+
Axiomatics Featured in KuppingerCole Market Compass for Policy-Based Access Management (PBAM) Learn more  
news reporter

Blog : Question of the Week

Insights and deep-dives into dynamic authorization, attribute-based access control, and modernizing your approach to cybersecurity.

Filter by topic
Select a topic:

How Can I Use Time in a XACML Policy?


What is the main difference between XACML 3.0 and XACML 2.0?


How do I write authorization policies for Big Data?


How can commercial off-the-shelf (COTS) applications be supported with XACML?


How Can I Use Policy References in ALFA?


How Can I Return the Reason for a Denial in a XACML Response?


Why Does Retrieving Attribute Values from a Secure LDAP Slow Performance?


Should I Define the Authorization Logic in the Policy or an External Datasource?


How Can I Use Date in a XACML Policy?


How Can I Comment My Policies?


Breaking the Glass – Using XACML to Implement HIPAA Regulations


When and How Can I Express Negative Logic in XACML?


What is an XACML Policy Reference?


In XACML what is the StringOneAndOnly function?


What Does NotApplicable Mean?


How Can I Implement Access Control Lists (ACL) Using XACML Policies?


Do Attribute Data Types Matter?


Is ALFA a Part of the OASIS XACML Technical Committee Series of Standards?


Why Should I Define Attribute Connectors Using JNDI?


How Does a Policy Decision Point Load a New Policy?


Is It a Good Practice to Use SQL Views for Policy Information Points?


Should the Policy Enforcement Point Send All Attributes Needed to Evaluate a Request?


How Do I Check for the Presence of an Attribute?


What are the Possible XACML REST PDP Response Codes?