+
news reporter

Axiomatics Blog

Stay in the know on the latest in authorization, attribute-based access control (ABAC), and modernizing your access control strategy.



All articles
Business

The Build vs Buy Decision

To Build or to Buy - that is the question. Authorization of user access to data and applications is more important than ever.

Read the article
Business

IAM: The Glue That Holds It All Together

Identity & Access Management (IAM) is that glue. It brings you two things: a coherent, consistent Identity used across all services in a systematic way.

Read the article
Business

Applying ABAC to Cloud Technologies

Is your business or agency preparing to migrate to cloud technologies in 2018? Or have you already adopted the cloud and are looking for ways to enhance

Read the article
Business

Managing DevOps with Dynamic Authorization

Read the article
Business

Digital Transformation: Securing Customer-centric Initiatives

Read the article
Business

Securing Access to PII and EHR in a Digitized Health Care Environment

Read the article
Business

Why Layering Your Security is Important

Read the article
Business

Enhancing API Security: Dynamic Authorization to Protect Sensitive Data

Read the article
Business

Is Your Content Management System Putting You At Risk?

Read the article
Tech

How Commercial Off-the-Shelf (COTS) Applications Can be Supported with XACML

Read the article
Tech

Leveraging Splunk to Aggregate Axiomatics Policy Server Log Data

Read the article
Business

How Dynamic Authorization Can Support GDPR Compliance

Read the article
Business

GDPR: A Driver for Digitalization

Read the article
Question of the Week

How Can I Use Time in a XACML Policy?

Read the article
Axiomatics Policy Server

Running Axiomatics Policy Server in the Cloud, Part 2: Amazon Web Services

Read the article
Axiomatics Policy Server

Running Axiomatics Policy Server in the Cloud

Read the article
Business

A GDPR Primer: What You Need to Know

Read the article
API

The Convergence of Personalization and Authorization

Read the article
Tech

How can many complex permit rules for the same XACML policy be managed?

When writing XACML policies, if you find yourself needing to put many targets and conditions into one rule, where all must be true in order to return a permit decision, you don’t have to put them all in the same rule - read this great "how-to" blog post.

Read the article
Access Control 101

Going on vacation, how can I implement delegation in XACML?

Read the article
Access Control

Externalized Dynamic Authorization in a [Micro]Services World Pt. 3

Read the article
Access Control

Externalized Dynamic Authorization in a [Micro]Services World Pt. 2

Read the article
Question of the Week

What is the main difference between XACML 3.0 and XACML 2.0?

Read the article
Access Control

Externalized Dynamic Authorization in a [Micro]Services World

Read the article