...
Following is suggested reading.
The basics
- FAQ (NEW!)
- Poster (best printed on A0-A3 paper; 8.5x11 or 8.5x14 is okay but small) presented at the IEEE Security and Privacy symposium poster session.
- UMA overview slides meant for a half-hour presentation short overview (slides with builds and , slides with speaker's notes). (Adjunct draft slides that explain UMA's resource protection method here.)The User Experience page collects wireframes exploring user interactions with UMA-enabled services. This includes a set of wireframes that matches the webinar scenario.
- Try out the SMARTAM.net AM application and its associated gallerify.me host/requester application!
- The emerging set of UMA user stories scenarios attempts to capture the desired benefits to all the parties involved.
Technical perspective
- The Working Drafts area of this wiki contains the official definition of the UMA protocol.
- The OAuth leeloo open-source project is an UMA-friendly Java-based OAuth 2.0 implementation.A high-level set of protocol swimlane flows is shown on this page. Implementations page highlights known and anticipated implementations, including open source.
- Writeup on how UMA deals with scopes and authorization
- A comprehensive technical report published under the auspices of Newcastle University called User-Managed Access to Web Resources (also available on ncl.ac.uk site) explains the requirements that drive UMA, analyzes the design features that respond to these requirements, and reviews related work.
- The Technology Matrix compares UMA with various other technologies and explores potential synergies between them.
- Writings by our implementation coordinator Maciej Machulak are at his user-managed access control site.
Discussions and ruminations
...