+
CrowdStrike joins the Axiomatics partner community with risk-based authorization for enterprise Learn more  
news reporter

Axiomatics Blog

Stay in the know on the latest in authorization, attribute-based access control (ABAC), and modernizing your access control strategy.



All articles
XACML

Is ALFA a part of the OASIS XACML Technical Committee series of standards?

Read the article
Business

Can Dynamic Authorization Help Resolve Manufacturers’ Security Concerns About IoT?

Read the article
Business

Solving the Manufacturing Data Protection Triangle

Read the article
Question of the Week

How Does a Policy Decision Point Load a New Policy?

Read the article
Question of the Week

Is It a Good Practice to Use SQL Views for Policy Information Points?

Read the article
Business

Cloud Identity Summit 2016

Read the article
Question of the Week

Should the Policy Enforcement Point Send All Attributes Needed to Evaluate a Request?

Read the article
Business

ABAC, part and parcel of an effective anti-fraud program

Read the article
Question of the Week

How Do I Check for the Presence of an Attribute?

Read the article
Question of the Week

What are the Possible XACML REST PDP Response Codes?

Read the article
Question of the Week

When Should I Use an XACML Condition?

When Should I Use a XACML Condition? There are a few use cases when conditions are important. The Relationship: The main driver for using conditions is the ability to implement relationships. Relationships are in fact one of the main drivers for XACML and ABAC.

Read the article
Question of the Week

How Can I Use Booleans in a XACML Target?

Read the article
Question of the Week

Does the JSON profile for XACML support MDP

Read the article
Business

Compliance in the Financial Sector: Driving Transformational Change From the Inside Out

Read the article
Business

5 Burning Issues in the Financial Services Industry and How ABAC Can Help

Read the article
Access Control

Access Control for HL7 and the Health Care industry

Read the article
Business

Eliminating Toxic Combinations with ABAC

Read the article
Business

Six Key Reasons why you need to protect EHR with Dynamic Authorization Today

Read the article
Business

Securing Access to PII and EHR in a Digitized Health Care Environment

Read the article
Tech

Obligations and Advice in XACML part 2

Obligations and Advice in XACML: the way the PDP calculates the obligations (or advice) that correspond to a decision.

Read the article