Download your copy of our State of Authorization: Playbook Edition Get it now »
pen writing

Axiomatics Blog

Stay in the know on the latest in authorization, attribute-based access control (ABAC), and modernizing your access control strategy.



All articles
ALFA

How can I manage many complex permit rules for the same ALFA policy?

See how you can efficiently create and manage complex rules within an ALFA policy that is easy for humans to read and maintain.

Read the article
Access Control

Q&A: Auditing and Authorization

David Brossard and Matt Luckett discuss how policy-driven authorization can help improve auditing.

Read the article
ALFA

Handling multi-valued attributes in ALFA – How “bag” can it get?

See how you can leverage the power of ALFA to help your Policy Decision Point (PDP) handle multi-valued attributes.

Read the article
Access Control

The future of work, or work today, requires access control

As the world shifts to being remote there is an importance placed on collaboration. This shift requires access control to make the experience frictionless.

Read the article
Access Control

Perspectives on Authorization in 2024 with David Brossard

David Brossard discusses some access control highlights in 2023 and what his predictions are for access control and authorization in 2024.

Read the article
Access Control

Q&A: Authorization and Authentication

Matt Luckett and David Brossard discuss authentication and authorization and why enterprises need both as part of a successful access control strategy.

Read the article
Access Control

Manual access recertification is tedious and ineffective. So…why do we still ask managers to do this?

A look into the manual recertification process and the extremes companies think to go to to ensure the process is done correctly.

Read the article
Access Control

Q&A: Critical infrastructure and policy-driven authorization with Mark Cassetta

Mark Cassetta discusses how policy-driven authorization reduces cyber risks that critical infrastructure organizations face in a modern world.

Read the article
Access Control

Perspectives on Authorization in 2024 with Babak Sadighi

Babak Sadighi discusses some access control highlights in 2023 and what his predictions are for access control and authorization in 2024.

Read the article
Access Control

What can the travel industry do to prevent another Southwest outage

The holiday season is one of the busiest travel times each year. As traveling picks up, organizations must prioritize modernizing their cybersecurity strategy.

Read the article
Access Control

Ten years after the Target breach: Why retailers need authorization as breaches persist

The retail industry is falling behind when it comes to cybersecurity. Retailers are worse off now ten years after the Target breach.

Read the article
Access Control

What is cloud-native authorization and why should I care?

Cloud-native software is a priority for enterprises. Learn what the biggest challenge along the cloud-native authorization journey and how to solve it.

Read the article
Access Control

Playbook drilldown: Deployment methodology

We’ve pulled together a few questions we often ask that identify core priorities for a policy-driven authorization deployment.

Read the article
Access Control

How authorization enables a successful customer experience

Learn the top five outcomes we typically hear from enterprises about how their modern approach to access improves customer experience.

Read the article
Access Control

What are two common misconceptions around cloud-native authorization?

With any type of technology, there are misconceptions out there around cloud-native authorization. We tackle two misconceptions and uncover the truth.

Read the article
Access Control

What are the key components of a Zero Trust approach?

Learn about the key components of a Zero Trust approach, which addresses the need for a modern approach to your cybersecurity strategy.

Read the article
Access Control

What is policy-as-code and why should I care?

Discover how our simplified ALFA policy language makes policy creation accessible to everyone, not just developers.

Read the article
ABAC

Policy-driven authorization and the U.S. Federal Government

Learn three reasons why federal agencies should consider policy-driven authorization to help them modernize their approach to access control.

Read the article
Attribute Based Access Control (ABAC)

Playing by the book: Authorization

While enterprises are acknowledging the importance of authorization, there is still a lack of understanding of what authorization really is.

Read the article
ABAC

ABAC plays a crucial role in ensuring compliant release of Export-controlled information

Let's explore the significance of ABAC in ensuring the compliant release of export-controlled information.

Read the article
Access Control

Consumers don’t blur the line between identity and cybersecurity, so why should an enterprise?

As cybersecurity enterprises increasingly acquire those focused on identity, there's a convergence accelerating between security & identity.

Read the article
Attribute Based Access Control (ABAC)

Bridging the gap with generative AI

Policy Companion uses generative AI to help users who are unfamiliar with creating policies feel confident about policy design.

Read the article
Access Control

Q&A: Authorization in 20 years – what will change?

Chief Technology Officer, David Brossard, and founder & Head of Strategy, Babak Sadighi, discuss the next 20 years of authorization.

Read the article
XACML

Does the JSON profile for XACML support MDP?

Axiomatics also supports the JSON over REST authorization interface on its PDPs, providing XACML support for MDP. Learn how.

Read the article