Nonce&gt;<h:br />
      &lt;wsu:Created&gt; ... &lt;/wsu:Created&gt;<h:br />
      &lt;/wsse:UsernameToken&gt;<h:br />
      <h:p>   
        The &lt;Nonce&gt;here includes a random token generated by a requestor while accessing a service.
        The spec says that this should be generated fresh, for service providers to detect relay attacks.
      </h:p>
      <h:p>
        However, there is nothing which guarantees the requestor, that the response generated from the service
        was actually for the Nonce sent by the requestor. What I mean is that, it is possible to substitute a different random value
        of Nonce in transit(especially in case of plaintext password), and the service provider would not be able to
        detect this. (Of course signing the token will integrity protect it).
</h:p>
      </description>
    <protocol revision="cs-01">ws-sc</protocol>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-03" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00035.html">Aditya Athalye</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00044.html"></proposal>
    <resolution date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html">
      This is an issue with the WSS TC specs, not the WS-SX specs. Closed with no action on May 15 '07 call.
    </resolution>  </issue>

  <issue id="i133" status="Closed" opened="2007-05-01">
    <title>Example 2.1.1.1</title>
    <description>
      Example 2.1.1.1<h:br />
      ==============<h:br />
      In example 2.1.1.1, sp:SupportingToken should be changed to be sp:SupportingTokens (plural).<h:br />
      In example 2.1.1.1, the generated XML shows deprecated wsse:PasswordType. This should be oasis-200401-wss-username-token-profile-1.0#PasswordType
    </description>
    <protocol revision="13">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00041.html">Anthony Nadalin</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00041.html"></proposal>
    <resolution date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html" >
      Updated Draft posted. Status changed to Review
    </resolution>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Closed on 5/30/07 TC call
    </resolution>
  </issue>

  <issue id="i135" status="Active" opened="2007-06-05">
    <title>Need provision in the spec/schema for attachment content signature</title>
    <description>
      <h:p>
        The WS-Sec Policy 1.2 has provision for integrity protection of soap attachments using /signedParts/Attachments.
        This is what the spec says:
      </h:p>
      <h:p>
        Lines 461-462<h:br/>
        "When SOAP Message Security is used to accomplish this, all message parts other than the part containing the primary SOAP envelope are to be integrity protected.."
      </h:p>
      <h:p>
        Simply looking at this element does not clearly indicate to a service consumer whether attachment content only or the complete attachment needs to be signed.
        This can especially be a problem for service providers who reject messages NOT conforming to policy, for example signing only attachment content when complete is required is a policy non-conformance.
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-06-05" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00008.html">Aditya Athalye</origin>
    <owner>Tony Nadalin</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00008.html">
      <h:p>
        If I understand correctly, the presence of the above Attachments element inside SignedParts would mean sign all the attachments
        in the message (Content + MIME Headers). This translates to using the "Attachment-Complete" Signature Transform in SwA 1.1.
      </h:p>
      <h:p>
        However, in that case there doesn't seem to be any provision to indicate that only Attachment content of all attachments
        to be signed, and not the MIME headers. (Attachment-ContentOnly Transform).
      </h:p>
      <h:p>
        Is there a plan to add an attribute to the sp:Attachments element?
      </h:p>
      <h:p>
        We could add an optional attribute to this as:
      </h:p>
      <h:p>
        &lt;sp:Attachments signContentOnly="true|false"&gt;<h:br/>
        If it is absent it could mean sign the attachment contents as well as Headers, else sign content only.
      </h:p>
    </proposal>
    <resolution date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html" >
      Assigned to Tony Nadalin.
    </resolution>
    </issue>

  <issue id="i136" status="Closed" opened="2007-06-06" closed="2007-08-08">
    <title>Incorrect URI for password digest in the example</title>
    <description>
      See proposal
    </description>
    <protocol revision="14">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-05" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00012.html">Aditya Athalye</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00012.html">
    </proposal>
    <owner>Editors</owner>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Assigned to Editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-07-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00046.html" >
      Fix applied in latest uploaded Examples document. Status changed to Review
    </resolution>
  </issue>


  <issue id="i137" status="Closed" opened="2007-06-08">
    <title>Support for more stringent security implementation in WS-SP as per requirements in WS-SP Usecases document </title>
    <description>
      <h:p>WS-SP Use cases doc states  (Lines 968-969)</h:p>
      <h:p>"Line (M046) contains the Nonce element and Line (M047) contains a timestamp. These two elements should also be included in the PasswordText case for better security"</h:p>
      <h:p> The UsernameToken assertion in Security Policy supports only :&lt;NoPassword&gt;, and &lt;HashPassowrd&gt; assertion.</h:p>

      UseCase:<h:br/>

      According to the use case document, Nonce, and Creation timestamp should be sent even for plain text passwords for better security which is a very valid requirement IMO. However, present security policy, and the schema(?) supports only HashPassword, which can indicate to the requestor, the provider's requirement for sending Password Digest, Nonce, and Created.

      <h:p>
        If &lt;HashPassword&gt; is not present (assuming it is not &lt;NoPassword&gt;), it tells the requestor, that only Username,
        and clear text Password is mandatory. This no way indicates that the service may need a Nonce as well. So what it essentially means is that, service provider is actually offering a choice to the requestor:
      </h:p>
      1.) Send a plaintext password without Nonce/Created. (Less secure) - Acceptable to service:<h:br/>
      2.) Send a plaintext password WITH Nonce/Created. (More Secure) - - Acceptable to service<h:br/><h:br/>

      Obviously any requestor will take the less secure route to access to service.<h:br/><h:br/>

      What should have happened is:<h:br/>
      Service provider unambiguously declaring its intention to check for Nonce/Created irrespective of PasswordType, and rejecting any messages which then do not conform to its policy. This leaves the requestor with only the more secure route to take.
    </description>
    <protocol revision="14">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-06-07" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00014.html">Aditya Athalye</origin>
    <owner>Rich Levinson</owner> 
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00014.html">
    </proposal>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200708/msg00009.html">
      See inline in referenced document
    </proposal>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Previously discussed as issue 132 (http://docs.oasis-open.org/ws-sx/issues/Issues.xml#i132).
      Noted that the example document contains advice not coming from SP itself. Members need more time.
      Status changed to Active.
    </resolution>
    <resolution date="2007-08-08" href="http://www.oasis-open.org/archives/ws-sx/200708/msg00010.html">
      Changes applied in proposal 2 accepted, status changed to review.
    </resolution>
    <resolution date="2007-08-22" href="http://www.oasis-open.org/archives/ws-sx/200708/msg00021.html" >
      Status changed to closed.
    </resolution>
  </issue>

  <issue id="i138" status="Closed" opened="2007-06-06" closed="2007-08-08">
    <title>Editorial correction in WS-SP usecases draft Example 2.2.3</title>
    <description>
      Lines 1626-1627 :  "....an X.509 token that must not be included with all messages sent between the recipient and Recipient."

    </description>
    <protocol revision="14">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-12" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00030.html">Aditya Athalye</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00030.html">
      "...an X.509 token MUST NOT be included with any message sent between Initiator and Recipient" ?
    </proposal>
    <owner>Editors</owner>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Assigned to Editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-07-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00046.html" >
      Fix applied in latest uploaded Examples document. Status changed to Review
    </resolution>
  </issue>

  <issue id="i139" status="Closed" opened="2007-06-06" closed="2007-08-08">
    <title>Incorrect spelling of Issued Tokens WS-SP usecases draft Example 2.2.3</title>
    <description>
      Lines 1638: Line (P042) indicates that the Issed Tokens property is set to ‘true’
    </description>
    <protocol revision="14">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-12" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00031.html">Aditya Athalye</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00031.html">
      Change "Issed" to Issued"
    </proposal>
    <owner>Editors</owner>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Assigned to Editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-07-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00046.html" >
      Fix applied in latest uploaded Examples document. Status changed to Review
    </resolution>
  </issue>

  <issue id="i140" status="Closed" opened="2007-06-06" closed="2007-08-08">
    <title>
      Incorrect order of &lt;Timestamp&gt; element for Strict Layout
    </title>
    <description>
      Section 2.2.3 (WSS11 Anonymous With Certs) talks about a policy having Layout assertion as:
      <h:p>
        &lt;Layout><h:br/>
        &lt;Policy><h:br/>
        &lt;Strict/><h:br/>
        &lt;/Policy><h:br/>
        &lt;/Layout><h:br/>
      </h:p>
      The position of the &lt;wsu:Timestamp>
      element is after the signature that signs it.
    </description>
    <protocol revision="14">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-12" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00032.html">Aditya Athalye</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00032.html">
      As per strict layout rules for WSS11, the &lt;wsu:Timestamp> element should have occurred before the &lt;ds:Signature> element covering it. The example should be rectified accordingly.
    </proposal>
    <owner>Editors</owner>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Assigned to Editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-07-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00046.html" >
      Fix applied in latest uploaded Examples document. Status changed to Review
    </resolution>
  </issue>

  <issue id="i141" status="Deferred" opened="2007-06-08">
    <title>Support for more stringent security implementation in WS-SP as per requirements in WS-SP Usecases document </title>
    <description>
      <h:p>WS-SP Use cases doc states  (Lines 968-969)</h:p>
      <h:p>"Line (M046) contains the Nonce element and Line (M047) contains a timestamp. These two elements should also be included in the PasswordText case for better security"</h:p>
      <h:p> The UsernameToken assertion in Security Policy supports only :&lt;NoPassword&gt;, and &lt;HashPassowrd&gt; assertion.</h:p>

      UseCase:<h:br/>

      According to the use case document, Nonce, and Creation timestamp should be sent even for plain text passwords for better security which is a very valid requirement IMO. However, present security policy, and the schema(?) supports only HashPassword, which can indicate to the requestor, the provider's requirement for sending Password Digest, Nonce, and Created.

      <h:p>
        If &lt;HashPassword&gt; is not present (assuming it is not &lt;NoPassword&gt;), it tells the requestor, that only Username,
        and clear text Password is mandatory. This no way indicates that the service may need a Nonce as well. So what it essentially means is that, service provider is actually offering a choice to the requestor:
      </h:p>
      1.) Send a plaintext password without Nonce/Created. (Less secure) - Acceptable to service:<h:br/>
      2.) Send a plaintext password WITH Nonce/Created. (More Secure) - - Acceptable to service<h:br/><h:br/>

      Obviously any requestor will take the less secure route to access to service.<h:br/><h:br/>

      What should have happened is:<h:br/>
      Service provider unambiguously declaring its intention to check for Nonce/Created irrespective of PasswordType, and rejecting any messages which then do not conform to its policy. This leaves the requestor with only the more secure route to take.
    </description>
    <protocol revision="14">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-06-07" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00014.html">Aditya Athalye</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00014.html">
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00057.html">
    </proposal>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Previously discussed as issue 132 (http://docs.oasis-open.org/ws-sx/issues/Issues.xml#i132).
      Noted that the example document contains advice not coming from SP itself. Members need more time.
      Status changed to Active.
    </resolution>
    <resolution date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html" >
      Proposal to reat this as an SP enhancement request and defer to a future version of SP accepted. Status changed to Defer.
    </resolution>
    <resolution date="2007-08-22" href="http://www.oasis-open.org/archives/ws-sx/200708/msg00021.html" >
      Status changed back to active.
    </resolution>
    <resolution date="2007-09-19" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200709/msg00012.html" >
      This issue was erroneously brought out of the Deferred state in a previous meeting. Status changed (back) to Deferred.
    </resolution>
  </issue>
  <issue id="i142" status="Closed" opened="2007-07-02">
    <title>
      Examples 2.2.3 and 2.2.4 are miss-labeled
    </title>
    <description>
      <h:p>
      Examples 2.2.3 and 2.2.4 are identified as being based on WSS 1.1.
      However, both require the use of mechanisms (e.g. DerivedKeyToken)
      defined in WS-SecureConversation.
      </h:p>
      <h:p>
      The text refers to EncryptedKey as a WSS 1.1 feature, but EncryptedKey
      is defined by XML Enc and has been present in WSS since version 1.0. I
      am not sure if there is any dependency of these examples on WSS 1.1, but
      surely their use of WS-SecureConversation is a much more significant
      difference between them and the prior examples.
      </h:p>
    </description>
    <protocol revision="14">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-07-02" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00007.html">Hal Lockhart</origin>
    <owner>Rich Levinson</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00007.html">
      Modify the titles of these examples to make it clear that they are
      examples of the use of WS-SecureConversation, not (just) WSS 1.1.
    </proposal>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200708/msg00010.html">
      See changes in document.
    </proposal>
    <resolution date="2007-07-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00046.html" >
      Status changed to Active.  Assigned to Rich Levinson.
    </resolution>
    <resolution date="2007-08-22" href="http://www.oasis-open.org/archives/ws-sx/200708/msg00021.html" >
      Status changed to review.
    </resolution>
    <resolution date="2007-09-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200709/msg00012.html" >
      Status changed to Closed.
    </resolution>
  </issue>
  <issue id="i143" status="Closed" opened="2007-06-27">
    <title>Typo in Example 2.1.1.3 Message</title>
    <description>
      In lines 452-453 (M009-M010) &lt;Nonce> and &lt;Created> were inserted within the &lt;Security> element. They should both be within the &lt;UsernameToken>
      element.
    </description>
    <protocol revision="14">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00067.html">Hal Lockhart</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00067.html">
    </proposal>
    <resolution date="2007-07-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00046.html" >
      Status changed to Pending.  Assigned to Editors.
    </resolution>
    <resolution date="2007-08-08" href="http://www.oasis-open.org/archives/ws-sx/200708/msg00010.html" >
      Status changed to review.
    </resolution>
    <resolution date="2007-08-22" href="http://www.oasis-open.org/archives/ws-sx/200708/msg00021.html" >
      Status changed to closed.
    </resolution>
  </issue>
  <issue id="i144" status="Closed" opened="2007-07-17" closed="2007-08-08">
    <title>Typo error in Section 2.2.4</title>
    <description> "Line (P042) indicates that the Issed Tokens property is set to ‘true’" </description>
    <protocol revision="15">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00054.html">Aditya Athalye</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00054.html">
      Change Issed to Issued.
    </proposal>
    <resolution date="2007-07-25" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00065.html" >
      Fix applied in latest uploaded Examples document. Status changed to Review
    </resolution>
  </issue>

  <issue id="i145" status="Closed" opened="2007-07-17" closed="2007-08-08">
    <title>Incorrect Order of Message signature in WSS11 Mutual Auth Scenario</title>
    <description> Line 1932:The policy demands strict layout, whereas the message signature has occurred after the signature covering it. </description>
    <protocol revision="15">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00052.html">Aditya Athalye</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00052.html">
      I think in the example, the message signature should be placed before the Endorsing signature.
      <resolution date="2007-07-25" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00065.html" >
        Fix applied in latest uploaded Examples document. Status changed to Review
      </resolution>
    </proposal>
  </issue>
  
  <issue id="i146" status="Closed" opened="2007-07-17" closed="2007-10-03">
    <title>Example to illustrate a response message</title>
    <description> Almost all example messages in the document are showing request messages which conform to policies. But there are no response messages examples. </description>
    <protocol revision="15">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00053.html">Aditya Athalye</origin>
    <owner>Rich Levinson</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00053.html">
      have examples of response messages conforming to policies especially for WSS11 scenarios, which have specific response requirements like &lt;SignatureConfirmation>
    </proposal>
    <resolution date="2007-07-25" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00065.html" >
      Status changed to Active
    </resolution>
    <resolution date="2007-09-19" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200709/msg00012.html" >
      The latest revision of the Examples doc has response messages added to example 3.2.4. Status changed to Review.  Noted that review comments could come in two flavors: (a) comments on the response messages in example 3.2.4 and (b) comments to the effect that response messages should be supplied for additional examples.
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Closed on Oct. 3rd TC call
    </resolution>
  </issue>
  
  <issue id="i147" status="Closed" opened="2007-07-17" closed="2007-08-08">
    <title>Contradictory statements made in WSS10 Mutual Auth Scenario</title>
    <description>
      <h:p>Lines 1531-32: "Line (M035) indicates the BinarySecurityToken on Line (M024) is included in the signature as required by the ProtectTokens assertion of the AsymmetricBindingAssertion policy."</h:p>
      <h:p>Lines 1533-34: "Note that the initiator’s BinarySecurityToken is not included in the message signature as it was not required by policy."</h:p>
    </description>
    <protocol revision="15">examples</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00055.html">Aditya Athalye</origin>
    <owner></owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00055.html">
     remove lines 1533-34
    </proposal>
    <resolution date="2007-07-25" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00065.html" >
      Fix applied in latest uploaded Examples document. Status changed to Review
    </resolution>
  </issue>

  <issue id="i148" status="Pending" opened="2007-08-03">
    <title>Syntax of XPath for Signed, Encrypted and Required Elements</title>
    <description>
      The syntax of XPath Assertion should be changed from &lt;sp:XPath> to &lt;sp:XPath ...="">
      <h:p>This is related to the following four assertions: </h:p>
      <h:p>
        •	SignedElements Assertion – Section 4.1.2<h:br/>
        •	EncryptedElements Assertion – Section 4.2.2<h:br/>
        •	ContentEncryptedElements Assertion – Section 4.2.3<h:br/>
        •	RequiredElements Assertion – Section 4.3.1<h:br/>
      </h:p>
      
    </description>
    <protocol revision="v1.2">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-08-03" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200708/msg00002.html">Symon Chang</origin>
    <owner>Symon Chang</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200708/msg00002.html">
      The syntax of XPath Assertion should be changed from &lt;sp:XPath> to &lt;sp:XPath ...="">
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200708/msg00005.html"/>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200710/msg00010.html"/>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00018.html">
      Proposal 3 accepted with <h:a href="http://www.oasis-open.org/archives/ws-sx/200710/msg00018.html">comments from Ashok</h:a> on Oct 17th TC call.
    </resolution>
  </issue>

  <issue id="i149" status="Closed" opened="2007-09-14" closed="2007-10-17">
    <title> Trust13 assertion should be removed from the policy Example 2.2.3 and 2.2.4 </title>
    <description>
      The &lt;sp:Trust13> assertion is not necessary for the policy in both Example 2.2.3 and 2.2.4.<h:br/><h:br/>
       Looking into Policy Example 2.3.2.4 on page 75 of the Example Document, it has similar symmetric binding 
       that uses &lt;sp:X509Token> assertion with &lt;sp:RequireDerivedKeys/>. This policy does not have 
       &lt;sp:Trust13> assertion.   

    </description>
    <protocol revision="v1.2">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-09-14" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200709/msg00011.html">Symon Chang</origin>
    <owner>Symon Chang</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200709/msg00011.html">
      The &lt;sp:Trust13> assertion in both Examples 2.2.3 and 2.2.4 should be removed for simplicity.
    </proposal>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200710/msg00003.html"/>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to Pending on Oct. 3rd TC call with proposal 2 (note to replace 2.3.2.5 with example from TC interop scenarios).
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>

  <issue id="i150" status="Pending" opened="2007-10-16">
    <title>Add conformance statements to new versions of Trust/SC/SP</title>
    <description>The OASIS process requires all specs to now have a conformance section.</description>
    <protocol revision="v1.3">ws-sc</protocol>
    <protocol revision="v1.2">ws-sp</protocol>
    <protocol revision="v1.3">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin href="http://www.oasis-open.org/archives/ws-sx/200710/msg00015.html">Marc Goodner</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200710/msg00015.html"/>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Proposal one accepted with <h:a href="http://www.oasis-open.org/archives/ws-sx/200710/msg00019.html">comments from Frederick</h:a>, status changed to pending on Oct 16th TC call.
    </resolution>
  </issue>


  <!-- Public Review Issues-->
  <issue id="PR001" status="Closed" opened="2006-09-21" closed="2006-11-29" isPR="true">
    <title>
      Question on WS-Trust sections 4.3.5 to 4.3.7
    </title>
    <description>
      <h:p>
        I've been leafing through the specification and I wonder whether figure shown in section 4.3.7
        is correct or not.
        You are using a RequestedTokenReference element to represent a proof-of-possesion token instead of a
        RequestedProofToken (as in examples in section 4.3.5 and 4.3.6)element  with a SecurityTokenReference
        child element inside. Is the former correct?
      </h:p>
    </description>
    <protocol revision="cd-01">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-09-21" href="http://www.oasis-open.org/archives/ws-sx-comment/200609/msg00001.html">Carlos Gutiérrez</origin>
    <owner>Marc Goodner</owner>
    <proposal href="http://lists.oasis-open.org/archives/ws-sx/200610/msg00051.html"/>
    <resolution date="2006-11-01" href="http://www.oasis-open.org/archives/ws-sx/200611/msg00003.html">
      Proposal 1 accepted on Nov. 1 TC call. Closed on Nov 29th TC call
    </resolution>
  </issue>

  <issue id="PR002" status="Closed" opened="2006-11-29" closed="2006-11-29" isPR="true">
    <title>
      RST message body template is missing &lt;wst:SecondaryParameters&gt;
      element
    </title>
    <description>
      <h:p>
        The cd-01 version of WS-Trust is missing &lt;wst:SecondaryParameters&gt;
        element inside the RST message body skeleton on lines 394 - 398 even though the element itself is defined below on lines 419 - 426.

      </h:p>
    </description>
    <protocol revision="cd-01">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-11-03" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00009.html">Jan Alexander</origin>
    <owner>Jan Alexander</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00009.html"></proposal>
    <resolution date="2006-11-15">
      Proposal accepted. closedon Nov 29th TC call.
    </resolution>
  </issue>


  <issue id="PR003" status="Closed" opened="2006-11-10" closed="2006-11-29" isPR="true">
    <title>
      References to non-standard specifications
    </title>
    <description>
      <h:p>
        Current WS-Trust spec refers WS-Federation and WS-SC spec refers WS-MetadataExchange. These referred specifications have not been submitted to any standard body.
        I hope such references will be removed.<h:br />
      </h:p>
    </description>
    <protocol revision="cd-01">ws-trust</protocol>
    <protocol revision="cd-01">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2006-11-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00018.html">NISHIMURA Toshihiro</origin>
    <owner>NISHIMURA Toshihiro</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00018.html"></proposal>
    <resolution date="2006-11-15">
      closed with no action on Nov. 15 TC call.
    </resolution>
  </issue>

  <issue id="PR004" status="Closed" opened="2006-11-29" closed="2006-11-29" isPR="true">
    <title>
      Categorization of SCT references is unclear
    </title>
    <description>
      <h:p>
        In the first paragraph in Chapter 8 (Lines 1025-1031), references to
        SCT are divided into two categories:<h:br />
        [a] references from within the &lt;wsse:Security&gt; element to a token also
        within the &lt;wsse:Security&gt; element<h:br />
        [b] references from other parts of the SOAP envelope<h:br /><h:br />

        And then references within the &lt;wsse:Security&gt; element are divided
        into two subcategories :<h:br />
        [a-1] reference (from within the &lt;wsse:Security&gt; element) to an SCT
        found within the message<h:br />
        [a-2] references (from within the &lt;wsse:Security&gt; element) to a SCT
        not present in the message<h:br /><h:br />

        [a] can not diveded into [a-1] and [a-2], because [a] is "reference to
        a token within the &lt;wsse:Security&gt; element".<h:br />
        I think [a] is intended to say just
        "references from within the &lt;wsse:Security&gt;"<h:br />
        <h:br />

        Later paragraphs in Chapter 8 describes three categories as follows:<h:br />
        [A] reference from within the &lt;wsse:Security&gt; element or from an RST
        or RSTR (Lines 1040-1042)<h:br />
        [B] reference from outside the &lt;wsse:Security&gt; element to SCT located
        in the &lt;wsse:Security&gt; element (Lines 1044-1047)<h:br />
        [C] reference from within the &lt;wsse:Security&gt; element to SCT not
        present in the message (Lines 1049-1051)<h:br /><h:br />

        [A],[B] and [C] corresponds to [a-1], [b] and [a-2]
        except [A] mentions about RST and RSTR.<h:br />
        I'd like to know the reason why reference from RST/RSTR is not
        categorized to [B]. I hope the reason will be described in the spec.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sc</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2006-11-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00019.html">NISHIMURA Toshihiro</origin>
    <owner>NISHIMURA Toshihiro</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00019.html"></proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00032.html"></proposal>

    <resolution date="2006-11-15">
      Proposal 2 accepted on Nov. 15 TC call. Closed on Nov 29th TC call
    </resolution>
  </issue>

  <issue id="PR005" status="Closed" opened="2006-11-10" closed="2006-11-29" isPR="true">
    <title>
      Examples should use recommended mechanism
    </title>
    <description>
      <h:p>
        Chapter 8 (Lines 1040-1047) describes that using message independent referencing mechanism (using the &lt;wsc:Identifier&gt;
        ) is MUST/RECOMMENDED when SCT is referenced from RST, RSTR or from outside the &lt;wsse:Security&gt;
        element.<h:br />

        But examples in Chapter 5 (Lines 622-659), Chapter 6 (Lines 704-734) and Chapter 8 (Lines 1054-1082) uses message-specific reference mechanism (using ID) in such case.<h:br />
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sc</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-11-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00017.html">NISHIMURA Toshihiro</origin>
    <owner>NISHIMURA Toshihiro</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00017.html"></proposal>
    <resolution date="2006-11-15">
      Proposal accepted on Nov. 15 TC call. Closed on Nov 29th TC call
    </resolution>
  </issue>


  <issue id="PR006" status="Closed" opened="2006-11-10" closed="2006-11-29" isPR="true">
    <title>
      minor editorial comments on WS-Trust and WS-SecureConversation
    </title>
    <description>
      <h:p>

        WS-SecureConversation (http://docs.oasis-open.org/ws-sx/ws-secureconversation/200512/ws-secureconversation-1.3-spec-cd-01.doc)<h:br />

        line 365: change "an X.509 " to "an X.509 certificate"<h:br />

        Line 602-603: "If a requestor desires to extend the duration of the token it uses a custom binding of the renewal mechanism defined in WS-Trust."<h:br />

        "custom" is a word I prefer to avoid in standard specifications. I suggest rewording as follows (consistent with text used to describe the Cancel binding).

        "If a requestor desires to extend the duration of the token it uses this specialized binding of the renewal mechanism defined in WS-Trust"<h:br />

        Line 701: change "even in the"  to "even if the"<h:br />

        line 776: change "possible" to "possibly"<h:br /><h:br />

        WS-Trust (http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-spec-cd-01.doc)<h:br />

        line 392: change "wst:SecondaryParameter" to "wst:SecondaryParameters"<h:br />

        line 1983: key-wrap-algorithm is in the middle of use-key<h:br />

        lines 2008, 2014, 2020, 2030, 2046: remove periods from sentence fragments used to describe algorithm parameters to be consistent with the rest of the descriptions in this section.<h:br />

        line 2034: change "symmetric key that" to "the symmetric key that"  and change  "message" to "messages"
        <h:br />
        line 2040-2042: delete duplicate description of "EncryptWith"

      </h:p>
    </description>
    <protocol revision="cd-01">ws-trust</protocol>
    <protocol revision="cd-01">ws-sc</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-11-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00021.html">Greg Carpenter</origin>
    <owner>Greg Carpenter</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00021.html"></proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00017.html"></proposal>
    <resolution date="2006-11-15">
      Proposal 2 accepted on Nov. 15 TC call. Closed on Nov 29th TC call
    </resolution>
  </issue>

  <issue id="PR007" status="Closed" opened="2006-11-29" closed="2006-11-29" isPR="true">
    <title>
      RSTRC is not described in exemplar in Trust
    </title>
    <description>
      <h:p>
        The RSTRC is mentioned in passing in the STS framework section 3.2 on the RSTR. It is again mentioned in the processing rules for the RSTC. The last mention is in the Issuance binding section 4.3 on the RSTR. From there on it appears in this section for the examples that show the RSTR.
        It continues to appear throughout the rest of the document where appropriate. However there is not a separate section with
        a description and exemplar for the RSTRC in Trust. Given that this element needs to be used so much in normal exchanges,
        providing a link to it in the TOC seems warranted. I do believe this is an editorial change as the element is already
        described in the text elsewhere and that there has been interop using it.<h:br />
      </h:p>
    </description>
    <protocol revision="cd-01">trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-11-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00029.html">Marc Goodner</origin>
    <owner>Marc Goodner</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200611/msg00029.html"></proposal>
    <resolution date="2006-11-15">
      Proposal accepted on Nov. 15 TC call.  Closed on Nov 29th TC call
    </resolution>
  </issue>
  <issue id="PR008" status="Closed" opened="2006-12-07"  isPR="true">
    <title>
      Element Names Inconsistent in Layout Policy
    </title>
    <description>
      <h:p>
        Section 6.7 has:<h:br />

        LaxTimestampFirst<h:br />
        LaxTimestampLast<h:br /><h:br />

        But Section 7.2 has:<h:br />

        &lt;sp:LaxTsFirst ...="" /&gt;  and  &lt;sp:LaxTsLast ...="" /&gt;<h:br /><h:br />

        Proposed Resolution:<h:br />

        Change section 6.7 to LaxTsFirst and LaxTsLast

      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-12-07" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200612/msg00015.html">Hal Lockhart</origin>
    <owner>Hal Lockhart</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200612/msg00015.html"></proposal>
    <resolution date="2007-01-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00007.html" >
      Closed with no action Jan 10, 2007 TC call
    </resolution>
  </issue>
  <issue id="PR009" status="Closed" opened="2006-12-11"  isPR="true">
    <title>
      WS-Trust "1.0" in WS-SecurityPolicy
    </title>
    <description>
      <h:p>
        Section 10 of WS-SP defines Trust10 assertion and says as follows:<h:br />
        The Trust10 assertion allows you to specify which WS-Trust 1.0
        options are supported.
      </h:p>
      <h:p>
        I assume we are not going to change the standardized version of
        WS-Trust to "WS-Trust 1.0".<h:br />
        So, "WS-Trust 1.0" would be "WS-Trust 1.3".
        And it is better to provide sp:Trust13 instead of sp:Trust10 to avoid
        confusion.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-12-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200612/msg00022.html">Toshiro Nishimura</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200612/msg00022.html"></proposal>
    <resolution date="2007-01-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00007.html" >
      Proposal to change to “1.3” to match spec version accepted on Jan 10, 2007 TC call. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>

  </issue>
  <issue id="PR010" status="Closed" opened="2006-12-11"  isPR="true">
    <title>
      Value of @TrustVersion is not clear
    </title>
    <description>
      <h:p>
        In section 5.3.2,
        /sp:IssuedToken/sp:RequestSecurityTokenTemplate/@TrustVersion is
        described as follows:<h:br />
        This optional attribute contains a URI identifying the version of
        WS-Trust referenced by the contents of this element.
      </h:p>
      Does this mean the URI of WS-Trust document or the URI of WS-Trust
      namespace (or other URI?)?
      <h:p>
        I hope this would be clarified
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2006-12-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200612/msg00023.html">Toshiro Nishimura</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00004.html"></proposal>
    <resolution date="2007-01-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00007.html" >
      Proposal to use URI of WS-Trust document accepted on Jan 10, 2007 TC call. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR011" status="Closed" opened="2007-01-16"  isPR="true">
    <title>
      Missing assertions to indicate supported bindings for the secure conversation STS
    </title>
    <description>
      <h:p>
        Currently there is no way for a secure conversation STS to signal the client what WS-Trust bindings it supports. This issue was encountered during the recent SP interop testing where one of the participants STS didn’t except the SCT/Cancel RST messages but the client from another participant was sending SCT/Cancel RST messages to it. Currently it is necessary to exchange this information out of band in order to enable interoperability. Because the all WS-Trust bindings with the exception of Issue binding are optional it makes sense to add assertions to the security policy for SCT based tokens to indicate what bindings are supported for the issued SCT tokens.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-01-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00013.html">Jan Alexander</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00013.html"></proposal>
    <resolution date="2007-01-31" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00052.html" >
      Proposal accepted on Jan 31, 2007 TC call. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR012" status="Closed" opened="2007-01-24"  isPR="true">
    <title>
      Need policy example for encrypted username token
    </title>
    <description>
      <h:p>
        On the Security Policy Examples document, there is an example of unencrypted plain text Username Token policy on 2.1.1.1, but there is no example for encrypted plain text Username Token policy.
        Sending unencrypted password text, as showed on 2.1.1.1, is not a secure way to handle the Username Token. The example should not be advertised as the only way to handle plain text password.
        We do have an encrypted plain text password policy on section 2.1.3 -- “(WSS 1.0) UsernameToken with Mutual X.509v3 Authentication, Sign, Encrypt”. However, this example requires signature. It is more complicated.
        Encrypted support token without signature is a very common use case. It is documented on the first WS-Security Interop Scenarios Document [WSS10-INTEROP-01 Scenario 1 – section 4.4.4] (http://www.oasis-open.org/committees/download.php/11374/wss-interop1-draft-06-merged-changes.pdf ).
        This is a real requirement for this use case scenario in the field, too. If a client does not have its own private key then the Username Token is the only way for authentication. If the server cannot accept digested password, then encrypted password is the only way to secure authentication. The client does not have key for signature, SignedEncryptedSupportingTokens assertion is not an alternative in this scenario.
      </h:p>
    </description>
    <protocol revision="contrib">examples</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-01-24" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00022.html">Symon Chang</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00022.html"></proposal>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200702/msg00045.html"/>
    <resolution date="2007-02-21" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00052.html" >
      Proposal 2 accepted and assigned to the Examples Doc editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>


  <issue id="PR013" status="Closed" opened="2007-01-24"  isPR="true">
    <title>
      Need EncryptedSupportingTokens assertion
    </title>
    <description>
      <h:p>
        The current WS-SP spec has SupportingTokens, SignedSupportingTokens, and SignedEncryptedSupportingTokens assertions, but does not have EncryptedSupportingTokens assertion.
        Encrypted support token without signature is a common use case, when the plain text password is used on the Username Token for authentication, and the client does not have private key for signature. When the server can only accept plain text password, encrypt the password with server’s X509 certificate is a good security practice, but existing spec does not have a simply assertion in supporting token for this simple requirement.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-01-24" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00024.html">Symon Chang</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00024.html"></proposal>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200702/msg00040.html"/>
    <resolution date="2007-02-21" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00052.html" >
      Proposal 2 accepted and assigned to the SP Doc editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR014" status="Closed" opened="2007-01-29"  isPR="true">
    <title>
      Signature protection semantics clarification
    </title>
    <description>
      <h:p>
        Currently the security binding [Signature Protection] property requires that all signature and signature confirmation elements MUST be encrypted when the property value is set to ‘true’. Given the fact that this property is only settable on security binding and security binding assertion can be associated with endpoint or operation scope only, it is not possible to express this requirement for individual messages or faults. Sometimes individual messages for a single operation may differ as to what message parts are encrypted in those messages. Generally, if there is nothing encrypted in the message, encrypting the signature does not add value from the security standpoint, it only degrades the performance. But given the current design, it is not possible to express signature protection requirement is such a way that would require signature element to be encrypted only for messages where there is at least one part encrypted. The proposal below changes the semantics of the [Signature Protection] assertion so that it is valid to have a signature element not encrypted if there is nothing else in the message that is encrypted if the [Signature Protection] property value is set to ‘true’. This allows capturing scenarios like the one above.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-01-29" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00034.html">Jan Alexander</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00034.html">
      <h:p>Change the [Signature Protection] property description on lines 1305 – 1308 as follows:</h:p>
      This boolean property specifies whether the signature must be encrypted. If the value is 'true', the primary signature MUST be encrypted and any signature confirmation elements MUST also be encrypted. The primary signature element is not required to be encrypted if the value is ‘true’ when there is nothing else in the message that is encrypted. If the value is 'false', the primary signature MUST NOT be encrypted and any signature confirmation elements MUST NOT be encrypted. The default value for this property is 'false'.
    </proposal>
    <resolution date="2007-02-14" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00029.html" >
      Proposal accepted and assigned to the SP editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR015" status="Closed" opened="2007-01-30"  isPR="true">
    <title>
      Missing issuer and required claims inside token assertions
    </title>
    <description>
      <h:p>
        The current WS-SecurityPolicy specification does not provide any guidance or explicit support for expressing requirement for multiple supporting token of the same type. The main issue is that it is not really possible to differentiate between individual tokens if they share the same token type and thus matching the actual tokens with the token assertions in the receiver’s policy. The only exception is IssuedToken assertion, where it is possible to differentiate tokens based on the token issuer parameter.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-01-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00049.html">Jan Alexander</origin>
    <owner>
      Editors
    </owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200701/msg00049.html">
      <h:p>The proposal adds the optional issuer parameter to all token assertions defined in the specification. The existing sp:Issuer element as defined for IssuedToken, SpnegoContextToken and SecureConversationToken assertions is reused for this purpose. </h:p>
      <h:p>In addition to that it adds an optional claims parameter that allows the receiver to express required claims that have to be present in the token in order for the token to fulfill the token assertion requirements. The existing wst:Claims element from WS-Trust Issuance binding is reused for this purpose. The wst:Claims element allows the receiver to fine tune the token requirements in its policy. </h:p>
      <h:p>The proposal also clarifies the rules that govern the matching of the actual security tokens with the token assertions. </h:p>
    </proposal>
    <resolution date="2007-02-14" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00029.html" >
      Proposal accepted and assigned to the SP editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR016" status="Closed" opened="2007-02-10"  isPR="true">
    <title>
      Missing assertion to indicate arbitrary RSA public key to be used as a security token
    </title>
    <description>
      <h:p>
        There is currently no assertion defined in security policy to indicate that an arbitrary key pair needs to be
        used in the message. There is class of scenarios where the sender needs to send an arbitrary public key to
        the recipient but such scenario cannot be currently captured by the security policy. The proposal is to add
        a new KeyValue token assertion to the specification.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-02-10" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00010.html">Jan Alexander</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00010.html">
    </proposal>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR017" status="Closed" opened="2007-02-11"  isPR="true">
    <title>
      Use derived keys language consistent with WS-SecureConversation
    </title>
    <description>
      <h:p>
        In SC the phrase “implied derived keys” is used, in SP “implicit derived keys” is used. We should be
        consistent across the specs.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-02-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00011.html">Marc Goodner</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00011.html">
      <h:p>
        Change occurrences of "implicit derived keys" to "implied derived keys" to match SecureConversation<h:br/>

        Change the [Implicit Derived Keys] property to [Implied Derived Keys]<h:br/>

        Change all RequireImplicitDerivedKeys assertions to RequireImpliedDerivedKeys<h:br/>
      </h:p>

    </proposal>
    <resolution date="2007-02-14" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00029.html" >
      Proposal accepted and assigned to the SP editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR018" status="Closed" opened="2007-02-11"  isPR="true">
    <title>
      Correct requirement to include policy element
    </title>
    <description>
      <h:p>
        Correct requirement to include policy element.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-02-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00012.html">Marc Goodner</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00012.html">
      <h:p>
        Update description of instances of wsp:Policy as required instead of optional.<h:br/><h:br/>
        /sp:*/wsp:Policy<h:br/>
        This required element identifies additional requirements for use of the sp:* assertion.
      </h:p>
    </proposal>
    <resolution date="2007-02-14" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00029.html" >
      Proposal accepted and assigned to the SP editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR019" status="Closed" opened="2007-02-11"  isPR="true">
    <title>
      Update SC Assertion Names to match current spec
    </title>
    <description>
      <h:p>
        We updated the Trust assertion names to match the current version of the specification.
        We should do the same for the SC assertions
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-02-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00013.html">Marc Goodner</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00013.html">
      <h:p>
        Change all SC200502SecurityContextToken assertions to SC13SecurityContextToken
      </h:p>
    </proposal>
    <resolution date="2007-02-14" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00029.html" >
      Proposal accepted and assigned to the SP editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR020" status="Closed" opened="2007-02-11"  isPR="true">
    <title>
      No means to express need to secure SOAP Messages with
      Attachments (SwA)
    </title>
    <description>
      <h:p>
        The current specification provides no mechanism to express the
        requirement to secure SOAP Messages with Attachments (SwA).
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-02-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00014.html">Frederick Hirsch</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00014.html">
      <h:p>
        Add to sp:SignedParts and sp:EncryptedParts sp:SignedParts/Attachment
        and sp:EncryptedParts/Attachment respectively.
      </h:p>
    </proposal>
    <resolution date="2007-02-21" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00052.html" >
      Proposal accepted and assigned to the SP Doc editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR021" status="Closed" opened="2007-02-11"  isPR="true">
    <title>
      Allow W3C version of WS-Policy to be used
    </title>
    <description>
      <h:p>
        WS-Policy has progressed quickly at the W3C. WS-SecurityPolicy should be updated to allow
        the use of WS-Policy 1.5 in addition to the current reference to WS-Policy 1.2.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-02-11" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00015.html">Marc Goodner</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00015.html">
      <h:p>
        1. Add following text to WS-SecurityPolicy introduction:<h:br/><h:br/>

        “The assertions defined within this specification have been designed to work independently of a
        specific version of WS-Policy. At the time of the publication of this specification the versions
        of WS-Policy known to correctly compose with this specification are WS-Policy 1.2 [current reference]
        and 1.5 [add reference to CR when available]. Within this specification the use of the namespace
        prefix wsp refers generically to the WS-Policy namespace, not a specific version.”<h:br/><h:br/>

        Strike wsp from the namespace table.
      </h:p>

      <h:p>
        2. Remove the hard dependency from the WS-SecurityPolicy XML Schema document to a specific version of
        WS-Policy:<h:br/><h:br/>

        &lt;xs:complexType name="NestedPolicyType"&gt;<h:br/>

        &lt;xs:sequence&gt;<h:br/>

        &lt;xs:element ref="wsp:Policy" /&gt;
        &lt;!-- remove this line --&gt;<h:br/>

        &lt;xs:any minOccurs="0" maxOccurs="unbounded" namespace="##other" processContents="lax"/&gt;<h:br/>

        &lt;/xs:sequence&gt;<h:br/>

        &lt;xs:anyAttribute namespace="##any" processContents="lax" /&gt;<h:br/>

        &lt;/xs:complexType&gt;<h:br/><h:br/>
        The extensibility point that follows will allow the use of the nested policy.
      </h:p>
    </proposal>
    <resolution date="2007-02-14" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00029.html" >
      Proposal accepted and assigned to the SP editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>
  <issue id="PR022" status="Closed" opened="2007-02-20"  isPR="true">
    <title>
      Assertion to allow STS to require requestor to specify scope of issued token
    </title>
    <description>
      <h:p>
        WS-Trust defines the rules for interpreting the combinations of when a requestor specifies token scope and/or when the issuer
        returns token scope using the AppliesTo element. However, there is no way to give an STS control over when a requestor may/should
        specify the AppliesTo element in the RST request, and there are scenarios when such control would be useful. Of course, the STS always
        has the final say and can refuse a request lacking suitable AppliesTo, but without any a priori indication to a requestor that did not
        normally include AppliesTo info, the only option would be to fault and then retry.
      </h:p>
      <h:p>
        It would be useful to introduce a policy assertion that allows an STS to specify the requirement for scope information to be included
        in the form of AppliesTo in the RST. It would represent an intersectable behavior, and can very naturally fit under the top-level Trust
        assertion already defined in WS-SecurityPolicy that pertains to WS-Trust exchanges.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-02-10" href="http://www.oasis-open.org/archives/ws-sx/200702/msg00047.html">Marc Goodner</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200702/msg00047.html">
      <h:p>
        Add &lt;sp:RequiresAppliesTo/>? to the exemplar of Section 10.1 Trust13 Assertion with the following definition.
      </h:p>

      <h:p>
        /sp:Trust10/wsp:Policy/sp:RequireAppliesTo
      </h:p>
      <h:p>
        This optional element is a policy assertion indicates that the STS requires the requestor to specify the scope for the issued token
        using wsp:AppliesTo in the RST.
      </h:p>
    </proposal>
    <resolution date="2007-02-21" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00052.html" >
      Proposal accepted and assigned to the SP Doc editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>
  <issue id="PR023" status="Closed" opened="2007-02-20"  isPR="true">
    <title>
      It should be more clear as to which token is used by a protection assertion
    </title>
    <description>
      <h:p>
        On the 2/13 call there was some debate about whether or not the tokens identified in a binding assertion would be used for SignedParts,
        SignedElements, EncryptedParts, EncryptedElements assertions attached to a message. As there is no other place to specify the tokens to
        use for these assertions (as opposed to supporting tokens assertions that embed these assertions directly), it should be very clear that
        the binding assertion must be used.
      </h:p>
    </description>
    <protocol revision="cd-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-02-20" href="http://www.oasis-open.org/archives/ws-sx/200702/msg00046.html">Tony Gullotta</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200702/msg00046.html">
      <h:p>
        Add to the text in the binding assertion section or the SignedParts, SignedElements, EncryptedParts, EncryptedElements assertions
        sections to make the connection more obvious.
      </h:p>
    </proposal>
    <resolution date="2007-02-21" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00052.html" >
      Proposal accepted and assigned to the SP Doc editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-02-28" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00061.html">
      Moved to Closed at Feb 28th TC call.
    </resolution>
  </issue>

  <issue id="PR024" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      SP document doesn't say how to get a value for the wsp: prefix
    </title>
    <description>
      section 1 -- line 9:<h:br/>
      This document used to provide the value of the wsp prefix. Now it doesn't say how to get that value. In particular, it is defined in both WS-Policy and WS-PolicyAttachment, so we must be consistent.
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00021.html">Christoper Leuder</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00021.html">
      Add a sentence "Refer to the WS-Policy and WS-PolicyAttachment specifications for the value of the wsp namespace.
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00035.html">
      The value of the namespace wsp is available from the referenced versions of the specifications. Close this issue with no action.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <issue id="PR025" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      Clarify that consistent versions of WS-Policy and WS-PolicyAttachment specifications MUST be used.
    </title>
    <description>
      section 1 -- line 9:<h:br/>
      This document refers to both WS-Policy and WS-PolicyAttachment, so we must be consistent.
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00022.html">Christoper Leuder</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00022.html">
      Clarify that consistent versions of WS-Policy and WS-PolicyAttachment specifications MUST be used.
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00036.html">
      Close this issue with no action.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <issue id="PR026" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      Editorial comments on WS-SecurityPolicy Public Review document
    </title>
    <description>
      <h:p>
        section 1.4.1 -- line 129<h:br/>
        The text appears to be truncated. The RFC reference is omitted.<h:br/>
        <h:b>Proposal</h:b>: Add the RFC 2119 reference.
      </h:p>
      <h:p>
        sections 5.2.1, 5.2.2 -- lines 727, 732:<h:br/>
        It references attribute, while it is talking about an element.<h:br/>
        <h:b>Proposal</h:b>: Change "attribute" to "element".
      </h:p>
      <h:p>
        section 5.2.4 -- line 752 :<h:br/>
        Strange text "to as multiple tokens as it sees fit."<h:br/>
        <h:b>Proposal</h:b>: Change text "to as many tokens as it sees fit." Or change to ", and apply to as many tokens as it sees fit."
      </h:p>
      <h:p>
        section 5.4.1 -- line 832 :<h:br/>
        Slash "/" is missing.<h:br/>
        <h:b>Proposal</h:b>: Add "/" before "sp:Issuer".
      </h:p>
      <h:p>
        section 5.4.7 -- line 1255:<h:br/>
        wsp:Policy is now required, and its contents are optional. But the "?" is in the wrong place.<h:br/>
        <h:b>Proposal</h:b>: Put the "?" on line 1257 rather than on line 1255.
      </h:p>
      <h:p>
        sections 8.2, 8.3, 8.4 -- lines 2297, 2352, 2409:<h:br/>
        Spurious "|" symbol.<h:br/>
        <h:b>Proposal</h:b>: Delete the "|" symbol or add ellipses after it "...".
      </h:p>
      <h:p>
        section 10.1  -- line 2773 :<h:br/>
        Confusing text.<h:br/>
        <h:b>Proposal</h:b>: Clarify the text "element is a policy assertion indicates", maybe by adding "that" before "indicates".
      </h:p>
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00023.html">Christoper Leuder</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00023.html">
      See Description
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Proposed editorial changes adopted and assigned to editors on April 18, 2007 TC call.<h:br/>
      Status changed to Pending.
    </resolution>
    <resolution date="2007-05-02" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00029.html">
      Updates are in the approved SP Committee Spec.  Status changed to Closed.
    </resolution>
  </issue>

  <issue id="PR027" status="closed" opened="2007-04-16"  isPR="true">
    <title>
      Editorial comments on WS-SecurityPolicy Public Review document
    </title>
    <description>
      <h:p>
        Multiple sections, lines 456, 505,536, 586, 613<h:br/>
        Difficult to parse. <h:br/>
        <h:b>Proposal</h:b>: Replace "binding specific" with "binding-specific"
      </h:p>
      <h:p>
        multiple sections, lines 730, 734: <h:br/>
        intended use outside the scope of this specification is immaterial <h:br/>
        <h:b>Proposal</h:b>: replace "is intended to be used" with "may be used"
      </h:p>
      <h:p>
        section 5.2.2 -- line 733:<h:br/>
        verb usage<h:br/>
        <h:b>Proposal</h:b>: Replace "points" with "pointing"
      </h:p>
      <h:p>
        section 5.4.11 -- line 1552 :<h:br/>
        plural agreement<h:br/>
        <h:b>Proposal</h:b>: Replace "by another specifications" with "in other specifications"
      </h:p>
      <h:p>
        section 8.6 -- line 2460 :<h:br/>
        only modifies when, not used<h:br/>
        <h:b>Proposal</h:b>: Replace "only used when" with  "used only when"
      </h:p>
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00024.html">Jackson Wynn</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00024.html">
      See Description
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00038.html">
      Do not accept the the first two proposed changes. Accept the remainder.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      First two proposed changes in NOT adopted. Remaining three proposed changes adopted and assigned to editors.<h:br/>
      Status changed to Pending.
    </resolution>
    <resolution date="2007-05-02" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00029.html">
      Updates are in the approved SP Committee Spec.  Status changed to Closed.
    </resolution>
  </issue>


  <issue id="PR028" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      Add reference to Message Transmission Optimization Mechanism (MTOM) in addition to SWA.
    </title>
    <description>
      <h:p>
        Lines 495,576:<h:br/>
        Line 174 references SOAP 1.1 and 177 referencces SOAP 1.2, but line 197 SWA and 278 SWA-Profile are specific to SOAP 1.1 only. The sp:Attachments is therefore specific to just SOAP 1.1. It should be generalized to be inclusive of SOAP 1.2 by referencing the SOAP 1.2 attachment mechanism as well: Message Transmission Optimization Mechanism (MTOM)..
      </h:p>
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00025.html">Christoper Leuder</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00025.html">
      Add reference to Message Transmission Optimization Mechanism (MTOM) in addition to SWA.
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00039.html">
      Close this issue with no action.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <issue id="PR029" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      Move capability assertions (e.g., MustNotSendCancel, MustNotSendRenew, etc.) which are properties of the STS not the token, into WS-Trust assertion
    </title>
    <description>
      <h:p>
        section 5.4.5:<h:br/>
        The SpnegoContextToken includes STS capabilities assertions, e.g., MustNotSendCancel, MustNotSendRenew, etc., which are properties of the STS not the token. This tight coupling between the token and the STS server requires the list of assertions be adjusted.<h:br/>
        section 5.4.7:<h:br/>
        The SecureConversationTokens includes STS capabilities assertions which are properties of the STS not the token. This tight coupling between the token and the STS server requires the list of assertions be adjusted
      </h:p>
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00026.html">Jackson Wynn,</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00026.html">
      Fold these STS capability assertions into WS-Trust assertion
    </proposal>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200704/msg00040.html">
      Close this issue with no action.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <issue id="PR030" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      Descriptions  are inconsistent with the element tag names (/sp:MustNotSendCancel, /sp:MustNotSendAmend, "/sp:MustNotSendRenew").
    </title>
    <description>
      <h:p>
        section 5.4.5 -- lines 1152, 1156, 1160:<h:br/>
        Descriptions  are inconsistent with the element tag names
      </h:p>
      <h:p>
        section 5.4.7 -- lines 1297, 1301, 1305:<h:br/>
        Same comment as for lines 1152, 1156, and 1160.
      </h:p>
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00027.html">Christoper Leuder</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00027.html">
      Change "/sp:MustNotSendCancel" to "/sp:CancelNotSupported", or change the description to state explicitly that the Cancel must not be sent.<h:br/>
      Change "/sp:MustNotSendAmend" to "/sp:AmendNotSupported", or change the description to state explicitly that the Amend must not be sent.<h:br/>
      Change "/sp:MustNotSendRenew" to "/sp:RenewNotSupported", or change the description to state explicitly that the Renew must not be sent.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Interop has been conducted using the existing names.  The semantics described in the associated text are correct.<h:br/>
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <issue id="PR031" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      Inconsistencies with RFC 2119
    </title>
    <description>
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00028.html">Christoper Leuder</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00028.html">
      section 5.2.2 -- line 740: Change "cannot" to 'MUST NOT" <h:br/>
      section 5.2.3 -- line 746: Capitalize "MUST"? Also, please review other places where "may" and "must" appear for consistency, e.g., line 749.<h:br/>
      section 6.4 -- line 1692:  Change "is not required to" to "SHOULD NOT" or to "OPTIONAL"? Not clear which choice is intended.<h:br/>
      section 8.1 -- line 2230:  Change "can" to "MAY".<h:br/>
      section 8.6 -- line 2455:  Change "can" to "MAY".<h:br/>
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00041.html">
      Close this issue with no action.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <issue id="PR032" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      statement that this specification will not further define the wst:claims element should not be followed by more information about it
    </title>
    <description>
      <h:p>
        section 5.2.3 -- lines 743,744:<h:br/>
        The statement that this specification will not further define this element should not be followed by more information about it
      </h:p>
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00029.html">Jackson Wynn</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00029.html">
      Move this statement to the end section 5.2.3
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00042.html">
      Close this issue with no action.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <issue id="PR033" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      plural agreement
    </title>
    <description>
      <h:p>
        lines 840, 908, 989, 1076, 1137,1199, 1275, 1397, 1468, 1534:<h:br/>
        “This optional element identifies the required claims that a security token must contain in order to satisfy the token assertion requirements”
      </h:p>
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00030.html">Jackson Wynn</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00030.html">
      lines 840, 908, 989, 1076, 1137,1199, 1275, 1397, 1468, 1534: Remove "the" or replace with "all"
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00043.html">
      Close this issue with no action.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <issue id="PR034" status="Closed" opened="2007-04-16"  isPR="true">
    <title>
      Ambiguous value for "sp:RequireAppliesTo" element
    </title>
    <description>
      section 10.1, line 2772-2773: <h:br/>
      The value of the "sp:RequireAppliesTo" element is ambiguous. Is it an empty element, or does it contain a reference to an entity that the policy applies to?
    </description>
    <protocol revision="cd-02">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-04-16" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00031.html">Christoper Leuder</origin>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00031.html">
      Clarify what is the value of the "sp:RequireAppliesTo" element.
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00044.html">
      Close this issue with no action.
    </proposal>
    <resolution date="2007-04-18" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00054.html">
      Closed with no action on April 18, 2007 TC call
    </resolution>
  </issue>

  <!-- Errata items -->
  <issue id="ER001" status="Closed" opened="2007-02-15" closed="2007-10-17"  isER="true">
    <title>Inconsistent IncludeToken URI between spec and schema xsd file</title>
    <description>
      <h:p>The URI value for IncludeToken is different between the XML schema xsd file and the current WS-SecurityPolicy spec.</h:p>
      <h:p>The current WS-SP schema (ws-securitypolicy-1.2.xsd) has the following values for IncludeToken:</h:p>
      <h:p>
        &lt;xs:simpleType name="IncludeTokenType"&gt;<h:br/>
        &lt;xs:restriction base="xs:anyURI"&gt;<h:br/>
        &lt;xs:enumeration value="http://docs.oasis-open.org/ws-sx/ws-trust/200702/ws-securitypolicy/IncludeToken/Never";/&gt;<h:br/>
        &lt;xs:enumeration value="http://docs.oasis-open.org/ws-sx/ws-trust/200702/ws-securitypolicy/IncludeToken/Once";/&gt;<h:br/>
        &lt;xs:enumeration value="http://docs.oasis-open.org/ws-sx/ws-trust/200702/ws-securitypolicy/IncludeToken/AlwaysToRecipient";/&gt;<h:br/>
        &lt;xs:enumeration value="http://docs.oasis-open.org/ws-sx/ws-trust/200702/ws-securitypolicy/IncludeToken/AlwaysToInitiator";/&gt;<h:br/>
        &lt;xs:enumeration value="http://docs.oasis-open.org/ws-sx/ws-trust/200702/ws-securitypolicy/IncludeToken/Always";/&gt;<h:br/>
        &lt;/xs:restriction&gt;<h:br/>
        &lt;/xs:simpleType&gt;<h:br/>
      </h:p>
      <h:p> The WS-SecurityPolicy spc (ws-securitypolicy-1.2-spec-cs.doc) section 5.1.1 has the URI of:</h:p>
      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/Never<h:br/>
      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToRecipient<h:br/>
      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToInitiator<h:br/>
      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/Always<h:br/>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-02-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00042.html"> Martin Raepple</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00029.html">
      This is a spec/schema mismatch. The spec is clear and correct. The schema typo will be corrected using the errata process. Issue number will be updated to use the "ER" prefix (ER001) to flag this as an issue to be addressed via errata.
    </proposal>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Assigned to editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to review on Oct. 3rd TC call.
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>
  <issue id="ER002" status="Closed" opened="2007-05-15" closed="2007-10-17"  isER="true">
    <title>Editorial comments on SP</title>
    <description>
      <h:p>Lines 2097ff: "The specified token populates the [Recipient Signature Token] property and is used for the message signature from Recipient to recipient."</h:p>
      should be changed to
      <h:p>Lines 2097ff: "The specified token populates the [Recipient Signature Token] property and is used for the message signature from recipient to the initiator.</h:p>
      <h:p>Lines 2103ff: "The specified token populates the [Recipient Encryption Token] property and is used for the message encryption from recipient to Recipient."</h:p>
      should be changed to
      <h:p>Lines 2103ff: "The specified token populates the [Recipient Encryption Token] property and is used for the message encryption from initiator to recipient."</h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00046.html"> Martin Raepple</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00046.html">
    </proposal>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Assigned to editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to review on Oct. 3rd TC call.
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>
  <issue id="ER003" status="Closed" opened="2007-05-15" closed="2007-10-17"  isER="true">
    <title>Clarification of policy usage for derived keys in SC</title>
    <description>
      <h:p>Section 7 (Deriving Keys) in WS-SecureConversation refers to policy assertions for label and length of derived keys that do not exist in WS-SP 1.2:</h:p>
      <h:p> Lines 780ff: "Labels are processed as UTF-8 encoded octets. If either isn't specified in the policy, then a default value of "WS-SecureConversation" (represented as UTF-8 octets) is used."</h:p>
      <h:p>Lines 892ff: "If additional information is not specified (such as explicit elements or policy), then the following defaults apply: The offset is 0 / The length is 32 bytes (256 bits)"</h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <protocol revision="cs-01">ws-sc</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-05-15" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00047.html"> Martin Raepple</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00047.html">
      Option 1: Remove references to policy in the text as follows:
      <h:p>Lines 780ff: "Labels are processed as UTF-8 encoded octets. If additional information is not specified as explicit elements, then a default value of "WS-SecureConversation" (represented as UTF-8 octets) is used."</h:p>
      <h:p>Lines 892ff: "If additional information is not specified as explicit elements, then the following defaults apply:"</h:p>
      <h:p>Option 2: Explicitly refer to custom / non-standard policy assertions</h:p>
      <h:p>Option 3: Add policy assertions for label and length (e.g. as new attributes/elements to the Derived Keys Property) to SP</h:p>
    </proposal>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Assigned to editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to review on Oct. 3rd TC call.
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>
  <issue id="ER004" status="Closed" opened="2007-05-30" closed="2007-10-17"  isER="true">
    <title>Wrong Security Context Token assertion in example </title>
    <description>
      <h:p>
        The example given in section 5.4.7, SecureConversationToken Assertion, lines 1271ff, contains a wrong policy assertion for the Security Context Token:
      </h:p>
      <h:p>
        Line 1281: sp:SC10SecurityContextToken<h:br/>
        should be changed to<h:br/>
        Line 1281: sp:SC13SecurityContextToken<h:br/>
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00059.html"> Martin Raepple</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00059.html">
      See Description
    </proposal>
    <resolution date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00067.html" >
      Assigned to editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to review on Oct. 3rd TC call.
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>
  <issue id="ER005" status="Closed" opened="2007-06-01" closed="2007-07-25" isER="true">
    <title>Restriction on Encryption of Headers </title>
    <description>
      <h:p>
        Lines 526-529<h:br/>
        "Such encryption will encrypt such elements  using WSS 1.1 Encrypted Headers.
        As such, if WSS 1.1 Encrypted Headers are not supported by a service,
        then this element cannot be used to specify headers that require encryption using message level security."
      </h:p>
      <h:p>
        Does this mean, that if as a service provider, I cannot understand what a EncryptedHeader
        means,   then clients requesting this service cannot encrypt any of the request soap headers using message level security?
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00001.html">Aditya Athalye</origin>
    <owner>Prateek Mishra</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00001.html">
      <h:p>
        I agree that EncryptedHeader could help protect sensitive attributes on the soap header, but I doubt if EncryptedHeader
        has gained sufficient popularity amongst implementors. I believe till the time, it is universally adopted,
        and implemented by all, the above restriction of not being able to use message level security for header confidentiality
        should not be in place.
      </h:p>
      <h:p>
        This IMO can hurt interoperability between vendors who support this, and those who don't.Furthermore, till such time, EncryptedData can be used by service providers and requestors.
      </h:p>
    </proposal>
    <resolution date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html" >
      TC members had trouble understanding the issue and what is being proposed.  The issue originator was not present on the call. Prateek will seek clarification from Aditya
    </resolution>
    <resolution date="2007-07-24" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00065.html" >
     Closed with no action. 
    </resolution>
  </issue>
  <issue id="ER006" status="Active" opened="2007-06-04"  isER="true">
    <title>
      The specification states that if [Timestamp] is false, thenwsu:Timestamp
      should not be present inside  &lt;wsse:Security&gt; header.
    </title>
    <description>
      <h:p>
        Does this mean, that if the [Timestamp] property is set to false, or &lt;includeTimestamp&gt;
        is absent, and yet if a request/response &lt;wsse:Security&gt; header contains a &lt;wsu:Timestamp&gt;,
        then this should be treated as violation entailing a rejection of such a request/response?
      </h:p>
      <h:p>
        My question is: Is this intended behaviour? Is there a practical use case for this? I guess most implementors follow the following algorithm/truth table:
      </h:p>
      <h:p>
        Policy     Actual     Result<h:br/>
        True       True       Accept<h:br/>
        True       False      Reject<h:br/>
        False      False      Accept<h:br/>
        False      True       Accept<h:br/>
      </h:p>
      <h:p>
        The highlighted values in the truth table are something we noticed implementors (in WS-Policy interop event) doing,
        which means that if [Timestamp] is set to false, ignore the &lt;wsu:Timestamp&gt; element="" if found inside
        &lt;wsse:Security&gt; header, and thus accept the message.
      </h:p>
      <h:p>
        Should the spec be updated accordingly, or should vendors change their implementation?
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-04" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00004.html">Aditya Athalye</origin>
    <owner>Marc Goodner</owner>
    <proposal href="http://www.oasis-open.org/archives/ws-sx/200710/msg00016.html">Two proposals, a and b, described in message outlining positions.</proposal>
  </issue>
  <issue id="ER007" status="Closed" opened="2007-06-04" closed="2007-10-17"  isER="true">
    <title>Minor editorial addition to &lt;ContentEncryptedElements&gt; Assertion </title>
    <description>
      <h:p>
        Lines 592-593<h:br/>
        /sp:ContentEncryptedElements/@XPathVersion<h:br/>
        This optional attribute contains a URI which indicates the version of XPath to use.
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-04" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00007.html">Aditya Athalye</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00007.html">
      <h:p>
        As with all other assertions that use XPath, this assertion element should also explicitly state the following:
      </h:p>
      /sp:ContentEncryptedElements/@XPathVersion<h:br/>

      This optional attribute contains a URI which indicates the version of XPath to use.
      If no attribute is provided, then XPath 1.0 is assumed.
    </proposal>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Assigned to editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to review on Oct. 3rd TC call.
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>
  <issue id="ER008" status="Closed" opened="2007-06-19" closed="2007-06-27"  isER="true">
    <title>
      Applicability of TokenInclusion Values for various security tokens
    </title>
    <description>
      <h:p>
        The WS-SP spec attaches a @IncludeToken for the various security tokens that are defined. The Token Inclusion values are also
        enumerated in Section 5.1.1.
        However, the spec does not clearly indicate the applicability of various Inclusion Values for each token.
        What I mean is: Not all TokenInclusion Values defined will be applicable/pertinent to each security token.
      </h:p>
      UseCase:
      <h:p>
        1.) For a UsernameToken, using TokenInclusion values of "Never", or "AlwaysToInitiator" may not be relevant. A policy cannot useÂ  something likeÂ  "RequireKeyIdentifierReference"Â  for referencingÂ  UsernameTokens, so probably a UsernameToken
        will always be included, and probably always sent from Initiator to Recipient.
      </h:p>
      <h:p>
        2.) A SAMLToken may never need to use an Inclusion value of "AlwaysToInitiator".
      </h:p>
      <h:p>
        3.) An X509Token can use any of these values depending on the scenario.
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-19" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00052.html">Aditya Athalye</origin>
    <owner>Aditya Athalye</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00052.html">
      <h:p>
        I propose that the spec also throw some light on this aspect in the description for @IncludeToken for each such token, so that
        implementors/users get a clear idea of this.<h:br/>
        Following quoted text could be added to the UNToken:
      </h:p>
      <h:p> This optional attribute identifies the token inclusion value for this token assertion. "It is RECOMMENDED however that this security token uses the "Always", "AlwaysToRecipient", "Once" inclusion values".</h:p>
      <h:p>Similar text can be added for the remaining tokens wherever applicable.The schema can still use the "IncludeTokenType", but the documentation IMO could be a little clearer.</h:p>
    </proposal>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00058.html">
    </proposal>
    <resolution date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html" >
      Closed with no action.
    </resolution>
  </issue>
  <issue id="ER009" status="Closed" opened="2007-05-30" closed="2007-10-17">
    <title>Policy Assertion Parameters and alternatives</title>
    <description>
      <h:p>
        As we know WS Policy does not use Policy Assertion parameters when intersecting Policy Assertions. IMO this would impact WS Security Policy to certain extent.
        eg:
      </h:p>
      Alternative A<h:br/>
      -------------------------------<h:br/>
      &lt;sp:AsymmetricBinding &gt;<h:br/>
      &lt;wsp:Policy&gt;<h:br/>
      &lt;sp:InitiatorToken &gt;<h:br/>
      &lt;sp:X509Token sp:IncludeToken = ".....Never"&gt;<h:br/>
      &lt;wsp:Policy&gt;<h:br/>
      &lt;sp:RequireDerivedKeys ...="" /&gt;<h:br/>
      &lt;sp:RequireKeyIdentifierReference ...="" /&gt;<h:br/>
      &lt;/wsp:Policy&gt;<h:br/>
      &lt;/sp:X509Token&gt;<h:br/>
      &lt;/sp:InitiatorToken &gt;<h:br/>

      &lt;sp:RecipientToken &gt;<h:br/>
      &lt;sp:X509Token sp:IncludeToken = ".......Never"&gt;<h:br/>
      &lt;wsp:Policy&gt;<h:br/>
      &lt;sp:RequireDerivedKeys ...="" /&gt;<h:br/>
      &lt;sp:RequireKeyIdentifierReference ...="" /&gt;<h:br/>
      &lt;/wsp:Policy&gt;<h:br/>
      &lt;/sp:X509Token&gt;<h:br/>
      &lt;/sp:RecipientToken &gt;<h:br/>

      &lt;/wsp:Policy&gt;<h:br/>
      &lt;/sp:AsymmetricBinding &gt;<h:br/>

      <h:p>
        Alternative B
        -------------------------------
      </h:p>
      &lt;sp:AsymmetricBinding &gt;<h:br/>
      &lt;wsp:Policy&gt;<h:br/>
      &lt;sp:InitiatorToken &gt;<h:br/>
      &lt;sp:X509Token sp:IncludeToken = "......Always"&gt;<h:br/>
      &lt;wsp:Policy&gt;<h:br/>
      &lt;sp:RequireDerivedKeys ...="" /&gt;<h:br/>
      &lt;sp:RequireKeyIdentifierReference ...="" /&gt;<h:br/>
      &lt;/wsp:Policy&gt;<h:br/>
      &lt;/sp:X509Token&gt;<h:br/>
      &lt;/sp:InitiatorToken &gt;<h:br/>

      &lt;sp:RecipientToken &gt;<h:br/>
      &lt;sp:X509Token sp:IncludeToken = "......Always"&gt;<h:br/>
      &lt;wsp:Policy&gt;<h:br/>
      &lt;sp:RequireDerivedKeys ...="" /&gt;<h:br/>
      &lt;sp:RequireKeyIdentifierReference ...="" /&gt;<h:br/>
      &lt;/wsp:Policy&gt;<h:br/>
      &lt;/sp:X509Token&gt;<h:br/>
      &lt;/sp:RecipientToken &gt;<h:br/>

      &lt;/wsp:Policy&gt;<h:br/>
      &lt;/sp:AsymmetricBinding &gt;<h:br/>
      <h:p>
        When intersected with the default algorithm of the policy framework the resulting policy would contain mutually contradictory X509Token parameters. On one hand, the resulting policy would require never to include X509Tokens while at the same time always requiring to include X509Tokens. The intersection result would effectively yield an invalid policy.
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>design</type>
    <origin date="2007-05-30" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00060.html">K Venugopal</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00024.html">
    </proposal>
    <resolution date="2007-06-13" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00049.html" >
      Formerly Issue i134 renumbered as Errata. Proposal accepted. Assigned to editors. Status changed to Pending.
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to review on Oct. 3rd TC call.
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>
  <issue id="ER010" status="Closed" opened="2007-06-20" closed="2007-10-17"  isER="true">
    <title>Typo in the Security Header Layout section</title>
    <description>

      6.7 Security Header Layout:

      <h:p>
        LaxTimestampFirst As Lax except that the first item in the security header MUST be a wsse:Timestamp.
        LaxTimestampLast As Lax except that the last item in the security header MUST be a wsse:Timestamp.
      </h:p>
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-04" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00055.html">Aditya Athalye</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00055.html">
      Change both these occurrences to wsu:Timestamp
    </proposal>
    <resolution date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html" >
      Status changed to Pending
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to review on Oct. 3rd TC call.
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>
  <issue id="ER011" status="Closed" opened="2007-06-26" closed="2007-10-17"  isER="true">
    <title>Modification request for issue PR014</title>
    <description>
      See Proposal
    </description>
    <protocol revision="cs-01">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-06-01" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00011.html">Aditya Athalye</origin>
    <owner>Editors</owner>
    <proposal href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00011.html">
    </proposal>
    <resolution date="2007-06-27" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html" >
      Status changed to Pending
    </resolution>
    <resolution date="2007-10-03" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00007.html" >
      Moved to review on Oct. 3rd TC call.
    </resolution>
    <resolution date="2007-10-17" href="http://www.oasis-open.org/archives/ws-sx/200710/msg00021.html">
      Status changed to closed on Oct 17th TC call.
    </resolution>
  </issue>

  <issue id="ER012" status="Active" opened="2007-07-25"  isER="true">
    <title>Review normative RFC 2119 language in WS-Trust</title>
    <description>
      Per action item AI-2007-04-18-03. The spec should be reviewed for consistent use of normative language per RFC 2119.
    </description>
    <protocol revision="v1.3">ws-trust</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-07-25" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00066.html">Greg Carpenter</origin>
    <owner>Editors</owner>
  </issue>

  <issue id="ER013" status="Active" opened="2007-07-25"  isER="true">
    <title>Review normative RFC 2119 language in WS-SecureConversation</title>
    <description>
      Per action item AI-2007-04-18-03. The spec should be reviewed for consistent use of normative language per RFC 2119.
    </description>
    <protocol revision="v1.3">ws-sc</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-07-25" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00067.html">Greg Carpenter</origin>
    <owner>Editors</owner>
  </issue>
  
  <issue id="ER014" status="Active" opened="2007-07-25"  isER="true">
    <title>Review normative RFC 2119 language in WS-SecurityPolicy</title>
    <description>
      Per action item AI-2007-04-18-03. The spec should be reviewed for consistent use of normative language per RFC 2119.
    </description>
    <protocol revision="v1.2">ws-sp</protocol>
    <target>spec</target>
    <type>editorial</type>
    <origin date="2007-07-25" href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00068.html">Greg Carpenter</origin>
    <owner>Editors</owner>
  </issue>  
  
  <!-- Action items-->
  <action id="ai-01" date="2006-01-11" status="closed">
    <title>
      Chairs to investigate whether a second ballot is required to fix the XPath version number problem.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00025.html">Done</h:a>
    </description>
  </action>
  <action id="ai-02" date="2006-01-11" status="closed">
    <title>
      Chairs to put link to issues list on TC home page.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00042.html">Done</h:a>
    </description>
  </action>
  <action id="ai-03" date="2006-01-11" status="closed">
    <title>
      Frederick Hirsch to craft proposal for the Issue 11 - "WS-SX Charter XPath requirements ...".
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00021.html">Done</h:a>
    </description>
  </action>
  <action id="ai-04" date="2006-01-11" status="closed">
    <title>
      Chairs to create a Kavi location for WSDL files.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00039.html">Done</h:a>
    </description>
  </action>
  <action id="ai-05" date="2006-01-11" status="closed">
    <title>
      Marc Goodner to create a new issue and assign to Editors to add the OASIS boilerplate to the XSD and WSDL files.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00027.html">Done</h:a>
    </description>
  </action>
  <action id="ai-06" date="2006-01-11" status="closed">
    <title>
      Chairs to hold a F2F attendance ballot starting Mar 1 and closing at least two weeks before the F2F.
    </title>
    <description>Due to start on March 1st.</description>
  </action>
  <action id="ai-07" date="2006-01-11" status="closed">
    <title>
      Martin Gudgin to post interop document referenced from WS-SecurityPolicy F2F presentation.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00054.html">Done</h:a>
    </description>
  </action>
  <action id="ai-08" date="2006-01-18" status="closed">
    <title>
      Chairs to arrange for a second charter clarification vote.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200601/msg00063.html">Done</h:a>
    </description>
  </action>
  <action id="ai-09" date="2006-01-18" status="closed">
    <title>
      Editors to check that XPath examples in WS-SecurityPolicy are fully namespace qualified.
    </title>
    <description>Decided this was moot at April 4th F2F</description>
  </action>
  <action id="ai-2006-01-25-01" date="2006-01-25" status="closed">
    <title>
      Chris Kaler will reply by email to Issue 014's
      questions.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00000.html">Done</h:a>
    </description>
  </action>
  <action id="ai-2006-01-25-02" date="2006-01-25" status="closed">
    <title>
      Marc Goodner to work on an initial interop
      scenarios document.  Prateek Mishra also offered to help.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00010.html">Done</h:a>
    </description>
  </action>
  <action id="ai-2006-01-25-03" date="2006-01-25" status="closed">
    <title>
      Heather Hinton and Tony Nadalin to work on an
      initial use cases document.  Prateek Mishara also offered to help.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00023.html">Done</h:a>
    </description>
  </action>
  <action id="ai-2006-01-25-04" date="2006-01-25" status="closed">
    <title>
      Tony Nadalin will look into the possibility of
      hosting an interop event at the April F2F location
    </title>
    <description>
      There will no interop at the April F2F.  The F2F meeting will be Tue-Wed
      Apr 4-5.  Tony and Kelvin will provided F2F logistics information.
    </description>
  </action>
  <action id="ai-2006-02-08-01" date="2006-02-08" status="closed">
    <title>
      Chairs to ensure the list of voting members on the
      roster is correct.
    </title>
  </action>
  <action id="ai-2006-02-08-02" date="2006-02-08" status="closed">
    <title>
      Chairs to re-run the charter clarification ballot
      #2 a second time (after fixing the roster).
    </title>
  </action>
  <action id="ai-2006-02-08-03" date="2006-02-08" status="closed">
    <title>
      Marc Goodner to post WS-SX issue template to TC
      site and Chairs to put it in a prominent location to make it easier to
      find.
    </title>
  </action>
  <action id="ai-2006-02-08-04" date="2006-02-08" status="closed">
    <title>
      TC members to review the initial interop scenarios
      by the Feb 15 TC meeting so that the TC can decide at that meeting
      whether the TC has "critical mass" for an Apr F2F interop event.
    </title>
  </action>
  <action id="AI-2006-02-15-01" date="2006-02-15" status="closed">
    <title>Gudge to draft a revised proposal for Issue 9</title>
  </action>
  <action id="AI-2006-02-15-02" date="2006-02-15" status="closed">
    <title>
      Prateek to give a proposed use case for Issue 10 before
      the next call.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00108.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-02-15-03" date="2006-02-15" status="closed">
    <title>
      C.Y Chao to propose to the TC whether Issue 015 should
      be closed or not due to revealing the information might be a security
      risk.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200602/msg00121.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-02-15-04" date="2006-02-15" status="closed">
    <title>
      Prateek to propose resolution to Issue 20 before F2F
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00024.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-02-15-05" date="2006-02-15" status="closed">
    <title>
      Chairs to add information to the public page on how to
      access previous versions of the Issues List.
    </title>
    <description>
      They are available from
      the URI http://docs.oasis-open.org/ws-sx/issues/
    </description>
  </action>
  <action id="AI-2006-02-15-06" date="2006-02-15" status="closed">
    <title>
      Prateek to provide additional broader scenarios for at
      least WS-Trust. New ETA is Mar 17.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00077.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-02-15-07" date="2006-02-15" status="closed">
    <title>
      TC members to come to the April F2F with data on when
      they would be ready to carry out SC/Trust interop.
    </title>
    <description>Done at April F2F, see minutes.</description>
  </action>
  <action id="AI-2006-03-01-01" date="2006-03-01" status="closed">
    <title>
      Jan Alexander will provide a solution to Issue 41.
    </title>
  </action>
  <action id="AI-2006-03-01-02" date="2006-03-01" status="closed">
    <title>
      Werner Dittman to give an example of a case for
      Issue 27 that is not sensible so that we can indicate that some cases do
      not make sense.  Werner will propose specific change to SP to give
      guidance on the problem identified in Issue 27.
    </title>
  </action>
  <action id="AI-2006-03-01-03" date="2006-03-01" status="closed">
    <title>
      Werner Dittman to work with Tony Nadalin to see if
      it would be useful to include Tony's UML diagram to clarify Issue 28.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00079.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-01-04" date="2006-03-01" status="closed">
    <title>
      Werner Dittman, Tony Gillotta and Gudge will
      prepare a proposal to add some text to describe how to extend token
      assertions for Issue 30.
    </title>
  </action>
  <action id="AI-2006-03-08-01" date="2006-03-08" status="closed">
    <title>
      Prateek Mishra to respond to Jan's message re Issue
      10.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00016.html">Jan's message</h:a>
      <h:br />
      DONE.  See:<h:br />
      http://lists.oasis-open.org/archives/ws-sx/200603/msg00044.html <h:br />
      http://lists.oasis-open.org/archives/ws-sx/200603/msg00050.html
    </description>
  </action>
  <action id="AI-2006-03-08-02" date="2006-03-08" status="closed">
    <title>
      Mike to provide better description(s) and a
      complete proposal(s) for issue 016 and issue 018 by the F2F meeting.
    </title>
    <description>
      New proposal for issue 16: http://lists.oasis-open.org/archives/ws-sx/200603/msg00103.html
      New proposal for issue 18: http://lists.oasis-open.org/archives/ws-sx/200603/msg00104.html
    </description>
  </action>
  <action id="AI-2006-03-08-03" date="2006-03-08" status="closed">
    <title>
      Werner and Gudge to work on a new proposal for
      Issue 27.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00057.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-08-04" date="2006-03-08" status="closed">
    <title>
      Hal to provided a proposal for Issue 32 before Mar
      15 meeting.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00049.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-08-05" date="2006-03-08" status="closed">
    <title>
      Frederick to provide alternative proposal for Issue
      36 for the Mar 15 meeting.
    </title>
    <description>
      DONE. See resolution from <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00091.html ">March 22nd minutes</h:a>
    </description>
  </action>
  <action id="AI-2006-03-08-06" date="2006-03-08" status="closed">
    <title>
      Jan Alexander to supply clarifying text for Issue
      038 before the Mar 22 meeting.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00078.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-08-07" date="2006-03-08" status="closed">
    <title>
      Gudge will provide text to clarify the usage of
      "dialect" for Issue 40 for the Mar 15 meeting.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00047.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-15-01" date="2006-03-15" status="closed">
    <title>
      Gudge and Prateek to draft a new section "Guidance on creating New Token Assertions and Token Assertion Extensibility" for review by the TC (for issue 30).
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00030.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-15-02" date="2006-03-15" status="closed">
    <title>
      Marc to version the Interop document and to store it in an Interop scenarios document folder.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00076.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-15-03" date="2006-03-15" status="closed">
    <title>
      Gudge will reply to the thread on Issue 030 before
      the Mar 22 meeting.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00068.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-22-01" date="2006-03-22" status="closed">
    <title>
      Tony Nadalin to provide information on where the UML generated schema might be more restrictive than the SP schema.
    </title>
    <description>
      Opened issue 62 to track this action.
    </description>
  </action>
  <action id="AI-2006-03-22-02" date="2006-03-22" status="closed">
    <title>
      Prateek Mishra to expand his additional scenarios to define the message RSTR's for the Bearer Assertion and HoK Assertions and to show where they are actually different.
    </title>
    <description>
      DONE.  See:
      http://lists.oasis-open.org/archives/ws-sx/200604/msg00025.html
    </description>
  </action>
  <action id="AI-2006-03-29-01" date="2006-03-29" status="closed">
    <title>
      Gudge owes Prateek a response (to message 82) for issue 33.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00099.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-29-02" date="2006-03-29" status="closed">
    <title>Tony Gullota to provide further examples illustrating issue 48 in time for the F2F.</title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00122.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-29-03" date="2006-03-29" status="closed">
    <title>Martin Raepple will provide text for new section from issue 41 before the F2F.</title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200603/msg00115.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-03-29-04" date="2006-03-29" status="closed">
    <title>Marc Goodner to update interop doc with resolution of issue 47 as part of merged interop doc.</title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00003.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-04-04-01" date="2006-04-04" status="closed">
    <title>Chris Kaler to provide advice on minimum acceptable lengths of P-SHA1 inputs for Issue 20.</title>
  </action>
  <action id="AI-2006-04-04-02" date="2006-04-04" status="closed">
    <title>Frederick to revised wording for Rule 5 re use of multiple signatures for Issue 52.</title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00033.html">done</h:a>
    </description>
  </action>
  <action id="AI-2006-04-04-03" date="2006-04-04" status="closed">
    <title>Tony Nadalin to identify possible issues for SecurityPolicy based on the changes proposed for Issue 52.</title>
  </action>
  <action id="AI-2006-04-04-04" date="2006-04-04" status="closed">
    <title>Jan Alexander and Martin Gudgin to identify possible issues for SecurityPolicy based on creation of the NoProofKey proposed in the solution to Issue 56.</title>
    <description>
      Conclusion is there are no issues. Trust already has a place to put the
      relative piece of information and SP allows that to be specified.<h:br /><h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00007.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-04-04-05" date="2006-04-04" status="closed">
    <title>Jan Alexander and Tony Nadalin to identify possible issues for WS-Trust's processing model for the changes made for Issue 57.</title>
    <description>No issues found. Closed with no action.</description>
  </action>
  <action id="AI-2006-04-04-06" date="2006-04-04" status="closed">
    <title>Jan Alexander to start a discussion about security considerations and a section about what this means for relying parties re the proposal adopted for Issue 060.</title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00083.html">Done.</h:a> Logged as issue 68.
    </description>
  </action>
  <action id="AI-2006-04-04-07" date="2006-04-04" status="closed">
    <title>Marc Goodner with help from Prateek Mishra to create a merged interop scenarios document.</title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00003.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-04-04-08" date="2006-04-04" status="closed">
    <title>Marc Goodner with help from Prateek Mishra to document interop message flows based on the current version of SC/Trust.</title>
    <description>
      <h:a href="http://www.oasis-open.org/archives/ws-sx/200608/msg00039.html">Final</h:a> tracked
      by this AI. Issues being raised to continue progress.
    </description>
  </action>
  <action id="AI-2006-04-04-09" date="2006-04-04" status="closed">
    <title>Chairs to check with absent companies on their plans for SC/Trust interop.</title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00093.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-04-05-01" date="2006-04-05" status="closed">
    <title>Tony Gullotta will start an email discussion about issue 31 and whether it should be broadened to include other token characteristics.</title>
  </action>
  <action id="AI-2006-04-05-02" date="2006-04-05" status="closed">
    <title>
      Gudge to propose revised text for the description of sp:BootstrapPolicy for issue 53.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200604/msg00077.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2006-04-05-03" date="2006-04-05" status="closed">
    <title>Tony N and Frederick to consider adding batch facilities to SecureConversation as per Issue 64.</title>
    <description>
      For symmetry it would probably be OK, however there don't seem to be any
      strong requirements for this. Suggest closing with no action.
    </description>
  </action>
  <action id="AI-2006-04-05-04" date="2006-04-05" status="closed">
    <title>
      Chairs to do further work on a F2F meeting time and location.
    </title>
    <description>
      First week of October in San Jose hosted by BEA.
    </description>
  </action>
  <action id="AI-2006-04-12-01" date="2006-04-12" status="closed">
    <title>
      Prateek to review the text added per Issue 30 to see if its explains sufficiently how to use the extensibility of SP to describe token characteristics (related to Issue 31).
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00036.html">done</h:a>
    </description>
  </action>
  <action id="AI-2006-04-12-02" date="2006-04-12" status="closed">
    <title>
      Hal to make a proposal on how to describe the usage of the Username token re Issue 31.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00032.html">done</h:a>
    </description>
  </action>
  <action id="AI-2006-05-03-01" date="2006-05-03" status="closed">
    <title>Gudge will investigate and start thread on issue 55.</title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00033.html">done</h:a>
    </description>
  </action>
  <action id="AI-2006-05-03-02" date="2006-05-03" status="closed">
    <title>
      Jan is working on a proposal for issue 65, ETA May
      10th.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00017.html">done</h:a>
    </description>
  </action>
  <action id="AI-2006-05-03-03" date="2006-05-03" status="closed">
    <title>Tony will investigate and start thread on issue 67.</title>
    <description>
      See <h:a href="http://lists.oasis-open.org/archives/ws-sx/200607/msg00055.html">msg</h:a>
    </description>
  </action>
  <action id="AI-2006-05-03-04" date="2006-05-03" status="closed">
    <title>Tony to update pending trust issues by May 10th.</title>
  </action>
  <action id="AI-2006-05-03-05" date="2006-05-03" status="closed">
    <title>Gudge to update pending schema issues by May 10th.</title>
  </action>
  <action id="AI-2006-05-10-01" date="2006-05-10" status="closed">
    <title>
      Gudge will prepare proposal for issue 33.
    </title>
    <description>
      <h:a href="http://lists.oasis-open.org/archives/ws-sx/200605/msg00035.html">done</h:a>
    </description>
  </action>
  <action id="AI-2006-06-21-01" date="2006-06-21" status="closed">
    <title>Frederick to work on a new proposal for issue 70.</title>
  </action>
  <action id="AI-2006-06-28-01" date="2006-06-28" status="closed">
    <title>
      Chairs to get thread going on interop participation and
      find a coordinator
    </title>
  </action>
  <action id="AI-2006-07-12-01" date="2006-07-12" status="closed">
    <title>Kelvin to inform OASIS staff of problems with infrastructure used to support the TC.</title>
    <description>
      Kelvin and others addressed these problems with OASIS staff.
      SPAM overwhelmed system last week and OASIS is working on it.
    </description>
  </action>
  <action id="AI-2006-07-12-02" date="2006-07-12" status="closed">
    <title>Hal will provide reference to BSP requirement related to issue 90.</title>
  </action>
  <action id="AI-2006-09-06-01" date="2006-09-06" status="closed">
    <title>Gudge to make proposal for issue 90 by end of September</title>
  </action>
  <action id="AI-2006-09-06-02" date="2006-09-06" status="closed">
    <title>Chairs to initiate public review of documents by notifying TC administrators.</title>
  </action>
  <action id="AI-2006-09-20-01" date="2006-09-20" status="closed">
    <title>Chairs to cancel TC calls for Nov 22, Dec 20 and Dec 27</title>
  </action>
  <action id="AI-2006-09-20-02" date="2006-10-04" status="closed">
    <title>Marc and Tony to prepare interop plan for SP</title>
  </action>
  <action id="AI-2006-10-04-06" date="2006-10-04" status="closed">
    <title>Kelvin to update public TC web pages with Public review info </title>
  </action>
  <action id="AI-2006-10-04-02" date="2006-10-04" status="closed">
    <title>Marc to delve into TC document organization issues and report back</title>
  </action>
  <action id="AI-2006-11-15-01" date="2006-11-15" status="closed">
    <title>
      TC Chairs: 7 days after availability of Trust/SC updates ask OASIS staff to start a committee spec vote and OASIS member vote
    </title>
  </action>
  <action id="AI-2006-11-15-02" date="2006-11-15" status="closed">
    <title>
      TC Chairs: spin up an OASIS submission form for Trust/SC and solicit information as needed from members via the SX email list
    </title>
  </action>
  <action id="AI-2006-11-15-03" date="2006-11-15" status="closed">
    <title>
      TC Chairs: Prepare  formal response to PR issues
    </title>
  </action>
  <action id="AI-2006-11-29-01" date="2006-11-29" status="closed">
    <title>
      Chairs to inform OASIS staff of TC decision  to take SP to CD and Public Review.
    </title>
  </action>
  <action id="AI-2006-02-14-01" date="2006-02-14" status="closed">
    <title>
      Apropos of issue PR021 disucussion, BEA will send email to the W3C WS-Policy WG informing them of WS-SX TC’s finding regarding the mixing of WS-policy Versions in nested assertions.  The email should include a link to the minutes of the WS-WX meeting of February 14, 2007.
    </title>
    <description>
        <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00052.html">Done</h:a>
      </description>
  </action>
  <action id="AI-2006-02-14-01" date="2006-02-14" status="closed">
    <title>
      Tony Nadalin to review deferred action item 62 and followup on the list with proposed resolution.
    </title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200702/msg00052.html">Done</h:a>
    </description>
 </action>

  <action id="AI-2007-04-18-01" date="2007-04-18" status="closed">
    <title>
      Chairs will cancel next week’s call (Apr 25).
    </title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00045.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2007-04-18-02" date="2007-04-18" status="closed">
    <title>
      Marc Goodner will provide an updated version of the SP specification incorporating resolutions to the 2nd PR 
    </title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200704/msg00062.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2007-04-18-03" date="2007-04-18" status="closed">
    <title>
      Greg Carpenter will log new issues to ensure that the TC revisits normative language usage in the next revision of specs.
    </title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00065.html">Done</h:a>
    </description>
    </action>
  <action id="AI-2007-05-02-01" date="2007-05-02" status="closed">
    <title>
      Chairs will request the TC Administrator to start an electronic ballot to modify the WS-SX TC charter 
    </title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html">Done</h:a>
    </description>
  </action>
  <action id="AI-2007-05-02-02" date="2007-05-02" status="closed">
    <title>
      Chairs will check with Tony Nadalin to verify that he intends to log additional issues against the Examples document.
    </title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00051.html">Done</h:a>
    </description>
  </action> 
  <action id="AI-2007-05-15-01" date="2007-05-15" status="closed">
      <title>
        Chairs will cancel May 23rd and June 6th calls.
      </title>
      <description>
        <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00052.html">Done</h:a>
      </description>
      <description>
        <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200705/msg00053.html">Done</h:a>
      </description>    
  </action>
  <action id="AI-2007-05-15-02" date="2007-05-15" status="closed">
    <title>
      Add additional Bridge access numbers to the web site and agendas
    </title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html">Done</h:a> No action required
    </description>
  </action>
  <action id="AI-2007-05-15-03" date="2007-05-15" status="closed">
    <title>Editors will create draft errata docs for SX specs using the WSS errata documents as a template</title>
    <description>Ongoing. ETA is late July/early August</description>
  </action>
  
  <action id="AI-2007-05-30-01" date="2007-05-30" status="closed">
    <title>Marc Goodner: Analyze schema/example discrepancy described in issue i123 and report back to TC</title>
    <description><h:a href="http://www.oasis-open.org/archives/ws-sx/200705/msg00066.html">Done</h:a></description>
  </action>
  
  <action id="AI-2007-05-30-02" date="2007-05-30" status="closed">
    <title>Marc Goodner: Find previous discussion/resolution related to active issue i134 and report back to TC</title>
    <description> <h:a href="http://www.oasis-open.org/archives/ws-sx/200706/msg00024.html">Done</h:a> </description>
  </action>
  
  <action id="AI-2007-06-13-01" date="2007-06-13" status="closed">
    <title>Marc Goodner: Make a proposal for ER006 to the list.</title>
    <description><h:a href="http://www.oasis-open.org/archives/ws-sx/200710/msg00016.html">Done</h:a> </description>
  </action>
  
  <action id="AI-2007-06-13-02" date="2007-06-13" status="closed">
    <title>Chairs to update public website</title>
    <description><h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html">Done</h:a></description>
  </action>
  
  <action id="AI-2007-06-13-03" date="2007-06-13" status="closed">
    <title>Chairs cancel meeting next week (June 20)and week of July 4th</title>
    <description> <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200706/msg00069.html">Done</h:a> </description>
  </action>
  
  <action id="AI-2007-06-27-01" date="2007-06-27" status="closed">
    <title>Greg will clone issue i37. The current i137 will reference only the examples doc.  The cloned issue will reference only SP.</title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00046.html">Done</h:a>
    </description>
  </action>
  
  <action id="AI-2007-06-27-02" date="2007-06-27" status="closed">
    <title>Prateek will seek clarification from Aditya regarding ER005</title>
    <description>
      Prateek has additional information from Aditya that he will consolidate and send to the TC list.<h:br/>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00065.html">Done.</h:a><h:br/>
      Recommendation is to close ER005 with no action.
    </description>
  </action>
  
  <action id="AI-2007-06-27-03" date="2007-06-27" status="closed">
    <title>Hal will propose draft text for the charter change to the deliverables section.</title>
    <description> <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00046.html">Done</h:a> </description>
  </action>

  <action id="AI-2007-07-11-01" date="2007-07-11" status="closed">
    <title>Chairs:  Cancel meetings as appropriate to reflect TC decision to continue meeting on a bi-weekly basis until further notice</title>
    <description>
      <h:a href="http://www.oasis-open.org/apps/org/workgroup/ws-sx/email/archives/200707/msg00065.html">Done</h:a>  </description>
  </action>
</issues>
