Download your copy of our State of Authorization: Playbook Edition Get it now »
pen writing

Axiomatics Blog

Stay in the know on the latest in authorization, attribute-based access control (ABAC), and modernizing your access control strategy.



All articles
Access Control

Ten years after the Target breach: Why retailers need authorization as breaches persist

The retail industry is falling behind when it comes to cybersecurity. Retailers are worse off now ten years after the Target breach.

Read the article
Access Control

What is cloud-native authorization and why should I care?

Cloud-native software is a priority for enterprises. Learn what the biggest challenge along the cloud-native authorization journey and how to solve it.

Read the article
Access Control

Playbook drilldown: Deployment methodology

We’ve pulled together a few questions we often ask that identify core priorities for a policy-driven authorization deployment.

Read the article
Access Control

How authorization enables a successful customer experience

Learn the top five outcomes we typically hear from enterprises about how their modern approach to access improves customer experience.

Read the article
Access Control

What are two common misconceptions around cloud-native authorization?

With any type of technology, there are misconceptions out there around cloud-native authorization. We tackle two misconceptions and uncover the truth.

Read the article
Access Control

What are the key components of a Zero Trust approach?

Learn about the key components of a Zero Trust approach, which addresses the need for a modern approach to your cybersecurity strategy.

Read the article
Access Control

What is policy-as-code and why should I care?

Discover how our simplified ALFA policy language makes policy creation accessible to everyone, not just developers.

Read the article
ABAC

Policy-driven authorization and the U.S. Federal Government

Learn three reasons why federal agencies should consider policy-driven authorization to help them modernize their approach to access control.

Read the article
Attribute Based Access Control (ABAC)

Playing by the book: Authorization

While enterprises are acknowledging the importance of authorization, there is still a lack of understanding of what authorization really is.

Read the article
ABAC

ABAC plays a crucial role in ensuring compliant release of Export-controlled information

Let's explore the significance of ABAC in ensuring the compliant release of export-controlled information.

Read the article
Access Control

Consumers don’t blur the line between identity and cybersecurity, so why should an enterprise?

As cybersecurity enterprises increasingly acquire those focused on identity, there's a convergence accelerating between security & identity.

Read the article
Attribute Based Access Control (ABAC)

Bridging the gap with generative AI

Policy Companion uses generative AI to help users who are unfamiliar with creating policies feel confident about policy design.

Read the article
Access Control

Q&A: Authorization in 20 years – what will change?

Chief Technology Officer, David Brossard, and founder & Head of Strategy, Babak Sadighi, discuss the next 20 years of authorization.

Read the article
XACML

Does the JSON profile for XACML support MDP?

Axiomatics also supports the JSON over REST authorization interface on its PDPs, providing XACML support for MDP. Learn how.

Read the article
Access Control

Optimizing existing identity investments

Many enterpises are putting in their time and resources in all of the right investments, but how can you optimize those existing investments?

Read the article
ALFA

What’s the difference between policy target and rule target in ALFA?

Learn how you can use ALFA to specify a Target in both a Policy and a Rule, addressing a common question using XACML.

Read the article
Access Control

Why does an API gateway need authorization?

To understand why an API gateway needs authorization, we must understand what an API gateway is used for to see why authorization is needed.

Read the article
Access Control

Q&A: Babak Sadighi, David Brossard on 20 years of access control and authorization

Our founder and CTO each reflect on twenty years of access control and authorization, and address some ongoing challenges moving ahead.

Read the article
Access Control

Ten years of ALFA. Wait…what?

The evolution of access control has significantly changed. With more than a decade of ALFA, let’s take a look back at its history.

Read the article
Access Control

My recent vacation had a lot to do with authorization…seriously!

Authorization can be found in your everyday life and yes--even on vacation! The problem is that it’s done wrong almost everywhere.

Read the article
Access Control

Centralization vs. decentralization in authorization

Which should your enterprise choose? What do they mean? Which is better? We share some insight on centralization versus decentralization.

Read the article
Access Control

Authorization as part of a customer identity and access management (CIAM) strategy

What is CIAM? How does Axiomatics combine it with authorization and authentication in order to create the best user experience?

Read the article
Attribute Based Access Control (ABAC)

Should the policy enforcement point send all attributes needed to evaluate a request?

Learn how key attributes work within policy information and enforcement points, enabling you to find the right balance in your deployment.

Read the article
Access Control

Three challenges businesses encounter when introducing authorization

Learn the top three challenges most businesses encounter when introducing authorization policy and how you can solve them.

Read the article