User-Managed Access

User-Managed Access (UMA) is an OAuth-based access management protocol standard for party-to-party authorization.[1] Version 1.0 of the standard was approved by the Kantara Initiative on March 23, 2015.[2]

As described by the charter of the group that developed UMA,[3] the purpose of the protocol specifications is to “enable a resource owner to control the authorization of data sharing and other protected-resource access made between online services on the owner’s behalf or with the owner’s authorization by an autonomous requesting party”. This purpose has privacy and consent implications for web applications and the Internet of Things (IoT), as explored by the collection of case studies contributed by participants in the standards group.[4]

Comparison to OAuth 2.0

This diagram provides a high level overview of the entities and relationships involved in the UMA specification.

The diagram from [5] (see right) highlights key additions that UMA makes to OAuth 2.0.

In a typical OAuth flow: A resource owner (RO), a human who uses a client application, is redirected to an authorization server (AS) to log in and consent to the issuance of an access token. This access token allows the client application to gain API access to the resource server (RS) on the resource owner's behalf in the future, likely in a scoped (limited) fashion. The resource server and authorization server most likely operate within the same security domain, and communication between them is not necessarily standardized by the main OAuth specification.

User-Managed Access adds three main concepts and corresponding structures and flows:

Protection API
UMA defines a standardized Protection API for the authorization servers with which resource servers communicate about data security. This API enables multiple resource servers to communicate with one authorization server and vice versa. Because the Protection API is itself secured with OAuth, it allows for formal trust establishment between each pair. This also allows an authorization server to present a centralized user interface for resource owners.
Requesting Party (RqP)
UMA defines requesting parties separately from resource owners. This enables party-to-party sharing and fine-grained delegation of access authorization. A resource owner need not consent to token issuance at runtime (i.e. each time their data is requested), but can instead define a policy at the authorization server to allow requesting parties asynchronous access to specific limited authorization scopes.
Trust Elevation
UMA enables access attempts to result in successful issuance of authorization tokens based on a process of trust elevation for requesting parties. This process may involve gathering identity claims or other claims from a requesting party, thus facilitating more robust security of resource owners' data.

History and background

The Kantara Initiative's UMA Work Group[3] held its first meeting[6] on August 6, 2009. UMA's design principles and technical design have been informed by previous work by Sun Microsystems employees, begun in March 2008, on a protocol called ProtectServe. In turn, ProtectServe was influenced by the goals of the Vendor Relationship Management movement and an offshoot effort called feeds-based VRM.

ProtectServe and UMA's earliest versions leveraged the OAuth 1.0 protocol. As OAuth underwent significant change through the publication of the Web Resource Authorization Protocol (WRAP) specification and, subsequently, drafts of OAuth 2.0, the UMA specification has kept pace, and it now uses the OAuth 2.0 family of specifications for several key protocol flows.

UMA does not use or depend on OpenID 2.0 as a means of user identification. However, it optionally uses the OAuth-based OpenID Connect protocol as a means of collecting identity claims from a requesting party in order to attempt to satisfy the authorizing user's access policy.[citation needed]

UMA also does not use or depend on the eXtensible Access Control Markup Language (XACML) as a means of encoding user policy or requesting policy decisions. UMA does not dictate policy format, as policy evaluation is performed internally to the authorization server (AS) from the UMA perspective. Typically, XACML would be used to implement the policies inside the AS. Its implementation is out-of-scope of UMA. The UMA protocol flows for requesting access permission have some features in common with the XACML protocol.

Standardization status

The UMA group conducts its work in the Kantara Initiative[7] and has also contributed a series of Internet-Draft specifications to the Internet Engineering Task Force (IETF) as an eventual home for UMA standardization work. To this end, the WG has contributed several individual Internet-Drafts to the IETF for consideration. One of these, a specification for OAuth dynamic client registration,[8] served as input for the more generalized mechanism ultimately developed for OAuth.[8] UMA was presented to the OAuth Working Group[9] at the IETF 104 conference in March 2019,[10] but that did not result in any UMA specifications being adopted by the IETF.

Implementation and adoption status

The UMA core protocol has several implementations,[11] including several open source implementations. Sources of active and available open-source implementations include ForgeRock,[12] Gluu,[13] IDENTOS Inc.,[14] MITREid Connect,[15] Atricore, Node-UMA,[16] Roland Hedberg,[17] Keycloak,[18] and WSO2 Identity Server.[19] A Kantara Initiative group is working on developing "free and open-source software (FOSS), in several popular programming languages, that empowers developers to incorporate UMA protection and authorization API enablement into applications, services, and devices".[20]

UMA-enabled products are available from Gluu,[21] Jericho Systems,[22] ForgeRock,[23] IDENTOS Inc.[24] and WSO2 Identity Server [19]

Current processing and acceptance status

The UMA protocol has multiple implementations. Forgerock offers a first open source implementation under OpenUMA.[25] A first implementation of the authorization server is to be tested with OpenAM in the nightly build.[26]

Gluu has implemented UMA to secure and manage access to APIs.[27] Cloud Identity Limited has a full UMA implementation for securing and managing access to personal information and web APIs. Several others have expressed interest in implementation and interoperability testing to the working group.

Applicable use cases

UMA's architecture can serve a variety of consumer-facing and enterprise-facing use cases. The UMA group collects case studies on its wiki.[28]

One example set of use cases is in healthcare IT and consumer health. In the OpenID Foundation organization, a working group called Health Relationship Trust (HEART)[29] is working to "harmonize and develop a set of privacy and security specifications that enable an individual to control the authorization of access to RESTful health-related data sharing APIs", building upon, among other standards, UMA.

Another example set of use cases, which originally influenced UMA's development, is in the area of "personal data stores" in the fashion of vendor relationship management. In this conception, an individual can choose an operator of an authorization service that accepts connections from a variety of consumer-facing digital resource hosts in order to offer a dashboard with resource sharing management capabilities.

References

  1. ^ Maler, E.; Machulak, M.; Richer, J. (2018-01-07). "User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization". docs.kantarainitiative.org. Retrieved 2024-01-11.
  2. ^ "UMA telecon 2015-02-23 - WG - User Managed Access - Kantara Initiative". kantara.atlassian.net. Retrieved 2024-01-11.
  3. ^ a b "User Managed Access Work Group". Kantara Initiative: Trust through ID Assurance. Retrieved 2024-01-11.
  4. ^ "Case Studies - WG - User Managed Access - Kantara Initiative". kantara.atlassian.net. Retrieved 2024-01-11.
  5. ^ CIS 2015 Tuesday, June 9 - George Fletcher, AOL, retrieved 2024-01-11
  6. ^ "UMA telecon 2009-08-06 - WG - User Managed Access - Kantara Initiative". kantara.atlassian.net. Retrieved 2024-01-11.
  7. ^ "WG - User Managed Access - Kantara Initiative". kantara.atlassian.net.
  8. ^ a b Richer, Justin; Jones, Michael B.; Bradley, John; Machulak, Maciej; Hunt, Phil (July 2015). OAuth 2.0 Dynamic Client Registration Protocol (Report). Internet Engineering Task Force.
  9. ^ "Web Authorization Protocol (oauth)". datatracker.ietf.org. Retrieved 2024-01-11.
  10. ^ "IETF104 - oauth WG - meeting minutes".
  11. ^ "UMA Implementations - WG - User Managed Access - Kantara Initiative".
  12. ^ "Digital Identity for Consumers and Workforce | ForgeRock".
  13. ^ "Mission Critical Authentication and Authorization - Open Source vs On Demand". Archived from the original on 2014-02-09. Retrieved 2024-01-19. Gluu OSS implementation of UMA
  14. ^ IDENTOS Inc. Federated Privacy Exchange (FPX)
  15. ^ "An OpenID Connect reference implementation in Java on the Spring platform". github.com. Retrieved 2024-01-19.
  16. ^ Atricore OSS implementation of UMA for Node.js
  17. ^ "Rohe/Pyuma". GitHub. 22 January 2018.
  18. ^ "Keycloak 4.0.0.Final". Archived from the original on 2019-03-06. Retrieved 2019-03-05.
  19. ^ a b "User Managed Access - Identity Server 5.8.0 latest - WSO2 Documentation".
  20. ^ "Home - WG - User-Managed Access Developer Resources - Kantara Initiative". Archived from the original on 2016-02-16. Retrieved 2015-08-13.
  21. ^ "Web Access Management | the Gluu Server for SSO, WAM, & 2FA | Gluu". Archived from the original on 2015-08-05. Retrieved 2015-08-13.
  22. ^ "Jericho Systems Corporation Announces the Release of Consentral™ on FHIR for the Control of Sensitive Health Information". Archived from the original on 2019-06-15.
  23. ^ "User-Managed Access (UMA) - ForgeRock".
  24. ^ "Federated Privacy Exchange - by IDENTOS".
  25. ^ "All Posts about OpenUMA". Retrieved 2024-01-19.
  26. ^ "ForgeRock Access Management". Retrieved 2024-01-19.
  27. ^ "Gluu - Open Source". Archived from the original on 2015-09-24. Gluu OSS implementation of UMA
  28. ^ "Case Studies - WG - User Managed Access - Kantara Initiative".
  29. ^ "HEART WG | OpenID". 27 October 2014.

Further reading

  • Schwartz, Michael; Machulak, Maciej (2018). "User-Managed Access". Securing the Perimiter: Deploying Identity and Access Management with Free Open Source Software. Apress. ISBN 9781484226018.

Read other articles:

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: Arc Provence – berita · surat kabar · buku · cendekiawan · JSTOR ArcCiri-ciri fisikMuara sungaiÉtang de BerrePanjang83 kmLuas DASDAS: 727 km² Arc adalah sebuah sungai sepanjang 83 km di selat...

 

 

Not to be confused with Dezinformatsia (book). Disinformation DisinformationAuthorIon Mihai Pacepa and Ronald J. RychlakOriginal titleDisinformation: Former Spy Chief Reveals Secret Strategies for Undermining Freedom, Attacking Religion, and Promoting TerrorismCountryUnited StatesLanguageEnglishSubjectDisinformationGenreInformation warfarePublisherWND BooksPublication date2013Media typeHardcoverPages429ISBN978-1-936488-60-5OCLC926861117Preceded byRed Horizons: The True Story of...

 

 

Bagian mengenai sebuah rangkaia pada statistikaTeori probabilitas Aksioma probabilitas Ruang probabilitas Ruang sampel Kejadian elementer Kejadian Variabel acak Ukuran probabilitas Kejadian pelengkap Probabilitas bersama Probabilitas marginal Probabilitas bersyarat Kebebasan Kebebasan bersyarat Hukum probabilitas total Hukum bilangan besar Teorema Bayes Pertidaksamaan Boole Diagram Venn Diagram pohon lbs Dalam teori peluang, nilai harapan (juga disebut dengan ekspektasi, nilai ekspektasi, mea...

Roh Moo-hyun노알라Potret resmi, 2003 Presiden Korea Selatan ke-9Masa jabatan25 Februari 2003 – 25 Februari 2008Perdana MenteriGoh Kun Lee Hae Chan Lee Hae ChanHan Myeong-sookHan Duck-soo PendahuluKim Dae-jungPenggantiLee Myung-bak Informasi pribadiLahir(1946-09-01)1 September 1946Gimhae, Gyeongsang Selatan, Korea SelatanMeninggal23 Mei 2009(2009-05-23) (umur 62)Yangsan, Gyeongsang Selatan, Korea SelatanPartai politikCRDP YUP UNDPSuami/istriKwon Yang-sookAgamaKatolik RomaSun...

 

 

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada November 2022. Jan-Ingwer Callsen-Bracker Informasi pribadiNama lengkap Jan-Ingwer Callsen-BrackerTanggal lahir 23 September 1984 (umur 39)Tempat lahir Schleswig, Jerman BaratTinggi 1,89 m (6 ft 2+1⁄2 in)Posisi bermain DefenderInformasi klu...

 

 

AwardRoyal Ulster Constabulary Service MedalOriginal ribbon, 1982–2000Second ribbon, 2000–2001TypeService medalAwarded forAt least 18 months of servicePresented bythe United KingdomEligibilityMembers of the Royal Ulster Constabulary and Royal Ulster Constabulary ReserveStatusNo longer awarded after the RUC was replaced by the Police Service of Northern IrelandEstablished20 July 1982First awarded23 January 1985Order of WearNext (higher)Rhodesia Medal[1]Next (lower)Northe...

Roman god of nocturnal thunder This article is about the Roman god. For the fictional god, see Cthulhu Mythos deities. Religion inancient RomeMarcus Aurelius (head covered)sacrificing at the Temple of Jupiter Practices and beliefs libation votum temples festivals ludi funerary practices imperial cult mystery religions Priesthoods Pontifices Augures Vestales Flamines Fetiales Epulones Fratres Arvales Deities Twelve major gods Capitoline Triad Aventine Triad Underworld indigitamenta Agriculture...

 

 

Therese dari Saxe-HildburghausenRatu BavariaTherese dari Saxe-HildburghausenKelahiran(1792-07-08)8 Juli 1792Seidingstadt, Wilayah Adipati Saxe-HildburghausenKematian26 Oktober 1854(1854-10-26) (umur 62)MunichWangsaWangsa Wittelsbach Wangsa Saxe-HildburghausenNama lengkapTherese Charlotte Luise dari Saxe-HildburghausenAyahFrederick, Adipati Saxe-AltenburgIbuAdipati Wanita Charlotte Georgine dari Mecklenburg-StrelitzPasanganLudwig IAnakMaximilian II, Raja BavariaMathilde Caroline, Adipati ...

 

 

غزنویانГазневіди ↓ 977 – 1186 ↓ Газневіди: історичні кордони на карті1030 Столиця Лахор(1163–1186)[1] Мови перська мова Форма правління Імперія Історичний період Середньовіччя  - Засновано 977  - Ліквідовано 1186 Площа  - 1029 [2][3] 3 400 000 км2 Попе�...

Questa voce o sezione sull'argomento università degli Stati Uniti d'America non cita le fonti necessarie o quelle presenti sono insufficienti. Puoi migliorare questa voce aggiungendo citazioni da fonti attendibili secondo le linee guida sull'uso delle fonti. Questa voce sugli argomenti università della California e Los Angeles è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Loyola Marymount University UbicazioneStato Stati Uniti CittàLos ...

 

 

Arondisemen Bourg-en-Bresse Administrasi Negara Prancis Region Rhône-Alpes Departemen Ain Kanton 24 Komune 219 Prefektur Bourg-en-Bresse Statistik Luas¹ 3,105 km² Populasi  - 1999 295,351  - Kepadatan 95/km² Lokasi Lokasi Bourg-en-Bresse di Rhône-Alpes. ¹ Data Pendaftaran Tanah Prancis, tak termasuk danau, kolam, dan gletser lebih besar dari 1 km² (0.386 mi² atau 247 ekar) juga muara sungai. Arondisemen Bourg-en-Bresse merupakan sebuah arondisemen di Prancis, terlet...

 

 

Mars ObserverPenggambaran Mars Observer di orbit Mars.OperatorNASA / JPLKontraktor utamaGeneral Electric Astro SpaceTipe misiPengorbitSatelit dariMarsTanggal memasuki orbit1993-08-24 (intended)Tanggal perluncuran1992-09-25 17:05:01 UTC (31 tahun, 7 bulan dan 8 hari ago)Wahana peluncurTitan IIITempat peluncuranSpace Launch Complex 40 Cape Canaveral Air Force StationDurasi misiKegagalan transit (kotak terakhir hari 331) (1993-08-21 01:00 UTC)ID COSPAR1992-063ASitus webMars Observ...

هذه المقالة تحتاج للمزيد من الوصلات للمقالات الأخرى للمساعدة في ترابط مقالات الموسوعة. فضلًا ساعد في تحسين هذه المقالة بإضافة وصلات إلى المقالات المتعلقة بها الموجودة في النص الحالي. (مارس 2023) أنتراتسيت    علم شعار الاسم الرسمي (بالأوكرانية: Антрацит)‏  الإحداثي�...

 

 

15th-century caravanserai in Kyrgyzstan Tash RabatTash Rabat situated in the surrounding mountainsShown within KyrgyzstanShow map of KyrgyzstanTash Rabat (West and Central Asia)Show map of West and Central AsiaTash Rabat (Asia)Show map of AsiaLocationNaryn Province, KyrgyzstanCoordinates40°49′23″N 75°17′20″E / 40.82315°N 75.288766°E / 40.82315; 75.288766TypeCaravanseraiHistoryFounded15th centurySite notesOwnershipTursun Zhutabaeva (caretaker) Tash Rabat is ...

 

 

Questa voce o sezione sull'argomento laghi non cita le fonti necessarie o quelle presenti sono insufficienti. Puoi migliorare questa voce aggiungendo citazioni da fonti attendibili secondo le linee guida sull'uso delle fonti. Segui i suggerimenti del progetto di riferimento. Lago di VaranoPanoramica del lago.Stato Italia Regione Puglia Provincia Foggia Coordinate41°52′45″N 15°44′46″E41°52′45″N, 15°44′46″E DimensioniSuperficie60,5 km² Lunghezza10&...

Voce principale: Venezia Football Club Società Sportiva Dilettantistica. Calcio VeneziaMestreStagione 1987-1988Sport calcio Squadra Venezia-Mestre Allenatore Ferruccio Mazzola Presidente Maurizio Zamparini Serie C22º posto nel girone B. Promosso in Serie C1. Maggiori presenzeCampionato: Dore, Rastelli (34) Miglior marcatoreCampionato: Fiorini, Marchetti (10) 1986-1987 1988-1989 Si invita a seguire il modello di voce Questa pagina raccoglie le informazioni riguardanti il Calcio Venezia...

 

 

State highway in Arizona, United States State Route 85SR 85 highlighted in redRoute informationMaintained by ADOTLength128.86 mi[1] (207.38 km)Existed1936–presentTouristroutes Organ Pipe Cactus ParkwayMajor junctionsSouth end Fed. 8 at Mexican border at Lukeville Major intersections I-8 in Gila BendNorth end I-10 in Buckeye LocationCountryUnited StatesStateArizonaCountiesPima, Maricopa Highway system Arizona State Highway System Interstate US State...

 

 

Naga MariahNagoriPeta lokasi Desa Naga MariahNegara IndonesiaProvinsiSumatera UtaraKabupatenSimalungunKecamatanPamatang Silima HutaKode pos21167Luas... km²Jumlah penduduk... jiwaKepadatan-... jiwa/km² Naga Mariah adalah nagori yang berada di kecamatan Pematang Silima Huta, Kabupaten Simalungun, Sumatera Utara, Indonesia. Pemerintahan Nagori Sinar Naga Mariah terdiri dari Huta (dusun) Hoppoan, Simpang Bage, dan Tappe-tappe. Galeri Gereja GKPS Sinar Naga Mariah lbsKecamatan Pamatang Sili...

Barra do GarçasGéographiePays  BrésilUnité fédérative Mato GrossoSuperficie 9 078,99 km2Altitude 318 mCoordonnées 15° 53′ 24″ S, 52° 15′ 25″ ODémographiePopulation 69 210 hab. (2022)Densité 7,6 hab./km2 (2022)FonctionnementStatut MunicipalitéIdentifiantsCode postal 78600-000Indicatif téléphonique 66Site web www.barradogarcas.mt.gov.brmodifier - modifier le code - modifier Wikidata Localisation de Barra do Garças Barra...

 

 

American lawyer (1860–1931) Charles MacVeagh10th United States Ambassador to JapanIn officeDecember 9, 1925 (1925-12-09) – December 6, 1928 (1928-12-06)PresidentCalvin CoolidgePreceded byEdgar BancroftSucceeded byWilliam Richards Castle Jr. Personal detailsBorn(1860-06-06)June 6, 1860West Chester Pennsylvania, U.S.DiedDecember 4, 1931(1931-12-04) (aged 71)Santa Barbara, CaliforniaEducationHarvard UniversityColumbia University Charles MacVeagh (J...