Axiomatics Featured in KuppingerCole Market Compass for Policy-Based Access Management (PBAM) Learn more  
news reporter

Blog : Question of the Week

Insights and deep-dives into dynamic authorization, attribute-based access control, and modernizing your approach to cybersecurity.

Filter by topic
Select a topic:

How Can I Use Time in a XACML Policy?

What is the main difference between XACML 3.0 and XACML 2.0?

How do I write authorization policies for Big Data?

How can commercial off-the-shelf (COTS) applications be supported with XACML?

How Can I Use Policy References in ALFA?

How Can I Return the Reason for a Denial in a XACML Response?

Why Does Retrieving Attribute Values from a Secure LDAP Slow Performance?

Should I Define the Authorization Logic in the Policy or an External Datasource?

How Can I Use Date in a XACML Policy?

How Can I Comment My Policies?

Breaking the Glass – Using XACML to Implement HIPAA Regulations

When and How Can I Express Negative Logic in XACML?

What is an XACML Policy Reference?

In XACML what is the StringOneAndOnly function?

What Does NotApplicable Mean?

How Can I Implement Access Control Lists (ACL) Using XACML Policies?

Do Attribute Data Types Matter?

Is ALFA a Part of the OASIS XACML Technical Committee Series of Standards?

Why Should I Define Attribute Connectors Using JNDI?

How Does a Policy Decision Point Load a New Policy?

Is It a Good Practice to Use SQL Views for Policy Information Points?

Should the Policy Enforcement Point Send All Attributes Needed to Evaluate a Request?

How Do I Check for the Presence of an Attribute?

What are the Possible XACML REST PDP Response Codes?