+
2023 State of Authorization Report offers guidance on critical issues impacting authorization Learn more  
news reporter

Axiomatics Blog

Stay in the know on the latest in authorization, attribute-based access control (ABAC), and modernizing your access control strategy.



All articles
Tech

Using the Spring PEP SDK with Spring Boot & Thymeleaf for UI Security

Axiomatics provides a Policy Enforcement Point (PEP) Software Development Kit (SDK) for Spring Security. We can use this Spring Security SDK to easily restrict user interface (UI) items based on authorization in Thymeleaf.

Read the article
ABAC

Intro to Attribute Based Access Control (ABAC)

Authorization is about facilitating user access to the right data under the right conditions.One approach is Attribute Based Access Control, or ABAC.

Read the article
Business

Video Blog: Authorization Made Simple: Secure Applications with ALFA, REST, and JSON

In this video blog, Axiomatics discuss how easily authorization can be externalized from your apps, expressed as policies, and enforced consistently using ALFA, XACML, and the Axiomatics Policy Server. Learn the best way to secure your applications.

Read the article
Business

Axiomatics and Saviynt Partnership Brings Externalized Dynamic Authorization and Identity Governance and Administration Solutions Together

Axiomatics and Savyint, a leading provider of identity governance and cloud security solutions, recently announced a partnership that integrates the Axiomatics Dynamic Authorization suite with Saviynt’s Identity Governance and Administration (IGA) solutions.

Read the article
Business

The Build vs Buy Decision

To Build or to Buy - that is the question. Authorization of user access to data and applications is more important than ever.

Read the article
Business

IAM: The Glue That Holds It All Together

Identity & Access Management (IAM) is that glue. It brings you two things: a coherent, consistent Identity used across all services in a systematic way.

Read the article
Business

Applying ABAC to Cloud Technologies

Is your business or agency preparing to migrate to cloud technologies in 2018? Or have you already adopted the cloud and are looking for ways to enhance

Read the article
Business

Managing DevOps with Dynamic Authorization

Read the article
Business

Digital Transformation: Securing Customer-centric Initiatives

Read the article
Business

Securing Access to PII and EHR in a Digitized Health Care Environment

Read the article
Business

Why Layering Your Security is Important

Read the article
Business

Enhancing API Security: Dynamic Authorization to Protect Sensitive Data

Read the article
Business

Is Your Content Management System Putting You At Risk?

Read the article
Tech

How Commercial Off-the-Shelf (COTS) Applications Can be Supported with XACML

Read the article
Tech

Leveraging Splunk to Aggregate Axiomatics Policy Server Log Data

Read the article
Business

How Dynamic Authorization Can Support GDPR Compliance

Read the article
Business

GDPR: A Driver for Digitalization

Read the article
Question of the Week

How Can I Use Time in a XACML Policy?

Read the article
Axiomatics Policy Server

Running Axiomatics Policy Server in the Cloud, Part 2: Amazon Web Services

Read the article
Axiomatics Policy Server

Running Axiomatics Policy Server in the Cloud

Read the article
Business

A GDPR Primer: What You Need to Know

Read the article
API

The Convergence of Personalization and Authorization

Read the article
Tech

How can many complex permit rules for the same XACML policy be managed?

When writing XACML policies, if you find yourself needing to put many targets and conditions into one rule, where all must be true in order to return a permit decision, you don’t have to put them all in the same rule - read this great "how-to" blog post.

Read the article
Access Control 101

Going on vacation, how can I implement delegation in XACML?

Read the article