
Axiomatics Blog : Tech
Stay in the know on the latest in authorization, attribute-based access control (ABAC), and modernizing your access control strategy.
All articles
The one about identity-first security | Dynamically Speaking
Jackson Shaw, CSO with Clear Skye, joins us to discuss today's authorization & Zero Trust landscape. and why identity-first is the future.
Read the articleThe one about protecting machine and human identities | Dynamically Speaking
Mitch Greenfield, Director of Core Security Architecture for Humana, speaks with us about what's next for protecting people and their devices.
Read the articleWhat happened to Robinhood?
Read CCO Jim Barkdoll's what the recent Robinhood breach means for less high-profile organizations in industries with fewer regulations.
Read the articleHow OAuth is related to Attribute Based Access Control
Here's to understand how Attribute Based Access Control (ABAC) can enhance your OAuth implementation - with graphics.
Read the articleZero Trust Network Access Eliminates Wide Network Access Perimeters
ZTNA is a software-defined perimeter that governs strict identity verification for every person and device attempting to access information on a private network by implementing controls over individual users inside the network.
Read the articleStack Overflow: What’s the difference between policy target and rule target in XACML?
Further clarification between the difference between policy target and rule target in XACML.
Read the articleStack Exchange: Looking for an Approach to Implement Attribute Based Access Control (ABAC)
Stack Overflow: MERN Stack Authorization and Authentication
Authentication, authorization and access control and how to use dynamic authorization with MERN - externalized / dynamic authorization management.
Read the articleAuthorize Like a Pro with Axiomatics + UMA – Guest Blog Post from Gluu
Gluu is not really a great place to store policies. While you can express policies in Gluu Server RPT interception scripts, if you have more then a few policies, this approach does not scale. For a long time, we’ve recommended using a product that makes it easier to manage your policies.
Read the articleDynamic Authorization to redact data in for the Apigee API Gateway
Dynamic Authorization and DevOps
Dynamic Authorization and DevOps work well together. This blog is an overview of the process specific to CI/CD, Axiomatics dynamic authorization and the move to DevSecOps.
Read the articleStack Overflow: Alternatives for Roles/Claims Access Control Systems
The Axiomatics technical teams across sales engineering, development and customer relations often engage with the Stack Overflow community to get insights and answers.
Read the articleA Fresh Look at Spring Security Access Control
The differences between Expression-Based Access Control, Role Based Access Control (RBAC), and Attribute Based Access Control (ABAC), and Spring Expression Language (SpEL) expressions for fine grained access control.
Read the articleWhat you need to know: IDF Connect + Axiomatics Partnership
Now you can get cloud-based WAM with ABAC. IDF Connect's SSO/Rest features Axiomatics’ cloud-native Attribute Based Access Control (ABAC) capabilities to support new cloud-based web resources or to support the cloud migration that so many organizations are undertaking today. SSO/Rest plus Axiomatics Policy Server...
Read the articleApplying Dynamic Authorization to Cloud Technologies
Axiomatics Integrates Dynamic Authorization with Mulesoft Anypoint Platform
For customers implementing MuleSoft’s Anypoint Platform™, Axiomatics now augments existing access control with a customizable API access control policy. This provides fine-grained authorization, providing a context, risk and content-aware approach to securely sharing data and improving the customer experience.
Read the articleUsing the Spring PEP SDK with Spring Boot & Thymeleaf for UI Security
Axiomatics provides a Policy Enforcement Point (PEP) Software Development Kit (SDK) for Spring Security. We can use this Spring Security SDK to easily restrict user interface (UI) items based on authorization in Thymeleaf.
Read the articleIntro to Attribute Based Access Control (ABAC)
Authorization is about facilitating user access to the right data under the right conditions.One approach is Attribute Based Access Control, or ABAC.
Read the articleVideo Blog: Authorization Made Simple: Secure Applications with ALFA, REST, and JSON
In this video blog, Axiomatics discuss how easily authorization can be externalized from your apps, expressed as policies, and enforced consistently using ALFA, XACML, and the Axiomatics Policy Server. Learn the best way to secure your applications.
Read the articleAxiomatics and Saviynt Partnership Brings Externalized Dynamic Authorization and Identity Governance and Administration Solutions Together
Axiomatics and Savyint, a leading provider of identity governance and cloud security solutions, recently announced a partnership that integrates the Axiomatics Dynamic Authorization suite with Saviynt’s Identity Governance and Administration (IGA) solutions.
Read the articleThe Build vs Buy Decision
To Build or to Buy - that is the question. Authorization of user access to data and applications is more important than ever.
Read the articleIAM: The Glue That Holds It All Together
Identity & Access Management (IAM) is that glue. It brings you two things: a coherent, consistent Identity used across all services in a systematic way.
Read the articleApplying ABAC to Cloud Technologies
Is your business or agency preparing to migrate to cloud technologies in 2018? Or have you already adopted the cloud and are looking for ways to enhance
Read the article