{"id":11196,"date":"2018-09-10T15:25:10","date_gmt":"2018-09-10T14:25:10","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11196\/"},"modified":"2020-01-02T11:42:14","modified_gmt":"2020-01-02T10:42:14","slug":"demystifying-uma2","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/","title":{"rendered":"Demystifying UMA2.0"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">This June at <\/span><a href=\"https:\/\/twitter.com\/hashtag\/Identiverse\"><span style=\"font-weight: 400;\">#Identiverse<\/span><\/a><span style=\"font-weight: 400;\"> in Boston I had quite an epiphany during <\/span><a href=\"https:\/\/twitter.com\/xmlgrrl\"><span style=\"font-weight: 400;\">Eve<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/twitter.com\/nynymike\"><span style=\"font-weight: 400;\">Mike<\/span><\/a><span style=\"font-weight: 400;\">\u2019s session.\u00a0<\/span><span style=\"font-weight: 400;\">I finally realized that <\/span><b>User-Managed Access 2.0 protocol (aka UMA2.0) is not that complicated to understand <\/b><span style=\"font-weight: 400;\">and VERY similar to some OAuth2 flow we all know. Let me try and convince you.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>UMA2.0 : an extension of OAuth2<\/h2>\n<p><span style=\"font-weight: 400;\">Before taking the shovel and digging deeper, remember that UMA2.0 was actually designed as a new grant type of OAuth2 and not as a new protocol. If you already know <\/span><a href=\"https:\/\/tools.ietf.org\/html\/rfc6749\"><span style=\"font-weight: 400;\">OAuth 2.0<\/span><\/a><span style=\"font-weight: 400;\">, then you can understand UMA2 in less than 10 minutes. I promise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here&#8217;s the UMA2.0 grant type in one typical flow:<\/span><\/p>\n<figure id=\"post-11197 media-11197\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11197 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/image1.png\" alt=\"\" width=\"508\" height=\"461\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/image1.png 508w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/image1-210x191.png 210w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/image1-43x39.png 43w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/figure>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The client initiates a request against the resource without a token<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The resource server requests a permission ticket from AS by sending it the requested resource details (requested scopes and resource registered id)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The resource server sends back an error response including the AS location and a permission ticket<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The client optionally requests a Requesting Party Token (RPT, see it as UMA&#8217;s custom form of an access token) directly against the authorization server&#8217;s token endpoint using the permission ticket. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The client redirects the user agent to the authorization endpoint on the Authorization Server to request a token and the authorization server interacts with the requesting party to gather whatever is needed to take an authorization decision (authentication, attribute gathering, etc.) <\/span><i><span style=\"font-weight: 400;\">(wait, this sounds familiar)<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The authorization server redirects the user-agent to the client redirection URI including an updated permission ticket <\/span><i><span style=\"font-weight: 400;\">(I know this\u2026)<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The client requests a requesting party token against the authorization server&#8217;s token endpoint using the updated permission ticket <\/span><i><span style=\"font-weight: 400;\">(I definitely remember now\u2026)<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The authorization servers responds with the RPT and a PCT (Persisted Claims Token, details follow) <\/span><i><span style=\"font-weight: 400;\">(so one ephemeral code against two tokens, mmh, been there\u2026)<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The client requests the resource server with the RPT (UMA2 actually recommends to conform to plain OAuth2 practice like <\/span><a href=\"https:\/\/tools.ietf.org\/html\/rfc6750\"><i><span style=\"font-weight: 400;\">RFC 6750 Bearer Token usage<\/span><\/i><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/docs.kantarainitiative.org\/uma\/wg\/rec-oauth-uma-grant-2.0.html#pop\"><span style=\"font-weight: 400;\">PoP<\/span><\/a><span style=\"font-weight: 400;\">)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The resource server optinnaly requests the Authorization server to validate the RPT (using the OAuth2 introspection endpoint) (following <\/span><a href=\"https:\/\/tools.ietf.org\/html\/rfc7662\"><i><span style=\"font-weight: 400;\">RFC 7662 Token Introspection<\/span><\/i><\/a><span style=\"font-weight: 400;\"> extended by UMA2) or can do that locally depending on the token\u2019s format.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Do you see the authorization code flow? Let me highlight it to you:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11199 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/image2-1.png\" alt=\"\" width=\"508\" height=\"461\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/image2-1.png 508w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/image2-1-210x191.png 210w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/image2-1-43x39.png 43w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Yes, steps 5 to 8 are VERY much like the <\/span><a href=\"https:\/\/tools.ietf.org\/html\/rfc6749#section-4.1\"><span style=\"font-weight: 400;\">OAuth2 authorization code grant<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you agree to the following approximations, there are really no other major differences:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Access Token (AT) becomes Requesting Party Token (RPT) (one with customized token introspection results)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Refresh Token (RT) has now a companion Persisted Claims Token (PCT) (which is really a specialization of the refresh token class)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Authorization code becomes (a kind of mutable) Permission ticket<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">So yes it is not the same. Yes there are some steps before the highlighted part and it is a tiny bit longer.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>UMA2.0 : much more than OAuth2<\/h2>\n<p><span style=\"font-weight: 400;\">Now User-Managed Access has been designed for a reason. And that reason is not to just rename a few OAuth2 artifacts. There are <\/span><b>some differences that enable UMA2.0 to work beyond OAuth2 standard capabilities<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s have a closer look at the differences:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Step 1-3 : The client can get information in a standardized manner about the way to obtain a token (specifically the Authorization Server location) by contacting the resource with a token-less request while if following OAuth2 RFC 6750, no information should be given back by the resource (insufficient scope might be returned only if a token was provided)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Step 4 : The client can try to get a token without starting a dance involving the user-agent. Maybe there&#8217;s no user authorization or consent to gather or maybe a previously delivered token (the PCT) was sufficient to get a new token. If this call is successful, you go straight to step 9 and this can actually be compared to the OAuth2 assertion flow (<\/span><a href=\"https:\/\/tools.ietf.org\/html\/rfc7523\"><span style=\"font-weight: 400;\">RFC 7523 JSON Web Token Profile<\/span><\/a><span style=\"font-weight: 400;\">)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Step 5 : Only if required the end user is bothered to interact with the Authorization Server through the user-agent, to authenticate, gather claims about himself, consent, etc. while in OAuth2, the user-agent is solicited even if no user interaction is required and that can damage user experience<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Step 8 : an additional PCT can be handed over to the client in order to ease subsequent RPT deliveries for the same requesting party but for a different target resource (whereas a refresh token would only refresh an RPT for a given requesting party and target resource)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Before step 1, a resource can register endpoints against an authorization server in a standard manner following <\/span><a href=\"https:\/\/docs.kantarainitiative.org\/uma\/wg\/rec-oauth-uma-federated-authz-2.0.html\"><span style=\"font-weight: 400;\">Federated Authorization for UMA2.0<\/span><\/a><span style=\"font-weight: 400;\"> (but that could be covered in another article)<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">What the UMA2 standard achieves (and is actually designed for) is the <\/span><b>separation of the requesting party and the resource owner<\/b><span style=\"font-weight: 400;\"> (where OAuth2 considers them to be only one person). And this differentiation allows us to <\/span><b>address more use-cases than OAuth2 <\/b><span style=\"font-weight: 400;\">allows by default:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A document owner can share it with other people; for example, a patient can share (different) medical data with his\/her spouse, relatives or doctor<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">An application owner can design rules allowing certain enterprise employees (or business partners) to access an application\/API<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A resource owner can aggregate the management of resource sharing under a single authorization server, even if the resources live in many domains <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">An application can get additional permissions and upgrade the access token scopes without involving the user-agent in an OAuth2 dance if the authorization policies allows it<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">All the above permissions can be granted asynchronously (whereas OAuth2 user consent is only synchronous within the token request flow)<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Special thanks to <a href=\"https:\/\/twitter.com\/xmlgrrl\">Eve Maler<\/a> for her insight while writing this article.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This June at #Identiverse in Boston I had quite an epiphany during Eve and Mike\u2019s session.\u00a0I finally realized that User-Managed Access 2.0 protocol (aka UMA2.0) is not that complicated to understand and VERY similar to some OAuth2 flow we all&#8230;<\/p>\n","protected":false},"author":81,"featured_media":11091,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3272],"tags":[],"coauthors":[905,3040],"class_list":["post-11196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Demystifying UMA2.0 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demystifying UMA2.0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"This June at #Identiverse in Boston I had quite an epiphany during Eve and Mike\u2019s session.\u00a0I finally realized that User-Managed Access 2.0 protocol (aka UMA2.0) is not that complicated to understand and VERY similar to some OAuth2 flow we all...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-10T14:25:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T10:42:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1453\" \/>\n\t<meta property=\"og:image:height\" content=\"1308\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bertrand Carlier\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bertrand Carlier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/\"},\"author\":{\"name\":\"Bertrand Carlier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\"},\"headline\":\"Demystifying UMA2.0\",\"datePublished\":\"2018-09-10T14:25:10+00:00\",\"dateModified\":\"2020-01-02T10:42:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/\"},\"wordCount\":930,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/\",\"name\":\"Demystifying UMA2.0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg\",\"datePublished\":\"2018-09-10T14:25:10+00:00\",\"dateModified\":\"2020-01-02T10:42:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg\",\"width\":1453,\"height\":1308,\"caption\":\"Vector businessman looking for future trends through binoculars - business and strategy metaphor - illustration in flat style\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Demystifying UMA2.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\",\"name\":\"Bertrand Carlier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Demystifying UMA2.0 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/","og_locale":"en_US","og_type":"article","og_title":"Demystifying UMA2.0 - RiskInsight","og_description":"This June at #Identiverse in Boston I had quite an epiphany during Eve and Mike\u2019s session.\u00a0I finally realized that User-Managed Access 2.0 protocol (aka UMA2.0) is not that complicated to understand and VERY similar to some OAuth2 flow we all...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/","og_site_name":"RiskInsight","article_published_time":"2018-09-10T14:25:10+00:00","article_modified_time":"2020-01-02T10:42:14+00:00","og_image":[{"width":1453,"height":1308,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Bertrand Carlier","twitter_misc":{"Written by":"Bertrand Carlier","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/"},"author":{"name":"Bertrand Carlier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de"},"headline":"Demystifying UMA2.0","datePublished":"2018-09-10T14:25:10+00:00","dateModified":"2020-01-02T10:42:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/"},"wordCount":930,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/","name":"Demystifying UMA2.0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg","datePublished":"2018-09-10T14:25:10+00:00","dateModified":"2020-01-02T10:42:14+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Fotolia_62798858_Subscription_Monthly_M.jpg","width":1453,"height":1308,"caption":"Vector businessman looking for future trends through binoculars - business and strategy metaphor - illustration in flat style"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/demystifying-uma2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Demystifying UMA2.0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de","name":"Bertrand Carlier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11196"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11196\/revisions"}],"predecessor-version":[{"id":11248,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11196\/revisions\/11248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11091"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11196"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}