Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Huge revision incorporating known shape of the forthcoming solution for OpenID Connect integration to solve trusted claims.

...

The following diagram illustrates the high-level architecture UMA uses to achieve its goal.

Software

...

Software entities entities participating in a protocol are frequently known as endpoints. The UMA endpoints are:

  • Authorizing user (the "user" in User-Managed Access) , operating a "user agent" such as a browser in order to interact with the other software in the UMA ecosystem – sometimes the software endpoint is just called the "user" for short
    • "User" is often used informally in the UMA spec, where what is really meant is the browser (or other client software application) being operated by this person
  • Authorization manager (AM)
  • Host (of "protected resources")
  • Requester

...

Distinguishing Software Endpoints from Legally Responsible Parties

Because software is just a tool and can