This Work Group operates under the Kantara IPR Policy - Option Patent & Copyright: Reciprocal Royalty Free with Opt-Out to Reasonable And Non discriminatory (RAND) (HTML version). You can find any opt-outs on this page.
Home | FAQ | Protocol Spec | Trust Model Spec | Chat | Join | WG-UMA List | UMA-dev list | → Join ← | List | Archive (Mailman) | Archive (Google) | Calendar
|On May 14, 2014, UMA won an award for innovation in information security at the European Identity Conference! We thank the EIC organizers for this honor, and the Kantara Initiative for its support of our efforts – and offer congratulations to all the UMAnitarians. Joni Brennan of Kantara kindly accepted the award on behalf of the UMA WG, and you can see two members of our leadership team, Maciej Machulak (vice-chair) and Domenico Catalano (graphics/UX editor), above. See more news on Twitter by following @UMAWG and #EIC14!|
|title||UMA wins an award at the European Identity Conference!|
We are undertaking some important new work on an UMA "relationship manager" extension to fully enable a resource owner dashboard experience, and more. You can check it out by reading our Meetings and Minutes. To understand more about our work on business-legal considerations, including identity relationship management (IRM)-based delegation use cases, see our Legal hub page. If you're interested to contribute to any of this, be sure to click our Join link above! ⬆︎
Here are the UMA Grant (PDF, HTML for deep linking) and UMA Federated Authorization Recommendations (PDF, HTML for deep linking). Don't miss the UMA2 masterclass delivered by two UMAnitarians at the Identiverse conference in Boston in June 2018 (slides and video). (The slides and video from the previous year's Authorization: Age of UMA session set in the Marvel Cinematic Universe was also a big hit!) The Release Notes review all final UMA1-to-UMA2 changes. See also the UMA Implementer's Guide, our list of known Implementations, and discussions of Case Studies. Finally, see the detailed UMA Grant sequence diagram and FedAuthz sequence diagram.
The purpose of the UMA Work Group (charter) is to develop specs that let an individual control the authorization of data sharing and service access made between online services on the individual's behalf, and to facilitate interoperable implementations of the specs. Read the spec
test your interop
User-Managed Access (UMA) is an award-winning OAuth-based protocol designed to give an individual a unified control point for authorizing who and what can get access to their digital data, content, and services, no matter where all those things live. Read the specs, join the group, check out the implementations,
Follow us on Twitter – our handle is @UMAWG and we often use the hashtag #UMAWG. (Short – spread the word.) Find us on Facebook too
follow us on Twitter, get involved!
| || |
- June 19: We're holding a free webinar today on UMA and Personal Clouds. Join us! Use the hashtag #umapcloud for Twitter discussion. Slides are already up here and a recording will be made available.
- June 3: Group chair Eve Maler is presenting on UMA for the Enterprise at the Kantara workshop at the IRM Summit. You can see the slides here (they're similar but not identical to the March webinar slides).
- May 29: The work group held a vote to reconfirm its leadership team, including Eve Maler, Maciej Machulak, Thomas Hardjono, Domenico Catalano, and Dazza Greenwood. Thanks to the team and the entire WG for their ongoing work! You can see the roster on the Leadership Team page.
- May 14: UMA was one of the recipients of a European Identity Conference award today! Find the news on our Facebook page (and "like" us while you're at it).
- March 29: Did you know there's an open-source Apache server plugin that supports UMA? Check it out on our Implementations page. Thanks to Gluu and its partners for making this plugin happen!
- March 23: On March 20, 2014, we held a free webinar, sponsored by CA Technologies, to share how UMA can help solve modern mobile/cloud access management challenges in the enterprise. You can find the slides (also on SlideShare) and recording online. If you have questions, feel free to tweet us at @UMAWG!
- March 13: Interested to discuss implementations and interop, and take part in our interop activities? Join the UMA-dev list! (Note: We switched from Google Groups to a Kantara-native list.)
- March 6: Revision 09 of the Core spec is approved by the WG as our latest draft, and has been submitted as an IETF I-D revision!
- February 20: Our draft work on mapping UMA to the IDESG Healthcare Relationship Locator Service Use Case is now available from our Case Studies page. Especially if you're heading to HIMSS, don't miss it!
- October 31: Check out the "assembly cut" of the first UMA demo video here. Thanks to Dazza Greenwood for being our video producer!
- October 29: You can find refreshed UMA 101 slides here (PDF, PPTX).
- 6 Sep '21: Congratulations to UMA WG members from Origo on their role in the UK Pensions Dashboard Programme! See this page in the Kantara wiki for more information on using UMA for PDP purposes.
- 10 Jun '21: Congratulations to the new leadership team members! Alec Laws (of Identos) is the Chair and Steve Venema (of ForgeRock) is the Vice-Chair. The WG extends its thanks to former Chair Eve Maler for her previous service as chair. Information about the entire leadership team is here.
- 20 Apr '21: You can get the latest and greatest UMA 101 presentation delivered by UMAnitarians Eve and George at IIW here.
- 3 Dec '20: The UMA Work Group is pleased to accept a new profile contribution (to be provided immently) related to UK Pensions Dashboards as shown on-screen at its meeting today. Read all about it on our updated Third-Party Profiles and Extensions page.
- 15 Oct '20: We are undertaking some important new work on an UMA "policy manager" extension, and more. You can check it out by reading our Meetings and Minutes, and if you're interested to contribute, be sure to click our Join link above! ⬆︎
- 1 Oct '20: WG chair Eve Maler presented UMA, including analyses and comparisons to some other technologies, to the Decentralized Identity Foundation Secure Data Storage WG. Here are her slides.