SlideShare a Scribd company logo
CIS 2015 User Managed Access - George Fletcher
User Managed Access
George Fletcher
My History with UMA
•  2009 Internet Identity Workshop session
•  Person-to-person protected sharing
•  Auto-updating digital photo frame
•  Charter member of the working group
Copyright © 2015 Cloud Identity Summit. All rights reserved. 3
Standards Timeline
Copyright © 2015 Cloud Identity Summit. All rights reserved. 4
JWT	
  
Protect	
  
Serve	
  
UMA	
  Core,	
  OAuth	
  Resource	
  Set	
  Registra:on	
  
OAuth	
  1.0,	
  1.0a	
   WRAP	
  
OpenID	
  AB/Connect	
  
Open	
  
ID	
  
OAuth	
  2.0	
  
08
 09
 10
 11
 13
12
 14
 15
Dynamic	
  Client	
  Reg	
  
(from	
  UMA/OIDC	
  contribu5ons)	
  
OpenID	
  Connect	
  
User Managed Access Actors
Copyright © 2015 Cloud Identity Summit. All rights reserved. 5
resource owner
resource server
authorization
server
client
protected
resources
(unnamed till
now)
What is User Managed Access?
•  Owner definition and control of access authorization
policies for protected resources
•  Access requests from arbitrary clients
•  Centralized authorization policy
•  Resource servers enforce policy decisions
•  Binding obligations
•  Profile of OAuth2
Copyright © 2015 Cloud Identity Summit. All rights reserved. 6
UMA and Privacy by Design
Copyright © 2015 Cloud Identity Summit. All rights reserved. 7
I want to share data and
access selectively
•  Among my own apps
•  With family and friends
•  With organizations
I want to protect this stuff
from being seen by everyone
in the world
I want to control access
proactively, not just feel forced
to consent over and over
tinyurl.com/umapbd
Why is this important?
•  Next evolution beyond consent
•  Consent not required at run-time
•  Much richer set of policy components
•  Audit and transparency
•  Mutual consent between parties
Copyright © 2015 Cloud Identity Summit. All rights reserved. 8
Copyright © 2015 Cloud Identity Summit. All rights reserved. 9
UMA v1.0 The Protocol
Steps of the UMA Flow
1.  Protect a resource
•  Register endpoints and permissions
2.  Obtain an authorization token
•  Identify parties
•  Negotiate claims
3.  Access the resource
Copyright © 2015 Cloud Identity Summit. All rights reserved. 10
Protection API
Copyright © 2015 Cloud Identity Summit. All rights reserved. 11
•  Resource registration endpoint
•  Permission registration endpoint
•  Token introspection endpoint
The PAT protects the API and
binds the RO, RS, and AS
Resource set registration
•  OAuth2 proposed extension
•  Outsource authorization policy of RS endpoints to AS
•  RS is final authority for releasing access
Copyright © 2015 Cloud Identity Summit. All rights reserved. 12
{
"name" : ”Calendar",
"icon_uri" : "http://mycals.example.com/icons/cal.png",
"scopes" : [
"http://mycals.example.com/dev/scopes/view_busy",
"http://mycals.example.com/dev/scopes/sched_normal"
],
"type" : "http://www.example.com/rsets/calendar"
}
Authorization API
Copyright © 2015 Cloud Identity Summit. All rights reserved. 13
•  RPT endpoint
The AAT protects the API and
binds the RqP, client, and AS
The client may be told:
“need_info”, necessitating trust
elevation for authentication or
CBAC (or, through extension,
ABAC)
Claims negotiation
Copyright © 2015 Cloud Identity Summit. All rights reserved. 14
A “claims-aware” client can
proactively push an OpenID
Connect ID token, a SAML
assertion, a SCIM record, or other
available user data to the AS per the
operative trust framework
A “claims-unaware” client can, at
minimum, redirect the requesting
party to the AS to log in, press an “I
Agree” button, fill in a form, follow a
NASCAR for federated login, etc.
If the AAT was minted with too-weak
authentication, the AS can request
step-up for it as well
Protected Resource
Copyright © 2015 Cloud Identity Summit. All rights reserved. 15
The RPT is the main “access
token” and (by default – it’s
profilable) is associated with
time-limited, scoped
permissions
The RPT is a tuple of these four
entities; it may potentially span
ROs because the C or RqP
should not know which RO
controls which resource.
Binding Obligations
Copyright © 2015 Cloud Identity Summit. All rights reserved. 16
Subject
or
Individual
Non-
person
entity
Authorizing Party
Requesting Party
Resource Server Operator
Client Operator
Requesting Party Agent
Authorization Server
Operator
New obligations (and
rights) tend to appear at
important protocol
“state changes”
Copyright © 2015 Cloud Identity Summit. All rights reserved. 17
Let’s Make it Real
Detailed use case
•  Alice needs to coordinate a meeting with an important
client Bob
•  Alice wants to allow Bob to view her calendar so he
can pick a time that works for both of them
•  Bob can schedule over normal calendar events but
not ones designated as high priority
Copyright © 2015 Cloud Identity Summit. All rights reserved. 18
Copyright © 2015 Cloud Identity Summit. All rights reserved. 19
Use Case Actors
authZ4me
(UMAAS)
scheduleMe
(cal client)
myCals
(cal srvc)
Alice
Bob
Copyright © 2015 Cloud Identity Summit. All rights reserved. 20
Alice registers protection for her calendar
authZ4me
(UMAAS)
scheduleMe
(cal client)
myCals
(cal srvc)
Alice
Bob
OAuth2
Flow
{PAT}
Register Calendar
endpoints and permissions
Alice registers UMA protection of her calendar
•  Standard OAuth2 flow between myCals and
authZ4me to obtain a “PAT”
•  myCals registers Alice’s calendar
•  https://mycals.example.com/cal/alice/work
•  View, view_busy, delete, update, download, publish
•  Schedule_all, schedule_normal
Copyright © 2015 Cloud Identity Summit. All rights reserved. 21
Copyright © 2015 Cloud Identity Summit. All rights reserved. 22
Alice defines authorization policy
authZ4me
(UMAAS)
scheduleMe
(cal client)
myCals
(cal srvc)
Alice
Bob
AuthZ Policy:
Must be Bob
Perm:
view_busy
schedule_normal
Alice sends Bob an email
Copyright © 2015 Cloud Identity Summit. All rights reserved. 23
Hi Bob,
Please view my calendar and schedule the meeting
we spoke about today.
https://mycals.example.com/cal/alice/work
Thanks,
Alice
Copyright © 2015 Cloud Identity Summit. All rights reserved. 24
Bob meets claims to access Alice’s calendar
authZ4me
(UMAAS)
scheduleMe
(cal client)
myCals
(cal srvc)
Alice
Bob
OAuth2
Flow
{AAT}
Copyright © 2015 Cloud Identity Summit. All rights reserved. 25
Bob subscribes to Alice’s calendar
authZ4me
(UMAAS)
scheduleMe
(cal client)
myCals
(cal srvc)
Alice
Bob
Subscribe
{RPT}
Calendar View
Select Mtg
Time
Bob schedules a meeting with Alice
•  Scheduleme POST’s to
•  https://mycals/cal/alice/work/meeting
•  Date, time, location
•  Passes RPT in the HTTP Authorzation header
Copyright © 2015 Cloud Identity Summit. All rights reserved. 26
Copyright © 2015 Cloud Identity Summit. All rights reserved. 27
Meeting added to Alice’s calendar
authZ4me
(UMAAS)
scheduleMe
(cal client)
myCals
(cal srvc)
Alice
Bob
Add Mtg
{RPT}
Mtg Scheduled
Select Mtg
Time
Use case take-aways
•  Resource set and permission/scope definition very
flexible and extensible
•  Resource server defined not AS defined
•  Fine grained authorization across domains
•  Rich set of authorization policy options {trust elev}
•  Provides transparency for Alice as Bob walks through
the process
Copyright © 2015 Cloud Identity Summit. All rights reserved. 28
UMA Use Cases
Health
Financial
Education
Personal
Government
Media
Enterprise
Copyright © 2015 Cloud Identity Summit. All rights reserved. 29
tinyurl.com/umacase tinyurl.com/umaiiottinyurl.com/umaam20
Web
Mobile
API
IoT
UMA Working Group
•  1.0 core released
•  RSR submitted to the OAuth2 working group
•  Looking for implementations
•  Testing suite in the works
Copyright © 2015 Cloud Identity Summit. All rights reserved. 30
1.0
Q&A
•  UMA working group URL
•  tinyurl.com/umawg
•  UMA CORE spec URL
•  tinyurl.com/umav1
•  OAuth2 resource set reg URL
•  https://docs.kantarainitiative.org/uma/draft-oauth-resource-reg.html
•  UMA Use cases URL
•  tinyurl.com/umacase
Copyright © 2015 Cloud Identity Summit. All rights reserved. 31
Appendix
Copyright © 2015 Cloud Identity Summit. All rights reserved. 32
•  Text is Arial Narrow 28pt.
•  Use Red for Emphasis
Copyright © 2015 Cloud Identity Summit. All rights reserved. 33
Copyright © 2015 Cloud Identity Summit .All rights reserved. 34
Copyright © 2015 Cloud Identity Summit. All rights reserved. 35

More Related Content

PDF
CIS14: User-Managed Access
PPTX
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
PPTX
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
PDF
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
PDF
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
PDF
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
PDF
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
PPTX
The New Venn of Access Control in the API-Mobile-IOT Era
CIS14: User-Managed Access
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
The New Venn of Access Control in the API-Mobile-IOT Era

What's hot (20)

PPTX
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
PPTX
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
PDF
ForgeRock Platform Release - Summer 2016
PPTX
NYC Identity Summit Tech Day: Best Practices for API Security
PDF
Beyond username and password it's continuous authorization webinar
PPTX
Webinar: Identity Wars: The Unified Platform Awakens
PPTX
ForgeRock Gartner 2016 Security & Risk Management Summit
PPT
Identity as a Service
PPTX
DevOps & Apps - Building and Operating Successful Mobile Apps
PDF
NYC Identity Summit Tech Day: Authorization for the Modern World
PDF
No IoT Without Identity
PDF
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
PPTX
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
PDF
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
PPTX
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
PPTX
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
PPTX
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
PDF
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
PDF
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
PDF
The Future of Digital Identity in the Age of the Internet of Things
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
ForgeRock Platform Release - Summer 2016
NYC Identity Summit Tech Day: Best Practices for API Security
Beyond username and password it's continuous authorization webinar
Webinar: Identity Wars: The Unified Platform Awakens
ForgeRock Gartner 2016 Security & Risk Management Summit
Identity as a Service
DevOps & Apps - Building and Operating Successful Mobile Apps
NYC Identity Summit Tech Day: Authorization for the Modern World
No IoT Without Identity
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
The Future of Digital Identity in the Age of the Internet of Things
Ad

Similar to CIS 2015 User Managed Access - George Fletcher (20)

PDF
UMA for ACE
PPTX
2018 Oct IIW User Managed Access (UMA)
PDF
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
PDF
Extending the Power of Consent with User-Managed Access & OpenUMA
PPTX
2015 Identity Summit - Stepping Up to New Data Protection Challenges
PDF
CIS 2015- User-Authorized Discovery- George Fletcher
PPTX
Digital Consent: Taking UMA from Concept to Reality
PDF
CIS 2015 Extreme OAuth - Paul Meyer
PDF
Uma webinar 2014 03-20
PDF
Uma webinar 2014 06-19
PDF
[WSO2Con USA 2018] Identity APIs is the New Black
PPTX
The state of uma 2014 11-03
PPTX
The Platform Big Picture
PDF
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
PDF
Cloud identity management meetup 150108
PDF
Applying Innovative Tools for GDPR Success
PPTX
A recipe for standards-based Cloud IdM
PPTX
IoT mobile app device cloud identity and security architecture
PPTX
Mit 2014 introduction to open id connect and o-auth 2
PDF
Mobile Cloud Identity
UMA for ACE
2018 Oct IIW User Managed Access (UMA)
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Extending the Power of Consent with User-Managed Access & OpenUMA
2015 Identity Summit - Stepping Up to New Data Protection Challenges
CIS 2015- User-Authorized Discovery- George Fletcher
Digital Consent: Taking UMA from Concept to Reality
CIS 2015 Extreme OAuth - Paul Meyer
Uma webinar 2014 03-20
Uma webinar 2014 06-19
[WSO2Con USA 2018] Identity APIs is the New Black
The state of uma 2014 11-03
The Platform Big Picture
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
Cloud identity management meetup 150108
Applying Innovative Tools for GDPR Success
A recipe for standards-based Cloud IdM
IoT mobile app device cloud identity and security architecture
Mit 2014 introduction to open id connect and o-auth 2
Mobile Cloud Identity
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
MIND Revenue Release Quarter 2 2025 Press Release
Dropbox Q2 2025 Financial Results & Investor Presentation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding

CIS 2015 User Managed Access - George Fletcher

  • 3. My History with UMA •  2009 Internet Identity Workshop session •  Person-to-person protected sharing •  Auto-updating digital photo frame •  Charter member of the working group Copyright © 2015 Cloud Identity Summit. All rights reserved. 3
  • 4. Standards Timeline Copyright © 2015 Cloud Identity Summit. All rights reserved. 4 JWT   Protect   Serve   UMA  Core,  OAuth  Resource  Set  Registra:on   OAuth  1.0,  1.0a   WRAP   OpenID  AB/Connect   Open   ID   OAuth  2.0   08 09 10 11 13 12 14 15 Dynamic  Client  Reg   (from  UMA/OIDC  contribu5ons)   OpenID  Connect  
  • 5. User Managed Access Actors Copyright © 2015 Cloud Identity Summit. All rights reserved. 5 resource owner resource server authorization server client protected resources (unnamed till now)
  • 6. What is User Managed Access? •  Owner definition and control of access authorization policies for protected resources •  Access requests from arbitrary clients •  Centralized authorization policy •  Resource servers enforce policy decisions •  Binding obligations •  Profile of OAuth2 Copyright © 2015 Cloud Identity Summit. All rights reserved. 6
  • 7. UMA and Privacy by Design Copyright © 2015 Cloud Identity Summit. All rights reserved. 7 I want to share data and access selectively •  Among my own apps •  With family and friends •  With organizations I want to protect this stuff from being seen by everyone in the world I want to control access proactively, not just feel forced to consent over and over tinyurl.com/umapbd
  • 8. Why is this important? •  Next evolution beyond consent •  Consent not required at run-time •  Much richer set of policy components •  Audit and transparency •  Mutual consent between parties Copyright © 2015 Cloud Identity Summit. All rights reserved. 8
  • 9. Copyright © 2015 Cloud Identity Summit. All rights reserved. 9 UMA v1.0 The Protocol
  • 10. Steps of the UMA Flow 1.  Protect a resource •  Register endpoints and permissions 2.  Obtain an authorization token •  Identify parties •  Negotiate claims 3.  Access the resource Copyright © 2015 Cloud Identity Summit. All rights reserved. 10
  • 11. Protection API Copyright © 2015 Cloud Identity Summit. All rights reserved. 11 •  Resource registration endpoint •  Permission registration endpoint •  Token introspection endpoint The PAT protects the API and binds the RO, RS, and AS
  • 12. Resource set registration •  OAuth2 proposed extension •  Outsource authorization policy of RS endpoints to AS •  RS is final authority for releasing access Copyright © 2015 Cloud Identity Summit. All rights reserved. 12 { "name" : ”Calendar", "icon_uri" : "http://mycals.example.com/icons/cal.png", "scopes" : [ "http://mycals.example.com/dev/scopes/view_busy", "http://mycals.example.com/dev/scopes/sched_normal" ], "type" : "http://www.example.com/rsets/calendar" }
  • 13. Authorization API Copyright © 2015 Cloud Identity Summit. All rights reserved. 13 •  RPT endpoint The AAT protects the API and binds the RqP, client, and AS The client may be told: “need_info”, necessitating trust elevation for authentication or CBAC (or, through extension, ABAC)
  • 14. Claims negotiation Copyright © 2015 Cloud Identity Summit. All rights reserved. 14 A “claims-aware” client can proactively push an OpenID Connect ID token, a SAML assertion, a SCIM record, or other available user data to the AS per the operative trust framework A “claims-unaware” client can, at minimum, redirect the requesting party to the AS to log in, press an “I Agree” button, fill in a form, follow a NASCAR for federated login, etc. If the AAT was minted with too-weak authentication, the AS can request step-up for it as well
  • 15. Protected Resource Copyright © 2015 Cloud Identity Summit. All rights reserved. 15 The RPT is the main “access token” and (by default – it’s profilable) is associated with time-limited, scoped permissions The RPT is a tuple of these four entities; it may potentially span ROs because the C or RqP should not know which RO controls which resource.
  • 16. Binding Obligations Copyright © 2015 Cloud Identity Summit. All rights reserved. 16 Subject or Individual Non- person entity Authorizing Party Requesting Party Resource Server Operator Client Operator Requesting Party Agent Authorization Server Operator New obligations (and rights) tend to appear at important protocol “state changes”
  • 17. Copyright © 2015 Cloud Identity Summit. All rights reserved. 17 Let’s Make it Real
  • 18. Detailed use case •  Alice needs to coordinate a meeting with an important client Bob •  Alice wants to allow Bob to view her calendar so he can pick a time that works for both of them •  Bob can schedule over normal calendar events but not ones designated as high priority Copyright © 2015 Cloud Identity Summit. All rights reserved. 18
  • 19. Copyright © 2015 Cloud Identity Summit. All rights reserved. 19 Use Case Actors authZ4me (UMAAS) scheduleMe (cal client) myCals (cal srvc) Alice Bob
  • 20. Copyright © 2015 Cloud Identity Summit. All rights reserved. 20 Alice registers protection for her calendar authZ4me (UMAAS) scheduleMe (cal client) myCals (cal srvc) Alice Bob OAuth2 Flow {PAT} Register Calendar endpoints and permissions
  • 21. Alice registers UMA protection of her calendar •  Standard OAuth2 flow between myCals and authZ4me to obtain a “PAT” •  myCals registers Alice’s calendar •  https://mycals.example.com/cal/alice/work •  View, view_busy, delete, update, download, publish •  Schedule_all, schedule_normal Copyright © 2015 Cloud Identity Summit. All rights reserved. 21
  • 22. Copyright © 2015 Cloud Identity Summit. All rights reserved. 22 Alice defines authorization policy authZ4me (UMAAS) scheduleMe (cal client) myCals (cal srvc) Alice Bob AuthZ Policy: Must be Bob Perm: view_busy schedule_normal
  • 23. Alice sends Bob an email Copyright © 2015 Cloud Identity Summit. All rights reserved. 23 Hi Bob, Please view my calendar and schedule the meeting we spoke about today. https://mycals.example.com/cal/alice/work Thanks, Alice
  • 24. Copyright © 2015 Cloud Identity Summit. All rights reserved. 24 Bob meets claims to access Alice’s calendar authZ4me (UMAAS) scheduleMe (cal client) myCals (cal srvc) Alice Bob OAuth2 Flow {AAT}
  • 25. Copyright © 2015 Cloud Identity Summit. All rights reserved. 25 Bob subscribes to Alice’s calendar authZ4me (UMAAS) scheduleMe (cal client) myCals (cal srvc) Alice Bob Subscribe {RPT} Calendar View Select Mtg Time
  • 26. Bob schedules a meeting with Alice •  Scheduleme POST’s to •  https://mycals/cal/alice/work/meeting •  Date, time, location •  Passes RPT in the HTTP Authorzation header Copyright © 2015 Cloud Identity Summit. All rights reserved. 26
  • 27. Copyright © 2015 Cloud Identity Summit. All rights reserved. 27 Meeting added to Alice’s calendar authZ4me (UMAAS) scheduleMe (cal client) myCals (cal srvc) Alice Bob Add Mtg {RPT} Mtg Scheduled Select Mtg Time
  • 28. Use case take-aways •  Resource set and permission/scope definition very flexible and extensible •  Resource server defined not AS defined •  Fine grained authorization across domains •  Rich set of authorization policy options {trust elev} •  Provides transparency for Alice as Bob walks through the process Copyright © 2015 Cloud Identity Summit. All rights reserved. 28
  • 29. UMA Use Cases Health Financial Education Personal Government Media Enterprise Copyright © 2015 Cloud Identity Summit. All rights reserved. 29 tinyurl.com/umacase tinyurl.com/umaiiottinyurl.com/umaam20 Web Mobile API IoT
  • 30. UMA Working Group •  1.0 core released •  RSR submitted to the OAuth2 working group •  Looking for implementations •  Testing suite in the works Copyright © 2015 Cloud Identity Summit. All rights reserved. 30 1.0
  • 31. Q&A •  UMA working group URL •  tinyurl.com/umawg •  UMA CORE spec URL •  tinyurl.com/umav1 •  OAuth2 resource set reg URL •  https://docs.kantarainitiative.org/uma/draft-oauth-resource-reg.html •  UMA Use cases URL •  tinyurl.com/umacase Copyright © 2015 Cloud Identity Summit. All rights reserved. 31
  • 32. Appendix Copyright © 2015 Cloud Identity Summit. All rights reserved. 32
  • 33. •  Text is Arial Narrow 28pt. •  Use Red for Emphasis Copyright © 2015 Cloud Identity Summit. All rights reserved. 33
  • 34. Copyright © 2015 Cloud Identity Summit .All rights reserved. 34
  • 35. Copyright © 2015 Cloud Identity Summit. All rights reserved. 35