SlideShare a Scribd company logo
1 of 23
Download to read offline
Access Management 2.0:
UMA for the Enterprise	

@UMAWG
#UMAam20 for questions
20 March 2014
tinyurl.com/umawg for slides, recording, and more
1
Agenda
•  The realities and
challenges of modern
access control (CA)
•  “UMA for the Enterprise
101”
•  Enterprise UMA case
study and demo (Gluu)
•  What vendors are saying
and doing about UMA
•  Q&A
2	

Thanks to CA Technologies
for sponsoring this webinar!
Thanks to Kantara for
supporting the UMA work!
Thanks to our additional
webinar participants!
The realities and challenges of
modern access control
3	

Further reading:
tinyurl.com/umaam20
4	
   	
  	
  	
  
Copyright © 2014 CA. All rights reserved.
UMA	
  Con(nues	
  The	
  Shi0	
  In	
  Iden(ty	
  Management	
  
That	
  Began	
  With	
  OAuth	
  
The Traditional Enterprise The 21st Century Enterprise
This is the secret to
achieving scale and
agile federation
“UMA for the Enterprise 101”
5	

Further reading:
tinyurl.com/umafaq
OAuth is a three-entity protocol for
securing API calls in a user context
6	

Source:	
  The	
  OAuth	
  2.0	
  Authoriza4on	
  Framework,	
  h;p://tools.ie@.org/html/rfc6749	
  
End-user resource
owner gets
redirected to AS to
log in and consent
to access token
issuance
AS and RS are
typically in the
same domain and
communicate in a
proprietary way
UMA’s original goal: apply privacy-
by-design to OAuth data sharing
7	

Standardized APIs for
privacy and “selective
sharing”
Outsources protection to
a centralized “digital
footprint control console”
The “user” in User-Managed
Access (UMA)
Some guy not
accounted for
in OAuth…
Further reading:
tinyurl.com/umapbd
Emergent UMA properties: flexible,
modern, claims-based authorization
8	

Source:	
  XACMLinfo.org,	
  h;p://xacmlinfo.org/2011/10/30/xacml-­‐reference-­‐architecture/	
  
consumes authz data associated with token
native or a client of offboard source(s), in any language(s)
claims gathered through user interaction and/or consuming ID tokens
UMA and XACML can coexist nicely
The RS
exposes
whatever
value-add API
it wants,
protected by an
AS
9	

App-specific API
UMA-enabled
client
RPTrequesting party token
The AS
exposes an
UMA-
standardized
protection API
to the RS
10	

ProtectionAPI
Protectionclient
PAT
protection API token
includes resource
registration API and token
introspection API
The AS
exposes an
UMA-
standardized
authorization
API to the client
11	

Authorization API
Authorization client
AAT
authorization API token
supports OpenID
Connect-based claims-
gathering for authz
UMA, SAML, and OpenID Connect can coexist nicely
Key use cases
•  Managing
personal data
store access
•  E-transcript
sharing
•  Patient-centric
health data
access
•  …and enterprise access management 2.0
12	

Source:	
  MIT	
  Consor4um	
  for	
  Kerberos	
  and	
  Internet	
  Trust,	
  h;ps://kit.mit.edu	
  
AM1.0 vs AM2.0
•  Complex and feature-rich
•  Usually proprietary
•  Mobile/API-unfriendly
•  Brittle deployment
architecture
•  Not agnostic to authn
method
•  Hard to source distributed
policies
•  Usually coarse-grained
•  RESTful and simpler
•  Standard interop baseline
•  Mobile/API-friendly
•  Just call authz endpoints
vs. deploying an agent
•  Agnostic to authn method
and federation usage
•  Flexible in policy
expression and sourcing
•  Leverages API’s “scope-
grained authorization”
13
Enterprise UMA case study
14
What vendors are saying and doing
about UMA
15	

Further	
  reading:	
  
4nyurl.com/uma1iop	
  
NuveAM by Cloud Identity
•  UMA-compliant AS:
–  Access control to Web data
–  API security and management
–  Real-time monitoring and audit
•  Use cases: Securing Personal Data Services (PDS) and
access management 2.0 (API security)
•  Uses open standards, including UMA, OAuth 2.0, OpenID
Connect, and SAML 2.0
•  Open source frameworks: Java and Python
•  Support for mobile (Android)
•  Integrates with Identity Management and Identity Federation
http://www.cloudidentity.co.uk/products/nuveam
16
NuveAM by Cloud Identity
17
NuveAM for the enterprises
18	

•  Management of resources, APIs,
permissions, and access control policies
•  Access control on demand
•  Detailed audit information
•  Application management: resource servers
and clients (with NuveLogin)
•  Integration with identity management
•  Integration with identity federation and SSO
NuveAM for the enterprises
19
NuveAM for the enterprises
20
Next steps
21
Next steps for the WG…and you
•  Get involved!
–  Become an “UMAnitarian” (it’s free)
–  Participate in the interop and
our implementation discussions
–  Follow and engage with @UMAWG on Twitter
•  Current work:
–  Technical: claim profiling to allow claim-gathering
using SAML, OpenID Connect, LDAP…
–  Business: Binding Obligations spec to tie “terms of
authorization” to multi-party state changes
•  Stay tuned for another webinar in Q2
22	

Join	
  at:	
  
4nyurl.com/umawg	
  
Questions? Thank you!	

@UMAWG
#UMAam20 for questions
20 March 2014
tinyurl.com/umawg for slides, recording, and more
23

More Related Content

What's hot

Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudHassan EL ALLOUSSI
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationUthaiyashankar
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research dataTomppa Järvinen
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesVISTA InfoSec
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacksJohn Davis
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareIonixx Technologies Inc.
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standardsUlf Mattsson
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...OpenAthens
 
IT-Security@Contemporary Life
IT-Security@Contemporary LifeIT-Security@Contemporary Life
IT-Security@Contemporary LifeOliver Pfaff
 

What's hot (16)

Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Existing system
Existing systemExisting system
Existing system
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Sovereign identity
Sovereign identitySovereign identity
Sovereign identity
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
 
IT-Security@Contemporary Life
IT-Security@Contemporary LifeIT-Security@Contemporary Life
IT-Security@Contemporary Life
 

Viewers also liked

20120512 robots en verzekeraar
20120512 robots en verzekeraar20120512 robots en verzekeraar
20120512 robots en verzekeraarJGB de Groot
 
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!Kostas Tampakis
 
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...yossi koren
 
20100427 eyjafjalljokull
20100427 eyjafjalljokull20100427 eyjafjalljokull
20100427 eyjafjalljokullNSTDA THAILAND
 
РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.Тарасов Константин
 
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...Тарасов Константин
 
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюРИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюТарасов Константин
 
РИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииРИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииТарасов Константин
 
! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011Тарасов Константин
 
!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекстаТарасов Константин
 
! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011Тарасов Константин
 
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеРИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеТарасов Константин
 
35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seoТарасов Константин
 

Viewers also liked (20)

420
420420
420
 
20120512 robots en verzekeraar
20120512 robots en verzekeraar20120512 robots en verzekeraar
20120512 robots en verzekeraar
 
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
 
Fotos extra1
Fotos extra1Fotos extra1
Fotos extra1
 
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
 
A face of greece!!
A face of greece!!A face of greece!!
A face of greece!!
 
20100427 eyjafjalljokull
20100427 eyjafjalljokull20100427 eyjafjalljokull
20100427 eyjafjalljokull
 
РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.
 
Projektijuhtimine
ProjektijuhtimineProjektijuhtimine
Projektijuhtimine
 
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
 
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюРИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
 
22apr s51-a-sergeev-110426092204-phpapp01
22apr s51-a-sergeev-110426092204-phpapp0122apr s51-a-sergeev-110426092204-phpapp01
22apr s51-a-sergeev-110426092204-phpapp01
 
РИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииРИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерции
 
! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011
 
!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста
 
! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011
 
РИФ 2016, Make SMM not Likes
РИФ 2016, Make SMM not LikesРИФ 2016, Make SMM not Likes
РИФ 2016, Make SMM not Likes
 
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеРИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
 
Rosja -soczi
Rosja  -socziRosja  -soczi
Rosja -soczi
 
35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo
 

Similar to Uma webinar 2014 03-20

Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...ForgeRock
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Eve Maler
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The CloudTu Pham
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2DianaGray10
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceKasun Indrasiri
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5Richard Hudson
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitAmazon Web Services
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSAkshay Mathur
 
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3 The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3 SSH Communications Security
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterForgeRock
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingJoshuaCiccone2
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2
 

Similar to Uma webinar 2014 03-20 (20)

Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
 
D@W REST security
D@W REST securityD@W REST security
D@W REST security
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWS
 
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3 The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summarykantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)kantarainitiative
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Uma webinar 2014 03-20

  • 1. Access Management 2.0: UMA for the Enterprise @UMAWG #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1
  • 2. Agenda •  The realities and challenges of modern access control (CA) •  “UMA for the Enterprise 101” •  Enterprise UMA case study and demo (Gluu) •  What vendors are saying and doing about UMA •  Q&A 2 Thanks to CA Technologies for sponsoring this webinar! Thanks to Kantara for supporting the UMA work! Thanks to our additional webinar participants!
  • 3. The realities and challenges of modern access control 3 Further reading: tinyurl.com/umaam20
  • 4. 4         Copyright © 2014 CA. All rights reserved. UMA  Con(nues  The  Shi0  In  Iden(ty  Management   That  Began  With  OAuth   The Traditional Enterprise The 21st Century Enterprise This is the secret to achieving scale and agile federation
  • 5. “UMA for the Enterprise 101” 5 Further reading: tinyurl.com/umafaq
  • 6. OAuth is a three-entity protocol for securing API calls in a user context 6 Source:  The  OAuth  2.0  Authoriza4on  Framework,  h;p://tools.ie@.org/html/rfc6749   End-user resource owner gets redirected to AS to log in and consent to access token issuance AS and RS are typically in the same domain and communicate in a proprietary way
  • 7. UMA’s original goal: apply privacy- by-design to OAuth data sharing 7 Standardized APIs for privacy and “selective sharing” Outsources protection to a centralized “digital footprint control console” The “user” in User-Managed Access (UMA) Some guy not accounted for in OAuth… Further reading: tinyurl.com/umapbd
  • 8. Emergent UMA properties: flexible, modern, claims-based authorization 8 Source:  XACMLinfo.org,  h;p://xacmlinfo.org/2011/10/30/xacml-­‐reference-­‐architecture/   consumes authz data associated with token native or a client of offboard source(s), in any language(s) claims gathered through user interaction and/or consuming ID tokens UMA and XACML can coexist nicely
  • 9. The RS exposes whatever value-add API it wants, protected by an AS 9 App-specific API UMA-enabled client RPTrequesting party token
  • 10. The AS exposes an UMA- standardized protection API to the RS 10 ProtectionAPI Protectionclient PAT protection API token includes resource registration API and token introspection API
  • 11. The AS exposes an UMA- standardized authorization API to the client 11 Authorization API Authorization client AAT authorization API token supports OpenID Connect-based claims- gathering for authz UMA, SAML, and OpenID Connect can coexist nicely
  • 12. Key use cases •  Managing personal data store access •  E-transcript sharing •  Patient-centric health data access •  …and enterprise access management 2.0 12 Source:  MIT  Consor4um  for  Kerberos  and  Internet  Trust,  h;ps://kit.mit.edu  
  • 13. AM1.0 vs AM2.0 •  Complex and feature-rich •  Usually proprietary •  Mobile/API-unfriendly •  Brittle deployment architecture •  Not agnostic to authn method •  Hard to source distributed policies •  Usually coarse-grained •  RESTful and simpler •  Standard interop baseline •  Mobile/API-friendly •  Just call authz endpoints vs. deploying an agent •  Agnostic to authn method and federation usage •  Flexible in policy expression and sourcing •  Leverages API’s “scope- grained authorization” 13
  • 15. What vendors are saying and doing about UMA 15 Further  reading:   4nyurl.com/uma1iop  
  • 16. NuveAM by Cloud Identity •  UMA-compliant AS: –  Access control to Web data –  API security and management –  Real-time monitoring and audit •  Use cases: Securing Personal Data Services (PDS) and access management 2.0 (API security) •  Uses open standards, including UMA, OAuth 2.0, OpenID Connect, and SAML 2.0 •  Open source frameworks: Java and Python •  Support for mobile (Android) •  Integrates with Identity Management and Identity Federation http://www.cloudidentity.co.uk/products/nuveam 16
  • 17. NuveAM by Cloud Identity 17
  • 18. NuveAM for the enterprises 18 •  Management of resources, APIs, permissions, and access control policies •  Access control on demand •  Detailed audit information •  Application management: resource servers and clients (with NuveLogin) •  Integration with identity management •  Integration with identity federation and SSO
  • 19. NuveAM for the enterprises 19
  • 20. NuveAM for the enterprises 20
  • 22. Next steps for the WG…and you •  Get involved! –  Become an “UMAnitarian” (it’s free) –  Participate in the interop and our implementation discussions –  Follow and engage with @UMAWG on Twitter •  Current work: –  Technical: claim profiling to allow claim-gathering using SAML, OpenID Connect, LDAP… –  Business: Binding Obligations spec to tie “terms of authorization” to multi-party state changes •  Stay tuned for another webinar in Q2 22 Join  at:   4nyurl.com/umawg  
  • 23. Questions? Thank you! @UMAWG #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 23