22
User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

Embed Size (px)

Citation preview

Page 1: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

User-Managed AccessUMA Work Group

@UMAWGtinyurl.com/umawg | tinyurl.com/umafaq

IIW 16, May 2013

1

Page 2: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

2

The “data price” for online serviceis too high: typing…

• Provisioning by hand

• Provisioning by value

• Oversharing• Lying!

Page 3: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

3

The “data price” for online serviceis too high: connecting…

• Meaningless consent to unfavorable terms

• Painful, inconsistent, and messy access management

• Oblivious oversharing

Page 4: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

4

The “data price” for online serviceis too high: private URLs…

• Handy but insecure

• Unsuitable for really sensitive data

Page 5: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

5

Most data “sharing” today isback-channel and unconsented

Image source: http://informationanswers.com/?p=283

Page 6: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

Privacy is about context, control, choice and respect – so UMA

enables a “digital footprint control console”

• Web 2.0 access controlis inconsistent and unsophisticated

• To share with others, you have to list them literally

• You have to keep rebuilding your “circles” in new apps

• You can’t advertise content without giving it away

• You can’t get a global view of who accessed what

• You can unify access control under a single app

• Your access policies can test for claims like “over 18”

• You can reuse the same policies with multiple sites

• You can control access to stuff with public URLs

• You can manage and revoke access from one place

6

Page 7: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

7

UMA turns online sharing into a privacy-by-design solution

HistoricalMunicipalFinancialVocationalArtisticSocialGeolocationComputationalGenealogicalBiologicalLegal...

Page 8: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

8

UMA turns online sharing into a privacy-by-design solution

I want to share this stuff selectively• Among my own

apps• With family and

friends• With organizations

I want to protect this stuff from being seen by everyone in the world

Page 9: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

9

UMA turns online sharing into a privacy-by-design solution

I want to control access proactively, not just feel forced to consent over and over

Page 10: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

10

UMA is a profile of OAuth,with bits added for interop and scale

resource owner

resource server authorization

server

client

protected

resources

(unnamed till now)

Page 11: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

11

UMA solves for 1) individual choice and2) fully modular cloud services App-specific

API

UM

A-e

nable

d

client

RPTrequesting party token

Page 12: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

12

UMA solves for 1) individual choice and2) fully modular cloud services

Pro

tectio

n A

PI

Pro

tect

ion

clie

nt

PAT

protection API token

includes resource registration API

and token introspection API

Page 13: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

13

UMA solves for 1) individual choice and2) fully modular cloud services Authorization

API

Authorization client

AATauthorization API token

supports OpenID Connect-based

claims-gathering for authz

Page 14: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

14

Key use caseshttp://kantarainitiative.org/confluence/display/uma/Case+Studies

• Subscribing to a friend’s personal cloud

• Sharing accessibility attributes (“GPII”)

• E-transcript sharing (“HEAR”)

• Patient-centric health data access

• Enterprise “access management 2.0”

Page 15: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

15

Key implementationshttp://kantarainitiative.org/confluence/display/uma/UMA+Implementations

• SMARTAM.net (running authorization service from Cloud Identity UK)

• Puma (Python libraries for RS- and client-enabling web apps) from ditto

• Fraunhofer AISEC open-source implementation in Java

• Gluu OX open-source implementation for Access Management 2.0 use cases

Page 16: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

16

Next steps

• Work on optimization opportunities when UMA and OpenID Connect are used together

• Issue “Implementor’s Draft”• Continue to work with AXN, Scalable Privacy, and

others in “trusted identities in cyberspace” ecosystem

• Profile UMA for higher ed, accessibility attribute sharing, healthcare use cases

• We welcome your involvement and contributions– Become an UMAnitarian!– Follow @UMAWG on Twitter and UserManagedAccess

on FB

Page 17: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

Questions?Thank you

@UMAWGtinyurl.com/umawg | tinyurl.com/umafaq

IIW 16, May 2013

17

Page 18: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

18

Phase 1: protect a resource

Page 19: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

19

Phases 2 and 3: get authorization and access resource1 of 3

Page 20: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

20

Phases 2 and 3: get authorization and access resource2 of 3

Page 21: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

21

Phases 2 and 3: get authorization and access resource1 of 3

Page 22: User-Managed Access UMA Work Group @UMAWG tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May 2013 1

22

Spec call tree for the UMA profile of OAuth

UMA core

OAuth 2 OpenID Connect

Token introspection

OAuth resource set registration

UMA binding obligations

Dynamic client

registration

hostmeta

UMA native spec

Required external

component

Optional external

component

Individual IETF I-D