Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Following is suggested reading.

The basics

  • UMA overview slides meant for a half-hour presentation short overview (slides with builds and , slides with speaker's notes). (Adjunct draft slides that explain UMA's resource protection method here.)The User Experience page collects wireframes exploring user interactions with UMA-enabled services. This includes a set of wireframes that matches the webinar scenario.
  • The emerging set of UMA user stories scenarios attempts to capture the desired benefits to all the parties involved.

Technical perspective

  • The Working Drafts area of this wiki contains the official definition of the UMA protocol.
  • The OAuth leeloo open-source project is an UMA-friendly Java-based OAuth 2.0 implementation.A high-level set of protocol swimlane flows is shown on this page. Implementations page highlights known and anticipated implementations, including open source.
  • Writeup on how UMA deals with scopes and authorization
  • A comprehensive technical report published under the auspices of Newcastle University called User-Managed Access to Web Resources (also available on ncl.ac.uk site) explains the requirements that drive UMA, analyzes the design features that respond to these requirements, and reviews related work.
  • The Technology Matrix compares UMA with various other technologies and explores potential synergies between them.

Discussions and ruminations

...