Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Abstract 

This document is a non-normative set of auxiliary material produced by the User-Managed Access Work Group. It provides advice to, and discussions relevant to, developers and deployers of UMA-enabled software systems, services, and applications.

...

The first case may result in registering more resources than need to be managed by the authorization server in practical terms. The third case may forbid the use of certain flows. For example, it would not allow "Alice-to-Bob" sharing flows where Alice is able to put proactive policy conditions in place before Bob attempts access. Thus, the second case probably provides may provide the greatest utility for the greatest number of use cases if it is necessary to pick one choice only. However, any of the choices is viable for different use cases.