+
news reporter

Axiomatics Blog

Stay in the know on the latest in authorization, attribute-based access control (ABAC), and modernizing your access control strategy.



All articles
ABAC

It takes a village to implement successful application security

Axiomatics and MuleSoft provides a dynamic approach to authorization that addresses challenges in today's globally distributed workforces.

Read the article
Business

3 keys to re-evaluate your authorization management

3 keys to re-evaluate your authorization management and not letting your enterprise fall into the trap of identity silos. 

Read the article
Tech

How OAuth is related to Attribute Based Access Control

Here's to understand how Attribute Based Access Control (ABAC) can enhance your OAuth implementation - with graphics.

Read the article
Business

Modern Enterprise Authorization Management System

Enterprise Authorization Management Systems need fine grained, externalized, run time based, dynamic, policy and attribute based capabilities.

Read the article
Business

Mastering GDPR and CCPA Compliance with Dynamic Authorization

Dynamic authorization supports the data access, data transparency and user consent requirements involved with GDPR and CCPA.

Read the article
Business

Multi-Dimensional Security 101: A Beginners Guide to Attribute Based Access Control 

Attribute based Access Control enforces enterprise-wide access based on business policies and regulations making it truly multi-dimensional.

Read the article
Tech

Zero Trust Network Access Eliminates Wide Network Access Perimeters 

ZTNA is a software-defined perimeter that governs strict identity verification for every person and device attempting to access information on a private network by implementing controls over individual users inside the network.

Read the article
Tech

Stack Overflow: What’s the difference between policy target and rule target in XACML?

Further clarification between the difference between policy target and rule target in XACML.

Read the article
Tech

Stack Exchange: Looking for an Approach to Implement Attribute Based Access Control (ABAC)

Read the article
Tech

Stack Overflow: MERN Stack Authorization and Authentication

Authentication, authorization and access control and how to use dynamic authorization with MERN - externalized / dynamic authorization management.

Read the article
Tech

Authorize Like a Pro with Axiomatics + UMA – Guest Blog Post from Gluu

Gluu is not really a great place to store policies. While you can express policies in Gluu Server RPT interception scripts, if you have more then a few policies, this approach does not scale. For a long time, we’ve recommended using a product that makes it easier to manage your policies. 

Read the article
Tech

Dynamic Authorization to redact data in for the Apigee API Gateway

Read the article
ABAC

Stack Overflow: ABAC vs. RBAC via XACML Policies

Read the article
Tech

Dynamic Authorization and DevOps

Dynamic Authorization and DevOps work well together. This blog is an overview of the process specific to CI/CD, Axiomatics dynamic authorization and the move to DevSecOps.

Read the article
Tech

Stack Overflow: Alternatives for Roles/Claims Access Control Systems

The Axiomatics technical teams across sales engineering, development and customer relations often engage with the Stack Overflow community to get insights and answers.

Read the article
Business

Combining Federated Identity Management with Dynamic Authorization

Axiomatics’ Vice President of Business Development, Gerry Gebel, was interviewed by Cynthia Artin on the intersection of Federated Identity Management with Dynamic Authorization. http://it.tmcnet.com/topics/it/articles/2018/11/06/440167-combining-federated-identity-management-with-dynamic-authorization.htm

Read the article
Access Control

A Fresh Look at Spring Security Access Control

The differences between Expression-Based Access Control, Role Based Access Control (RBAC), and Attribute Based Access Control (ABAC), and Spring Expression Language (SpEL) expressions for fine grained access control.

Read the article
Tech

What you need to know: IDF Connect + Axiomatics Partnership

Now you can get cloud-based WAM with ABAC. IDF Connect's SSO/Rest features Axiomatics’ cloud-native Attribute Based Access Control (ABAC) capabilities to support new cloud-based web resources or to support the cloud migration that so many organizations are undertaking today. SSO/Rest plus Axiomatics Policy Server...

Read the article
Access Control 101

Applying Dynamic Authorization to Cloud Technologies

Read the article
Business

Axiomatics Integrates Dynamic Authorization with Mulesoft Anypoint Platform

For customers implementing MuleSoft’s Anypoint Platform™, Axiomatics now augments existing access control with a customizable API access control policy. This provides fine-grained authorization, providing a context, risk and content-aware approach to securely sharing data and improving the customer experience.

Read the article
Tech

Using the Spring PEP SDK with Spring Boot & Thymeleaf for UI Security

Axiomatics provides a Policy Enforcement Point (PEP) Software Development Kit (SDK) for Spring Security. We can use this Spring Security SDK to easily restrict user interface (UI) items based on authorization in Thymeleaf.

Read the article
ABAC

Intro to Attribute Based Access Control (ABAC)

Authorization is about facilitating user access to the right data under the right conditions.One approach is Attribute Based Access Control, or ABAC.

Read the article
Business

Video Blog: Authorization Made Simple: Secure Applications with ALFA, REST, and JSON

In this video blog, Axiomatics discuss how easily authorization can be externalized from your apps, expressed as policies, and enforced consistently using ALFA, XACML, and the Axiomatics Policy Server. Learn the best way to secure your applications.

Read the article
Business

Axiomatics and Saviynt Partnership Brings Externalized Dynamic Authorization and Identity Governance and Administration Solutions Together

Axiomatics and Savyint, a leading provider of identity governance and cloud security solutions, recently announced a partnership that integrates the Axiomatics Dynamic Authorization suite with Saviynt’s Identity Governance and Administration (IGA) solutions.

Read the article