
Axiomatics Blog
Stay in the know on the latest in authorization, attribute-based access control (ABAC), and modernizing your access control strategy.
All articles
Using the Spring PEP SDK with Spring Boot & Thymeleaf for UI Security
Axiomatics provides a Policy Enforcement Point (PEP) Software Development Kit (SDK) for Spring Security. We can use this Spring Security SDK to easily restrict user interface (UI) items based on authorization in Thymeleaf.
Read the articleIntro to Attribute Based Access Control (ABAC)
Authorization is about facilitating user access to the right data under the right conditions.One approach is Attribute Based Access Control, or ABAC.
Read the articleVideo Blog: Authorization Made Simple: Secure Applications with ALFA, REST, and JSON
In this video blog, Axiomatics discuss how easily authorization can be externalized from your apps, expressed as policies, and enforced consistently using ALFA, XACML, and the Axiomatics Policy Server. Learn the best way to secure your applications.
Read the articleAxiomatics and Saviynt Partnership Brings Externalized Dynamic Authorization and Identity Governance and Administration Solutions Together
Axiomatics and Savyint, a leading provider of identity governance and cloud security solutions, recently announced a partnership that integrates the Axiomatics Dynamic Authorization suite with Saviynt’s Identity Governance and Administration (IGA) solutions.
Read the articleThe Build vs Buy Decision
To Build or to Buy - that is the question. Authorization of user access to data and applications is more important than ever.
Read the articleIAM: The Glue That Holds It All Together
Identity & Access Management (IAM) is that glue. It brings you two things: a coherent, consistent Identity used across all services in a systematic way.
Read the articleApplying ABAC to Cloud Technologies
Is your business or agency preparing to migrate to cloud technologies in 2018? Or have you already adopted the cloud and are looking for ways to enhance
Read the articleDigital Transformation: Securing Customer-centric Initiatives
Securing Access to PII and EHR in a Digitized Health Care Environment
Enhancing API Security: Dynamic Authorization to Protect Sensitive Data
Is Your Content Management System Putting You At Risk?
How Commercial Off-the-Shelf (COTS) Applications Can be Supported with XACML
Leveraging Splunk to Aggregate Axiomatics Policy Server Log Data
How Dynamic Authorization Can Support GDPR Compliance
How Can I Use Time in a XACML Policy?
Running Axiomatics Policy Server in the Cloud, Part 2: Amazon Web Services
Running Axiomatics Policy Server in the Cloud
How can many complex permit rules for the same XACML policy be managed?
When writing XACML policies, if you find yourself needing to put many targets and conditions into one rule, where all must be true in order to return a permit decision, you don’t have to put them all in the same rule - read this great "how-to" blog post.
Read the article