...
Phase 1 of the UMA core protocol involves the resource owner introducing the resource server and authorization server so they can work together. Phases 2 and 3 together involve the requesting party, using a client, making an access attempt, being tested for suitability by the authorization server to receive permission, and ultimately succeeding or failing in the attempt by presenting a token with permissions associated with it.
Further reading:
- Web sequence diagram (plain image) for Phase 1 as of core spec rev 07b (6 Jan 2013) and binding obligations rev 01 00 (13 23 Jan 2013) – short link directly to image vs. swimlane code
- Web sequence diagram (plain image) for Phases 2 and 3 as of core spec rev 07b (6 Jan 2013) and binding obligations rev 01 0 (13 23 Jan 2013) – short link directly to image vs. swimlane code
...
UMA's Relationship to Other Efforts
...