User-Managed Access (UMA) involves these parties:
The following materials explain UMA further. Be sure to read the documents in the Working Drafts area of this wiki for the official definition of UMA.
- Materials from UMA webinar held 29 Jan 2010
- WMV file (for PC users only)
- ARF file (WebEx download - players for PC & Mac)
- mp3 file
- Overview slide deck (version with no builds, suitable for printing, here)
- Protocol deep-dive slide deck with swimlane diagrams
- Wireframes illustrating how a simplified CV-sharing scenario might work
- Another variant of the policy- and terms-setting screen can be seen here
- Identity Matters podcast recorded 20 Jan 2010, explaining how the UMA group operates in the Kantara context
- Flowchart illustrating the different paths to authorized access to a protected resource
- Matrix comparing UMA and other technologies and exploring their synergies
- Historical materials explaining the original thinking behind UMA and its predecessor, ProtectServe
- User-managed access control writings by Maciej Machulak
- Writings on ProtectServe and UMA by Eve Maler