Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Phase 1 of the UMA core protocol involves the authorizing user introducing the host and AM so they can work together. Phases 2 and 3 together involve the requesting party, using a requester, making an access attempt, being tested for suitability by the AM to receive a permission, and ultimately succeeding or failing in the attempt by presenting a token with permissions associated with it.

Further reading:

  • Web sequence diagram for Phase 1 as of core spec rev 07b (6 Jan 2013) and binding obligations rev 01 (13 Jan 2013)
  • Web sequence diagram for Phases 2 and 3 as of rev 07b (6 Jan 2013) and binding obligations rev 01 (13 Jan 2013)

...

UMA's Relationship to Other Efforts

...