...
The following materials explain UMA further. Be sure to read the documents in the Working Drafts area of this wiki for the official definition of UMA.
Multimedia | ||||||
---|---|---|---|---|---|---|
|
- UMA Webinar Jan. 29 2010 - WMV file
- UMA Webinar Jan. 29, 2010 - Materials from UMA webinar held 29 Jan 2010 Identity Matters podcast explaining how the UMA group operates in the Kantara context
- UMA Webinar Jan. 29, 2010 - mp3 file
- mp3 file
- Overview slide deck (version with no builds, suitable for printing, here)
- Protocol deep-dive slide deck with swimlane diagrams
- Wireframes illustrating how a simplified CV-sharing scenario might work
- Another variant of the policy- and terms-setting screen can be seen here
- Overview slide deck prepared for the 29 Jan 2010 UMA Update webinar (version with no builds, suitable for printing, here)
- Protocol deep-dive slide deck with swimlane diagramsIdentity Matters podcast recorded 20 Jan 2010, explaining how the UMA group operates in the Kantara context
- Flowchart illustrating the different paths to authorized access to a protected resource
- Matrix comparing UMA and other technologies and exploring their synergies
- Historical materials explaining the original thinking behind UMA and its predecessor, ProtectServe
- User-managed access control writings by Maciej Machulak
- Writings on ProtectServe and UMA by Eve Maler