This Work Group operates under the Kantara IPR Policy - Option Patent & Copyright: Reciprocal Royalty Free with Opt-Out to Reasonable And Non discriminatory (RAND) (HTML version). You can find any opt-outs on this page.
Home | FAQ | Protocol Spec | Trust Model Spec | Chat | Intro | Join | WG-UMA List | UMA-dev list |Archive (Mailman) | Archive (Google) | Calendar
|title||UMA V0.9 exits public review; interop testing has begun|
The three main UMA Version 0.9 specifications – UMA Core, OAuth Resource Set Registration, and UMA Claim Profiles – completed a 45-day public review period as of September 6, 2014. The UMA group has launched interop testing, and is holding an open implementors' meeting on the afternoon of October 29 at IIW XIX. To find out more, subscribe to the UMA-dev list. To learn about existing implementations that we know about, visit our Implementations
|UMA2 has an active business-legal framework workstream|
The premise of the Work Group's report A Proposed Licensing Model for User-Managed Access is that UMA enables the individual to centrally manage access and use rights with respect to personal digital assets by converting permission tokens into machine-readable licenses. The group is working on a companion document that outlines a larger business-legal framework for achieving a wide variety of rights delegation use cases involving UMA technology.
Here are the UMA Grant (PDF, HTML for deep linking) and UMA Federated Authorization Recommendations (PDF, HTML for deep linking). Don't miss the UMA2 masterclass delivered by two UMAnitarians at the Identiverse conference in Boston in June 2018 (slides and video). (The slides and video from the previous year's Authorization: Age of UMA session set in the Marvel Cinematic Universe was also a big hit!) The Release Notes review all final UMA1-to-UMA2 changes. See also the UMA Implementer's Guide, our list of known Implementations, and discussions of Case Studies. Finally, see the detailed UMA Grant sequence diagram and FedAuthz sequence diagram.
The purpose of the UMA Work Group (charter) is to develop specs that let an individual control the authorization of data sharing and service access made between online services on the individual's behalf, and to facilitate interoperable implementations of the specs. Read the spec
, test your interopFollow us on Twitter – our handle is @UMAWG. ( – spread the word.) Find us on Facebook too
User-Managed Access (UMA) is an award-winning OAuth-based protocol designed to give an individual a unified control point for authorizing who and what can get access to their digital data, content, and services, no matter where all those things live. Read the specs, join the group, check out the implementations
Recent webinars:UMA and Personal Clouds on 19 June 2014 (slides, SlideShare, recording)UMA for the Enterprise on 20 March 2014 (slides, SlideShare, recording)November : Check out the current "State of UMA" in this new slide deck presented at the Kantara workshop at the Identity Relationship Management Summit in Dublin, Ireland.October 21: A new slide deck on Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usability to Strong Security is now available on SlideShare.October 8: Don't miss the newest entry up on the Case Studies page: How to Give K-12 Students Control of Their Own Data, with a "homework assistance" theme.October 6: Interop testing has begun. Make sure to subscribe to the UMA-dev list to keep up on interop activities!August 20: Looking for a quick-reference way to understand UMA's relationship with the rest of the "Venn of authorization", including OAuth and OpenID Connect? See the Venn "infographic" slides (ppt, pdf).August 17: Got a use case for UMA? Want help documenting a case study? See the new UMA case study worksheet PowerPoint slide deck, which can help you create a custom set of diagrams to describe your unique circumstances. Also see examples of other case studies on our dedicated Case Studies page.July 24: Check out the latest entry on our Case Studies page: an industrial IoT authorization case study submitted by Intel. In the new Internet of Things, refrigerated shipping containers are resource servers and ships are clients.May 14: UMA was one of the recipients of a European Identity Conference award today! Find the news on our Facebook page (and "like" us while you're at it).Check out the "assembly cut" of the UMA demo video here. Thanks to Dazza Greenwood for being our video producer!
- Oct '19: Chair Eve Maler and vice-chair Maciej Machulak have been re-elected to their positions for an annual term. See the Leadership Team page for a full list.
- 1 Oct '19: Did you know that the UMA Work Group has an active business-legal framework workstream in addition to a technical workstream? You can check out our latest notes here, and contribute by joining the group!
- 30 Apr '19: Chair Eve Maler presented an UMA 101 session at IIW 28 in Mountain View.
- 23 Apr '19: UMA was a big part of a two-hour HEART (Health Relationship Trust) webinar and workshop; you can view the YouTube recording here.
- 25 Mar '19: The contributed UMA2 specs were presented at the IETF 104 meeting, at the Monday OAuth WG session. You can see the presented slides and the video of the whole session.
- 22 Feb '19: Don't miss the latest updates to our Implementations page, which include a new implementation from IDENTOS.