Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

UMA Explained

User-Managed Access (UMA) involves these entities:

...

Following is suggested reading.

The basics

  • The User Experience page collects wireframes exploring user interactions with UMA-enabled services. This includes a set of wireframes that matches the webinar scenario.
  • The emerging set of UMA user stories attempts to capture the desired benefits to all the parties involved.

Technical perspective

  • The Working Drafts area of this wiki contains the official definition of the UMA protocol.
  • The OAuth leeloo open-source project is an UMA-friendly Java-based OAuth 2.0 implementation.
  • A high-level set of protocol swimlane flows is shown on this page.
  • A comprehensive technical report published under the auspices of Newcastle University called User-Managed Access to Web Resources (also available on ncl.ac.uk site) explains the requirements that drive UMA, analyzes the design features that respond to these requirements, and reviews related work.
  • The Technology Matrix compares UMA with various other technologies and explores potential synergies between them.

Discussions and ruminations

  • Group chair Eve Maler writes about UMA and its predecessor, ProtectServe, here.
  • Some historical materials (may be out of date) explaining the original thinking behind UMA and its predecessor, ProtectServe, are available.

...

This is now a historical page. Historical materials are stored underneath this page.