...
User-Managed Access (UMA) involves these entities:
| For example, a web user (authorizing user) can authorize a web app (requester) to gain one-time or ongoing access to a resource containing his home address stored at a "personal data store" service (host), by telling the host to act on access decisions made by his authorization decision-making service (authorization manager). |
...
- Poster (best printed on A0-A3 paper; 8.5x11 or 8.5x14 is okay but small) presented at the IEEE Security and Privacy symposium poster session.
- Slides from a half-day workshop held at the European Identity Conference in Munich on 4 May 2010.A half-hour Identity Matters podcast was recorded on 20 Jan 2010, explaining how the UMA group operates in the Kantara context.
- The overview slides (slides without builds, audio, Flash, WMV for PC users, ARF file requiring PC WebEx player or Mac WebEx player) from the webinar held on 29 Jan 2010 explains the problem UMA is trying to solve and the general shape of the solution, including a walkthrough of a simplified scenario.
...
- Christian Scholz has done a very simple test implementation prototype of the UMA protocol in Python.
- A comprehensive technical report published under the auspices of Newcastle University called User-Managed Access to Web Resources explains the requirements that drive UMA, analyzes the design features that respond to these requirements, and reviews related work.
...