What I think would be helpful would be a table of auth mechanisms, something like:
This table should be used as a rough guide, not as black and white
Name | URI used | Verification | Required | Implemented |
---|---|---|---|---|
WebID TLS | WebID | TLS | Y | Y |
Cookie | implied | Shared Secret | Y | Y |
WebID RSA | WebID | Web Crypto API | N | Y |
HTTP Signatures | Public Key | Web Crypto API | N | N |