Video Blog-Moving Beyond Identity-Based Access Control
Axiomatics’ solutions implement Attribute Based Access Control (ABAC). This means that, when processing an access control request, digital rules can be evaluated to consider the attributes of the requestor, the attributes of the requested resource, and the attributes of the environment. This combination of attributes lends context to the access control request and is where the powerful advantages of ABAC really shine.
For example, in a Role Based Access Control (RBAC) model, a user identity is required for making static access control decisions. While ABAC often incorporates user attributes in making access control decisions, identities are not necessarily required. With ABAC, run-time access control decisions can be made based on existing environment variables.