Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 22 Next »

UMA Frequently Asked Questions

December 2011 UMA Webinar

Thanks to those who joined our public webinar on Wednesday, December 14, and especially to our sponsors, IEEE-ISTO and Edentiti! You can find the slides here, and the webinar recording here. Stay tuned for details on a new webinar that will include a technical deep dive.

These are questions we have fielded while giving UMA presentations and demos. More answers to come shortly. If you want us to answer one of the empty questions you see appearing here, or have other questions, tweet us!


General Questions

What is UMA?

 Click to collapse/expand...

User-Managed Access (UMA, pronounced "OOH-mah" like the given name) is a protocol designed to give a web user a unified control point for authorizing who and what can get access to their online personal data (such as identity attributes), content (such as photos), and services (such as viewing and creating status updates), no matter where all those things live on the web.

UMA allows a user to make demands of the requesting side in order to test their suitability for receiving authorization. These demands can include requests for information (such as

  • No labels