UMA1 Interop Participants and Solutions
Main UMA1 Interop Testing page | Features and Feature Tests | Results | uma-dev list
Participants in UMA1 testing must register on this page, either by editing the page or by contacting the UMA WG chair, and should subscribe to the uma-dev mailing list, which will be used for interop-related communications. No ranking of other special meaning should be attached to the order in which participants appear. Participants must fill out their relevant rows in the following tables:
Participant information
Participant name and logo | Contact names/emails | Solution full name | Solution abbrev | Roles (AS, RS, C) |
---|---|---|---|---|
Gluu (logo, handle) | Mike Schwartz: mike-at-gluu.org Yuriy Zabrovarnayy: yuriy-at-gluu.org | OXAuth | OX | AS, RS, C? |
Apache plugin? | AP | RS? | ||
Cloud Identity Limited, (logo, handle) | Maciej Machulak: maciej.machulak(AT)cloudidentity.co.uk | NuveAM | CI | AS, RS, C |
Python/Java UMA | PU | RS, C | ||
Roland Hedberg | Roland Hedberg: roland.hedberg-at-adm.umu.se | PyUMA | RH | AS, RS, C |
Solution information: AS role
Solution:role | Config data URL | Supports dynamic client registration for RS and C? | Other details |
---|---|---|---|
OX:AS | https://seed.gluu.org/.well-known/uma-configuration | RS: yes, C: yes | See: |
CI:AS | https://demo.nuveam.com/.well-known/uma-configuration | RS: yes, C: yes | |
RH:AS |
Solution information: RS role
Any RS participating in interop has to expose either multiple resource sets (as registered with the AS) or multiple scopes, or both. This enables testing UMA-specific interop around sufficient/insufficient authz data, permission tickets that match/don't match the requested type of access, etc., while not dictating the specifics of what the API looks like. Each RS participant needs to provide enough information directly in the table below to explain how to access these differential resource sets and scopes, e.g. the URLs, parameters, etc. This way, clients can tell whether the RS was at fault or not if something goes wrong with authorization.
Solution:role | API info | SDK avail? | Login URL and RO creds | Protected resource URL(s) info | Client SDK/library info | Expects dynamic client registration at AS? | Other details |
---|---|---|---|---|---|---|---|
OX:RS | Java | Will fill in when RS is up | |||||
CI:RS | https://nuvepds.appspot.com/about/api | Python and Java | https://nuvepds.appspot.com (Sign in with your social profile) | https://nuvepds.appspot.com/about/api | Optional | ||
RH:RS | Uses "pbryan" (http-json-resource) | https://xenosmilus.umdc.umu.se:8777/login.html (user:alice, password:krall) | Base URL for alice's resources: https://xenosmilus.umdc.umu.se:8777/json/alice | Available in Python and Java (sample at https://nuvepdsclient.appspot.com/) – where? | Supports webfinger. Supports acct and http identifier urls. |
Solution information: C role
Solution:role | App type | Other details |
---|---|---|
OX:C | Will fill in when C is up | |
CI:C | https://nuvepdsclient.appspot.com/ | Sign in using social profile |
RH:C |