...
The following diagram illustrates the high-level architecture UMA uses to achieve its goal.
Software
...
Software entities entities participating in a protocol are frequently known as endpoints. The UMA endpoints are:
- Authorizing user (the "user" in User-Managed Access) , operating a "user agent" such as a browser in order to interact with the other software in the UMA ecosystem – sometimes the software endpoint is just called the "user" for short
- "User" is often used informally in the UMA spec, where what is really meant is the browser (or other client software application) being operated by this person
- Authorization manager (AM)
- Host (of "protected resources")
- Requester
...
Distinguishing Software Endpoints from Legally Responsible Parties
Because software is just a tool and can