Skip to content

Discovering IAM blogs around world

  • Privacy Policy

Tag: UMA

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications The Kantara Initiative formally announced today the approval and publication of the User-Managed Access (UMA) Version 2.0 (UMA 2.0) technical specifications. UMA Read more...

Kantara UMA Standard Achieves V1.0 Status, Signifying a Major Milestone for Privacy and Access Control

Kantara UMA Standard Achieves V1.0 Status, Signifying a Major Milestone for Privacy and Access Control Kantara Initiative announces that the User-Managed Access (UMA) Version 1.0 specifications have achieved the status Read more...

User-Managed Access (UMA) Version 1.0 specifications have been finalized

User-Managed Access (UMA) Version 1.0 specifications have been finalized The User-Managed Access (UMA) Version 1.0 specifications have been finalized as Kantara Initiative Recommendations, the highest level of technical standardization in Read more...

Recent Posts

  • Securing Machine Identities and Preventing Outages: A Top 2025 Priority for Your Business
  • Conquer Identity Fraud: A Better Model to Safeguard Your Revenue & Reputation
  • Fast Track Your Identity Security: Passkeys & Verified Credentials
  • Email security: The current threat landscape, the latest tools/techniques
  • Fall Cyber Solutions Fest 2024: Zero Trust Track
  • Federated Identities: a one-stop hacking shop for all your credentials
  • 3 Ways to Streamline Auth, Access & Security for Oracle EBS
  • Sailpoint: Takeaways from RSA 2023: LLMs, National Defense and identity as the new cybersecurity perimeter
  • Sailpoint – Identity Security Remains Business Essential
  • Sailpoint – Welcome to the Core of Identity Security
  • BeyondTrust integrates Password Safe solution with SailPoint

Top Posts & Pages

  • Securing Machine Identities and Preventing Outages: A Top 2025 Priority for Your Business
  • Conquer Identity Fraud: A Better Model to Safeguard Your Revenue & Reputation
  • Fast Track Your Identity Security: Passkeys & Verified Credentials
  • Email security: The current threat landscape, the latest tools/techniques
  • Fall Cyber Solutions Fest 2024: Zero Trust Track
- Theme by Grace Themes
 

Loading Comments...