OASIS


ACAL v1.0 JSONPath Profile Version 1.0

Committee Specification Draft 01

18 February 2026

This version:

Previous version:

N/A

Latest version:

Technical Committee

OASIS eXtensible Access Control Markup Language (XACML) TC

Chairs

Secretaries

Editors

Abstract

This specification is a profile of ACAL that provides ACAL extensions based on the JSONPath standard, such as JSONPath-based AttributeSelector.

Citation Format

When referencing this document, the following citation format should be used:

[ACAL-JSONPath-1.0] ACAL v1.0 JSONPath Profile Version 1.0. Edited by Steven Legg and Cyril Dangerville. 18 February 2026. OASIS Committee Specification Draft 01. https://docs.oasis-open.org/xacml/acal/acal/profiles/jsonpath/v1.0/csd01/acal-jsonpath-v1.0-csd01.html. Latest stage: https://docs.oasis-open.org/xacml/acal/acal/profiles/jsonpath/v1.0/csd01/acal-jsonpath-v1.0-csd01.html.

This document is related to:

License, Document Status, and Notices

Copyright © OASIS Open 2026. All Rights Reserved. For license and copyright information, and complete status, please see Annex A which contains the License, Document Status and Notices.


Table of Contents


1 Scope

This ACAL profile defines concrete types of [ACAL-Core-1.0] AttributeSelector and EntityAttributeSelector using JSONPath [RFC9535] expressions to extract attributes from ACAL Request's Content.

Concrete representations (data formats) are to be provided as separate specifications and therefore out of scope of this document.


2 Definitions and Acronyms

2.1 Definitions

2.1.1 Terms Defined Elsewhere

This document uses the following terms defined elsewhere:

See Section 2 of [ACAL-Core-1.0].

2.1.2 Terms Defined in this Document

None.

None.

2.2 Abbreviations and Acronyms

None.


3 Document Conventions

3.1 Key Words

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

3.2 Typographical Conventions

None.


4 Introduction (non-normative)

4.1 Requirements

JSON is a common format to represent structured objects that may be supplied by the PEP as subject attribute or resource attribute's Content inside the Request to the PDP, typically a JSON Web token (JWT) in the case of subject attributes (JWT is commonly used in OpenID Connect and OAuth protocols), or any JSON document as resource data. JSON is a common data exchange format used by Web APIs. For such cases, supporting JSONPath [RFC9535] expressions in ACAL is the standard way and therefore a must-have to extract the necessary values from the JSON content for policy evaluation. For instance, a common rule of a privacy policy is that a person should be allowed to read records (in JSON) for which he or she is the subject. The corresponding policy must contain a reference - JSONPath expression - to the subject identified in the information resource - JSON record - itself.

4.2 Policies Based on Subject and Resource Attributes

Attribute selectors (AttributeSelectorType objects) defined by this profile use a JSONPath expression [RFC9535] over the ContentType object of the subject (resp. resource) to identify a particular subject (resp. resource) attribute value by its location in the context (see Section 4.11 of [ACAL-Core-1.0] for an explanation of context).

4.3 Changes From the Previous Version

None. This is the first version of this profile.


5 Structures

5.1 ContentType restrictions

This profile applies to a Content object (defined in [ACAL-Core-1.0]) in the Request if and only if:

5.2 ACAL extensions

The structures in this profile are extensions to [ACAL-Core-1.0] model and described here in abstract terms. The concrete representations of these structures are defined for a variety of syntaxes each in a separate profile.

The types AttributeSelectorType and EntityAttributeSelectorType used in the next UML models are defined in [ACAL-Core-1.0].

5.2.1 AttributeSelectorType extension - JSONPathAttributeSelectorType

A JSONPathAttributeSelectorType object is a concrete type of AttributeSelectorType from [ACAL-Core-1.0] that uses JSONPath (RFC9535) for Path expressions and expects a JSON object as value of the Body property of a RequestEntityType object's Content object. More precisely, the returned values shall be constructed from the node(s) selected by applying the JSONPath expression given by the attribute selector's Path property to the JSON object in the Body property of the Content object in the RequestEntityType object matching the attribute selector's Category property.

See the section 9 for details of attribute selector evaluation.

UML definition (class diagram):

In the context of this profile, the required Path property inherited from the supertype AttributeSelectorType SHALL be a JSONPath expression RFC9535.

5.2.2 EntityAttributeSelectorType extension - JSONPathEntityAttributeSelectorType

A JSONPathEntityAttributeSelectorType object is a concrete type of EntityAttributeSelectorType [ACAL-Core-1.0] that uses JSONPath RFC9535 for Path expressions and expects a JSON object in the value returned by the attribute selector's Expression property. In other words, the values shall be constructed from the node(s) selected by applying the JSONPath expression given by the entity attribute selector's Path property to the JSON object of the Body property of the Content object in either an attribute category in the request context (RequestEntity) or the value of the urn:oasis:names:tc:acal:1.0:data-type:entity data type returned by its Expression evaluation.

See the Section 9 for details of entity attribute selector evaluation.

UML definition (class diagram):

The Path property is also defined the same as in JSONPathAttributeSelectorType.


6 Attribute Selector Evaluation

A JSONPathAttributeSelectorType or JSONPathEntityAttributeSelector object SHALL be evaluated according to the following processing model.

Note: It is not necessary for an implementation to exactly follow this model. It is only necessary to produce results identical to those that would be produced by following this model.

The first steps are already described in [ACAL-Core-1.0] section 9.4.7 and provided here as a reminder:

If the designated attribute category or entity value has a Content property, then follow the steps below:

  1. Construct a JSON object (RFC 8259) from the value of the Body property of the Content property. If the content is not a valid JSON object, then the attribute selector MUST return Indeterminate with status code urn:oasis:names:tc:acal:1.0:status:syntax-error.

  2. The root node of the data structure (JSON object) shall be used as context node of evaluation (JSONPath query argument).

  3. Evaluate the JSONPath expression given in the Path property against the context node selected in the previous step, according to the syntax and semantics of the JSONPath standard [RFC9535].

  4. The result of the previous step is a nodelist that is converted to a bag of values of the data type specified by the DataType property. In most cases the conversion depends on the string value of a node's JSON value, defined as follows:

 
The nodelist is converted to a bag of values of the data type specified by the DataType property as follows:
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:boolean, then convert the string value of each node using the xs:boolean() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:string, then convert the string value of each node using the xs:string() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:integer, then convert the string value of each node using the xs:integer() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:double, then convert the string value of each node using the xs:double() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:dateTime, then convert the string value of each node using the xs:dateTime() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:date, then convert the string value of each node using the xs:date() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:time, then convert the string value of each node using the xs:time() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:hexBinary, then convert the string value of each node using the xs:hexBinary() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:base64Binary, then convert the string value of each node using the xs:base64Binary() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:anyURI, then convert the string value of each node using the xs:anyURI() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:yearMonthDuration, then convert the string value of each node using the xs:yearMonthDuration() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:dayTimeDuration, then convert the string value of each node using the xs:dayTimeDuration() constructor function from [XF] Section 18.1.
 
If the specified data type is urn:oasis:names:tc:acal:1.0:data-type:entity and the value of every node in the nodelist is a JSON object, then convert each node to an ACAL EntityType object. Each EntityType object SHALL have a Content property and SHALL NOT have an Attribute property. The Content property SHALL have a MediaType property set to application/json and the value of the Body property SHALL be a copy of the JSON object.
 
If the data type is one of the types referred to above and the result of step 3 does not satisfy any of the cases, then the attribute selector MUST return Indeterminate with status code urn:oasis:names:tc:acal:1.0:status:syntax-error.
 
If the data type is not one of the types referred to above, then the return values shall be constructed from the nodelist in a manner specified by the particular data type extension specification. If the data type extension does not specify an appropriate conversion function, then the attribute selector MUST return Indeterminate with status code urn:oasis:names:tc:acal:1.0:status:syntax-error.
 
If an error occurs when converting the values returned by the expression to the specified data type, then the result of the attribute selector MUST be Indeterminate, with status code urn:oasis:names:tc:acal:1.0:status:processing-error
 
If the result of step 3 is an empty nodelist, then the return value is either Indeterminate with status code urn:oasis:names:tc:acal:1.0:status:syntax-error, or an empty bag, as determined by the MustBePresent property.

An implementation can be optimized to emit errors without going to the effort of generating the string value of node values. For example, the string value of a JSON number will never have the correct format for a urn:oasis:names:tc:acal:1.0:data-type:dateTime ACAL value, so this combination will always produce an error.


7 Safety, Security, and Data Protection Considerations

Refer to [ACAL-Core-1.0] section 10, and Section 4 (Security Considerations) of RFC 9535.


8 Conformance

8.1 Introduction

The specification addresses the following aspect of conformance:

The specification defines a number of functions, etc. that have somewhat special applications, therefore they are not required to be implemented in an implementation that claims to conform with to this specification.

8.2 Conformance Tables

This section lists those portions of the specification that MUST be included in an implementation of a PDP that claims to conform to this profile.

Note: "M" means mandatory-to-implement. "O" means optional.

The implementation MUST follow Section 5, Section 6 and Annex D where they apply to implemented items in the following tables.

Many of these items are associated with versions of XACML preceding ACAL but have been assigned new identifiers with the urn:oasis:names:tc:acal:1.0: prefix. The older XACML identifiers have been listed in the tables as deprecated identifiers. Implementations MUST support a new identifier defined in this specification but MAY recognize the corresponding deprecated identifier as equivalent. It is RECOMMENDED that these deprecated identifiers not be used in new policies and requests; they are planned to be removed in a subsequent version of ACAL. Note that some items appear to be carried over from a preceding version of XACML but do not list the XACML identifier. This is because ACAL has redefined the item in some way that means it is no longer identical to the original definition in XACML, and so the identifiers can no longer be considered equivalent. Items new to ACAL 1.0 will also not list an XACML identifier.

8.2.1 Object Types

The implementation MUST support the object types that are marked M.

Object Type M/O
JSONPathAttributeSelectorType M
JSONPathEntityAttributeSelectorType O

Annex A License, Document Status and Notices

(This annex forms an integral part of this Specification.)

A.1 Document Status

This document was last revised or approved by the OASIS eXtensible Access Control Markup Language (XACML) TC on the above date. The level of approval is also listed above. Check the "Latest version" location noted above for possible later revisions of this document. Any other numbered Versions and other technical work produced by the Technical Committee (TC) are listed at https://groups.oasis-open.org/communities/tc-community-home2?CommunityKey=67afe552-0921-49b7-9a85-018dc7d3ef1d#technical.

TC members should send comments on this document to the TC's email list. Others should send comments to the TC's public comment list, after subscribing to it by following the instructions at the "Send A Comment" button on the TC's web page at https://www.oasis-open.org/committees/xacml/.

NOTE: any machine-readable content (Computer Language Definitions) declared Normative for this Work Product is provided in separate plain text files. In the event of a discrepancy between any such plain text file and display content in the Work Product's prose narrative document(s), the content in the separate plain text file prevails.

A.2 License and Notices

Copyright © OASIS Open 2026. All Rights Reserved.

All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy, which governs the licensure of this document, may be found at the OASIS website: [https://www.oasis-open.org/policies-guidelines/ipr/]

This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English.

The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns, as provided in the OASIS IPR Policy.

This document is provided under the RF on Limited Terms IPR mode that was chosen when the project was established, as defined in the IPR Policy. For information on whether any patents have been disclosed that may be essential to implementing this document, and any offers of patent licensing terms, please refer to the Intellectual Property Rights section of the project’s web page (https://www.oasis-open.org/committees/xacml/ipr.php).

This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. OASIS AND ITS MEMBERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THIS DOCUMENT OR ANY PART THEREOF.

As stated in the OASIS IPR Policy, the following three paragraphs in brackets apply to OASIS Standards Final Deliverable documents (Committee Specifications, OASIS Standards, or Approved Errata).

OASIS requests that any OASIS Party or any other party that believes it has patent claims that would necessarily be infringed by implementations of this OASIS Standards Final Deliverable, to notify OASIS TC Administrator and provide an indication of its willingness to grant patent licenses to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this deliverable.

OASIS invites any party to contact the OASIS TC Administrator if it is aware of a claim of ownership of any patent claims that would necessarily be infringed by implementations of this OASIS Standards Final Deliverable by a patent holder that is not willing to provide a license to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this OASIS Standards Final Deliverable. OASIS may include such claims on its website, but disclaims any obligation to do so.

OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this OASIS Standards Final Deliverable or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on OASIS' procedures with respect to rights in any document or deliverable produced by an OASIS Technical Committee can be found on the OASIS website. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this OASIS Standards Final Deliverable, can be obtained from the OASIS TC Administrator. OASIS makes no representation that any information or list of intellectual property rights will at any time be complete, or that any claims in such list are, in fact, Essential Claims.

The name "OASIS" is a trademark of OASIS, the owner and developer of this document, and should be used only to refer to the organization and its official outputs. OASIS welcomes reference to, and implementation and use of, its documents, while reserving the right to enforce its marks against misleading uses. Please see https://www.oasis-open.org/policies-guidelines/trademark/ for guidance.


Annex B References

(This annex forms an integral part of this Specification.)

This section contains the normative and informative references that are used in this document.

Normative references are specific (identified by date of publication and/or edition number or version number) and Informative references are either specific or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. While any hyperlinks included in this section were valid at the time of publication, OASIS cannot guarantee their long term validity.

B.1 Normative References

The following documents are referenced in such a way that some or all of their content constitutes requirements of this document.

[ACAL-Core-1.0]

Attribute-Centric Authorization Language (ACAL) Version 1.0. Edited by Steven Legg and Cyril Dangerville. 18 February 2026. OASIS Committee Specification Draft 01.

[CMF]

Martin J. Dürst et al, eds., Character Model for the World Wide Web 1.0: Fundamentals, W3C Recommendation 15 February 2005, https://www.w3.org/TR/2005/REC-charmod-20050215/

[DS]

D. Eastlake et al., XML-Signature Syntax and Processing, https://www.w3.org/TR/xmldsig-core/, World Wide Web Consortium.

[exc-c14n]

J. Boyer et al, eds., Exclusive XML Canonicalization, Version 1.0, W3C Recommendation 18 July 2002, https://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/

[Hancock]

Hancock, Polymorphic Type Checking, in Simon L. Peyton Jones, Implementation of Functional Programming Languages, Section 8, Prentice-Hall International, 1987.

[Hier]

XACML v3.0 Hierarchical Resource Profile Version 1.0. 11 March 2010. Committee Specification Draft 03. https://docs.oasis-open.org/xacml/3.0/xacml-3.0-hierarchical-v1-spec-cd-03-en.html

[IEEE754]

IEEE Standard for Binary Floating-Point Arithmetic 1985, ISBN 1-5593-7653-8, IEEE Product No. SH10116-TBR.

[INFOSET]

XML Information Set (Second Edition), W3C Recommendation, 4 February 2004, https://www.w3.org/TR/xml-infoset/

[ISO10181-3]

ISO/IEC 10181-3:1996 Information technology – Open Systems Interconnection -- Security frameworks for open systems: Access control framework.

[Kudo00]

Kudo M and Hada S, XML document security based on provisional authorization, Proceedings of the Seventh ACM Conference on Computer and Communications Security, Nov 2000, Athens, Greece, pp 87-96.

[LDAP-1]

RFC 2256, A summary of the X500(96) User Schema for use with LDAPv3, Section 5, M Wahl, December 1997, https://www.ietf.org/rfc/rfc2256.txt

[LDAP-2]

RFC 2798, Definition of the inetOrgPerson, M. Smith, April 2000, https://www.ietf.org/rfc/rfc2798.txt

[MathML]

Mathematical Markup Language (MathML), Version 2.0, W3C Recommendation, 21 October 2003, https://www.w3.org/TR/2003/REC-MathML2-20031021/

[Multi]

OASIS Committee Draft 03, XACML v3.0 Multiple Decision Profile Version 1.0, 11 March 2010, https://docs.oasis-open.org/xacml/3.0/xacml-3.0-multiple-v1-spec-cd-03-en.doc

[Perritt93]

Perritt, H. Knowbots, Permissions Headers and Contract Law, Conference on Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, April 1993. Available at: https://www.cni.org/resources/historical-resources/technological-strategies-for-protecting-intellectual-property-in-the-networked-multimedia-environment/permission-headers-and-contract-law

[RBAC]

David Ferraiolo and Richard Kuhn, Role-Based Access Controls, 15th National Computer Security Conference, 1992.

[RFC2119]

Key Words for Use in RFCs to Indicate Requirement Levels, BCP 14, RFC 2119, March 1997. [Online]. Available: https://www.rfc-editor.org/info/rfc2119

[RFC2396]

RFC 2396, Berners-Lee T, Fielding R, Masinter L, Uniform Resource Identifiers (URI): Generic Syntax, https://www.ietf.org/rfc/rfc2396.txt

[RFC2732]

Hinden R, Carpenter B, Masinter L, Format for Literal IPv6 Addresses in URL's, https://www.ietf.org/rfc/rfc2732.txt

[RFC3198]

IETF RFC 3198: Terminology for Policy-Based Management, November 2001. https://www.ietf.org/rfc/rfc3198.txt

[RFC8174]

Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words, BCP 14, RFC 8174, May 2017. [Online]. Available: https://www.rfc-editor.org/info/rfc8174

[RFC9535]

RFC 9535, JSONPath: Query Expressions for JSON, February 2024. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc9535

[UAX15]

Mark Davis, Martin Dürst, Unicode Standard Annex #15: Unicode Normalization Forms, Unicode 5.1, https://unicode.org/reports/tr15/

[UTR36]

Davis, Mark, Suignard, Michel, Unicode Technical Report #36: Unicode Security Considerations, https://www.unicode.org/reports/tr36/

[XACMLAdmin]

OASIS Committee Draft 03, XACML v3.0 Administration and Delegation Profile Version 1.0. 11 March 2010, https://docs.oasis-open.org/xacml/3.0/xacml-3.0-administration-v1-spec-cd-03-en.doc

[XF]

XPath and XQuery Functions and Operators 3.1, 21 March 2017, https://www.w3.org/TR/2017/REC-xpath-functions-31-20170321/

[XML]

Bray, Tim, et.al. eds, Extensible Markup Language (XML) 1.0 (Fifth Edition), W3C Recommendation 26 November 2008, https://www.w3.org/TR/2008/REC-xml-20081126/

[XMLid]

Marsh, Jonathan, et.al. eds, xml:id Version 1.0. W3C Recommendation 9 September 2005, https://www.w3.org/TR/2005/REC-xml-id-20050909/

[XS]

XML Schema 1.1, parts 1 and 2. Available at: https://www.w3.org/TR/xmlschema11-1/ and https://www.w3.org/TR/xmlschema11-2/

[XPath]

XML Path Language (XPath) 3.1, W3C Recommendation 21 March 2017, https://www.w3.org/TR/xpath-31/

[XPathFunc]

W3C XQuery, XPath, and XSLT Functions and Operators Namespace Document (XPath and XQuery Functions and Operators 3.1) 21 March 2017, https://www.w3.org/2005/xpath-functions/

[XSLT]

XSL Transformations (XSLT) Version 1.0, W3C Recommendation 16 November 1999, https://www.w3.org/TR/xslt/

B.2 Informative References

The following referenced documents are not required for the application of this document but may assist the reader with regard to a particular subject area.

[CM]

Character Model for the World Wide Web: String Matching W3C Working Group Note 11 August 2021, https://www.w3.org/TR/charmod-norm/, World Wide Web Consortium.

[Hinton94]

Hinton, H, M, Lee, E, S, The Compatibility of Policies, Proceedings 2nd ACM Conference on Computer and Communications Security, Nov 1994, Fairfax, Virginia, USA.

[NISTIR8318]

Black, P. (2020), DADS: The On-Line Dictionary of Algorithms and Data Structures, NIST Interagency/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD, online (Accessed December 16, 2025)

[Sloman94]

Sloman, M. Policy Driven Management for Distributed Systems. Journal of Network and Systems Management, Volume 2, part 4. Plenum Press. 1994.

[XACML]

eXtensible Access Control Markup Language (XACML) Version 3.0 Plus Errata 01. Edited by Erik Rissanen. OASIS Standard incorporating Approved Errata. https://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-en.html.

[ENTITIES]

XACML v3.0 Related and Nested Entities Profile Version 1.0. Edited by Steven Legg. 16 February 2021. OASIS Committee Specification 02. https://docs.oasis-open.org/xacml/xacml-3.0-related-entities/v1.0/cs02/xacml-3.0-related-entities-v1.0-cs02.html. Latest stage: https://docs.oasis-open.org/xacml/xacml-3.0-related-entities/v1.0/xacml-3.0-related-entities-v1.0.html.


Annex C ACAL Identifiers

(This annex forms an integral part of this Specification.)

This section defines standard identifiers for commonly used definitions.

C.1 ACAL Namespaces

This ACAL Profile is defined using this identifier.

urn:oasis:names:tc:acal:1.0:jsonpath:schema


Annex D How to generate HTML and PDF versions

Online generation

HTML/PDF versions are generated automatically online via Github Actions after each update pushed to the main branch of OASIS XACML TC Github repository. Go to Github Actions on the github repository, then go to the latest workflow run, and, if the run succeeded, the summary should display the links to the generated HTML/PDF documents.

Offline generation

Prerequisites

Install Pandoc, Graphviz and PlantUML on your system; or simply use Docker with the following shell alias:

$ alias pandoc='docker run --rm --volume "$(pwd):/data" cdang/pandoc-plantuml'

The Dockerfile (named Dockerfile) of the docker image used in the alias above is provided in the pandoc folder next to this markdown file for your convenience if you wish to build it yourself.

OASIS staff are currently using pandoc 3.0 from https://github.com/jgm/pandoc/releases/tag/3.0.

Git clone or get a local copy of OASIS XACML TC Github repository, open a terminal and change your working directory to the root directory of your local copy of the repository.

CSS stylesheet

The generation command uses a CSS stylesheet file (-c argument) provided by OASIS. It may be changed to one of these (or the local version in the styles folder) to get a different style of output:

HTML generation

Run the following command line to generate HTML from this markdown file (acal-jsonpath-v1.0-csd01.md) to an output file /tmp/acal-jsonpath-v1.0-csd01.html:

$ pandoc -f gfm+definition_lists -t html -c styles/markdown-styles-v1.7.3a.css -s --lua-filter pandoc/diagram.lua --defaults pandoc/defaults.yaml --embed-resources --metadata title=" " -o /tmp/acal-jsonpath-v1.0-csd01.html acal-jsonpath-v1.0-csd01.md 

Note this command generates a Table of Contents (TOC) in HTML which is located at the top of the HTML document, and which requires additional editing in order to be published in the expected OASIS style. This editing will be handled by OASIS staff during publication.

PDF generation

For PDF output (file /tmp/acal-jsonpath-v1.0-csd01.pdf), the command line is the following (different -t and -H arguments):

$ pandoc -f gfm+definition_lists -t pdf -c styles/markdown-styles-v1.7.3a.css -H pandoc/custom_latex_header_for_pandoc_pdf_output.tex -s -L pandoc/diagram.lua --defaults pandoc/defaults.yaml --metadata title=" " --embed-resources -o /tmp/acal-jsonpath-v1.0-csd01.pdf acal-jsonpath-v1.0-csd01.md 

Appendix 1 Acknowledgments

(This appendix does not form an integral part of this Specification and is informational.)

Leadership

The following individuals have had significant leadership positions during the development of this document, not just this version of the document, and they are gratefully acknowledged:

Special Thanks

The following individuals have made substantial contributions to this document, not just this version of the document, and their contributions are gratefully acknowledged:

Participants

The following individuals were members of this committee during the creation of this document, not just this version of the document, and their contributions are gratefully acknowledged:

XACML TC Members:


Appendix 2 Changes From Previous Version

(This appendix does not form an integral part of this Specification and is informational.)

This is the first version of this profile.

Revision History

Latest revision history can be obtained from OASIS XACML TC's github repository.

________________________________________