George Fletcher presented on User Managed Access (UMA). UMA allows resource owners to define fine-grained authorization policies for protected resources and issue tokens to requesting parties. Fletcher has been involved with UMA since 2009 and discussed the timeline and standards that contributed to UMA. He outlined the actors in UMA, how resources are protected and access tokens obtained. Finally, he provided a detailed use case example of a client accessing a user's calendar according to the user's defined policies.