UMA Trust Model
Abstract
This document explores the expectations and responsibilities of various parties interoperating in the User-Managed Access (UMA) context, with an overall goal of facilitating legal enforceability of any agreements made between authorizing users and requesting parties in the granting of access authorization.
Status
This document is a product of the User-Managed Access Work Group. It is currently under active development. Its latest version can always be found here. See the Change History at the end of this document for its revision number.
Editors
- Susan Morrow
- Eve Maler
Intellectual Property Notice
The User-Managed Access Work Group operates under Kantara IPR Policy - Option Patent & Copyright: Reciprocal Royalty Free with Opt-Out to Reasonable And Non discriminatory (RAND) and the publication of this document is governed by the policies outlined in this option.
Table of Contents
Introduction
UMA is a protocol that describes a technical "contract" for HTTP-based interactions (such as standardized request and response messages involving standardized data formats) that obtains among compliant software entities. The entities fill various roles in order to achieve "user-managed access" to Web resources. Such software entities are frequently known as endpoints. The UMA endpoints, as labeled in its specifications, are:
- Authorizing user (or just "user"