SlideShare a Scribd company logo
1 of 4
Gluu Publishes Open Source “Enterprise UMA” Software to
enable OAuth 2.0 Access
Gluu announced today that the newest software release from OX, Gluu’s open
source authorization and authentication project, implements UMA, a new
profile of OAuth 2.0 for access management. As a profile of OAuth 2.0 that is
complementary to OpenID Connect, UMA defines RESTful, JSON-based,
standardized flows and constructs for coordinating the protection of any API or
web resource. UMA defines interfaces between “authorization servers” and
“resource servers” that enable centralized policy decision-making for improved
policy administration, auditing, and responsiveness to security threats.
According to the UMA Working Group’s case study on enterprise access
management, “although UMA’s primary use cases have centered on individual
people, more specifically the “users” who manage access to their own online
resources, the UMA notion of authorization as a service also has relevance to
modern enterprises that must secure APIs and other web resources in a
developer-friendly way.”
The UMA Work Group observes the utility of the protocol for multiple scenarios,
noting that “Enterprise UMA” has a number of use cases, including managing client
access to API’s, defining logic for Stepped-Up Authentication, and providing the
foundation for standards-based interoperable web access management.”
With UMA, developers can handle authorization tasks by calling simple JSON/REST
endpoints. Administrators no longer have to deploy a web server plugin module or a
web “reverse proxy” to enable centralized web authorization. This new paradigm can
also be leveraged by “native applications”, for example mobile or cloud applications.
“Integrating UMA into OX, our open source authorization and authentication
platform, has opened the door for new enterprise authorization capabilities only
partially solved by previous commercial access management suites,” said Gluu CEO
Michael Schwartz. “UMA is a major milestone for the Internet. Right now
authorization logic is managed in each application, and it is hard for large
organizations to centralize policies. Previous attempts to centralize authorization
policies have been proprietary, and are not Internet scale. By defining an IETF
standard for a developer-friendly access management protocol, UMA reverses this
trend, and ultimately will make the Internet a safer place for both people and
companies.”
The OX UMA Authorization Server implements all the UMA defined endpoints. It
also provides a web tool to enable administrators at the domain to view the servers
resource sets and to define the policies for access management. These are written
using Java or Python code, and customized to meet the exact authorization
requirements, including calls to external systems or datcan be highly a sources. OX
also provides all OpenID Connect endpoints, which provide client registration,
authentication, and attribute release policies to support an UMA policy decision
point, which is required by the UMA endpoints.
For more information on Gluu’s implementation of UMA visit http://gluu.org/uma-
access-management
About Gluu:
Gluu provides an open source authentication and authorization platform for
organizations that want to leverage open standards such as OpenID Connect, SAML
2.0, and UMA to enable strong authentication, active directory single sign on, and
access management. Deployed quickly on the customers’ IAAS platform of choice,
Gluu’s technology stack improves the quality and drives down the cost of an
increasingly complex and mission critical IT service: authentication and
authorization (AA).
About UMA:
User-Managed Access (UMA, pronounced “OOH-mah”) is an OAuth-based
protocol designed to give a web user a unified control point for authorizing who
and what can get access to their online personal data (such as identity attributes),
content (such as photos), and services (such as viewing and creating status
updates), no matter where all those things live on the web.

More Related Content

Viewers also liked

Viewers also liked (11)

Mousse de limón
Mousse de limónMousse de limón
Mousse de limón
 
fast50_2015_dirog_v2_2
fast50_2015_dirog_v2_2fast50_2015_dirog_v2_2
fast50_2015_dirog_v2_2
 
Carta Mensal - mês 1 - Distrito 4580
Carta Mensal -  mês 1 - Distrito 4580Carta Mensal -  mês 1 - Distrito 4580
Carta Mensal - mês 1 - Distrito 4580
 
San amrtin
San amrtinSan amrtin
San amrtin
 
sistemas
sistemassistemas
sistemas
 
servicio de internet foros
servicio de internet forosservicio de internet foros
servicio de internet foros
 
Presentación: Negocios Digitales en Canarias
Presentación: Negocios Digitales en CanariasPresentación: Negocios Digitales en Canarias
Presentación: Negocios Digitales en Canarias
 
Plano de Negócio 1
Plano de Negócio 1Plano de Negócio 1
Plano de Negócio 1
 
0005
00050005
0005
 
Madeline martinez los medios de transporte
Madeline martinez los medios de transporteMadeline martinez los medios de transporte
Madeline martinez los medios de transporte
 
La Historia del Correo Electrónico
La Historia del Correo ElectrónicoLa Historia del Correo Electrónico
La Historia del Correo Electrónico
 

More from Gluu

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutionsGluu
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot awardGluu
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiersGluu
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management pocGluu
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationGluu
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuGluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for artGluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s visionGluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers iiGluu
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Gluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxGluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Gluu
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementGluu
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submissionGluu
 
Go west young federation
Go west young federationGo west young federation
Go west young federationGluu
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxyGluu
 

More from Gluu (20)

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 

Gluu publishes open source “enterprise uma” software to enable o auth 2.0 access

  • 1. Gluu Publishes Open Source “Enterprise UMA” Software to enable OAuth 2.0 Access Gluu announced today that the newest software release from OX, Gluu’s open source authorization and authentication project, implements UMA, a new profile of OAuth 2.0 for access management. As a profile of OAuth 2.0 that is complementary to OpenID Connect, UMA defines RESTful, JSON-based, standardized flows and constructs for coordinating the protection of any API or web resource. UMA defines interfaces between “authorization servers” and “resource servers” that enable centralized policy decision-making for improved policy administration, auditing, and responsiveness to security threats. According to the UMA Working Group’s case study on enterprise access management, “although UMA’s primary use cases have centered on individual people, more specifically the “users” who manage access to their own online resources, the UMA notion of authorization as a service also has relevance to modern enterprises that must secure APIs and other web resources in a developer-friendly way.”
  • 2. The UMA Work Group observes the utility of the protocol for multiple scenarios, noting that “Enterprise UMA” has a number of use cases, including managing client access to API’s, defining logic for Stepped-Up Authentication, and providing the foundation for standards-based interoperable web access management.” With UMA, developers can handle authorization tasks by calling simple JSON/REST endpoints. Administrators no longer have to deploy a web server plugin module or a web “reverse proxy” to enable centralized web authorization. This new paradigm can also be leveraged by “native applications”, for example mobile or cloud applications. “Integrating UMA into OX, our open source authorization and authentication platform, has opened the door for new enterprise authorization capabilities only partially solved by previous commercial access management suites,” said Gluu CEO Michael Schwartz. “UMA is a major milestone for the Internet. Right now authorization logic is managed in each application, and it is hard for large organizations to centralize policies. Previous attempts to centralize authorization policies have been proprietary, and are not Internet scale. By defining an IETF standard for a developer-friendly access management protocol, UMA reverses this trend, and ultimately will make the Internet a safer place for both people and companies.”
  • 3. The OX UMA Authorization Server implements all the UMA defined endpoints. It also provides a web tool to enable administrators at the domain to view the servers resource sets and to define the policies for access management. These are written using Java or Python code, and customized to meet the exact authorization requirements, including calls to external systems or datcan be highly a sources. OX also provides all OpenID Connect endpoints, which provide client registration, authentication, and attribute release policies to support an UMA policy decision point, which is required by the UMA endpoints. For more information on Gluu’s implementation of UMA visit http://gluu.org/uma- access-management About Gluu: Gluu provides an open source authentication and authorization platform for organizations that want to leverage open standards such as OpenID Connect, SAML 2.0, and UMA to enable strong authentication, active directory single sign on, and access management. Deployed quickly on the customers’ IAAS platform of choice, Gluu’s technology stack improves the quality and drives down the cost of an increasingly complex and mission critical IT service: authentication and authorization (AA).
  • 4. About UMA: User-Managed Access (UMA, pronounced “OOH-mah”) is an OAuth-based protocol designed to give a web user a unified control point for authorizing who and what can get access to their online personal data (such as identity attributes), content (such as photos), and services (such as viewing and creating status updates), no matter where all those things live on the web.