Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Phase 1 of the UMA core protocol involves the authorizing user introducing the host and AM so they can work together. Phases 2 and 3 together involve the requesting party, using a requester, making an access attempt, being tested for suitability by the AM to receive a permission, and ultimately succeeding or failing in the attempt by presenting a token with permissions associated with it.

Further reading:

...

UMA's Relationship to Other Efforts

...