+
documents

Axiomatics Resources

Learn how our Orchestrated Authorization solution helps enterprises meet the needs of today's access control challenges.

All resources
Case Studies

Dynamic Authorization in the Banking and Finance industry

Dynamic Authorization addresses the most complex data access challenges for the Banking and Finance Industry. Read about a few use cases.

Learn more
Webinars

Improve security, consistency and enforce access rules across applications

Joint webinar with Axiomatics and Radiant Logic on how to improve security, consistency and enforce access rules across applications by ABAC and federated identity.

Learn more
Webinars

Speed, Privacy and Security – Getting to the Value of Data in Apache Spark

Axiomatics webinar: Speed, Privacy and Security - SmartGuard Apache Spark using SmartGuard for Data.

Learn more
Webinars

Modern Web Application Security for “Cloud First” Initiatives

Web Access Management (WAM) is critical to your organization because it’s often the hub of access. And so is your “Cloud First” strategy.

Learn more
Case Studies

Efficient enterprise-wide risk management and secure collaboration using ABAC

A major US automotive manufacturer was faced with a consolidation challenge for their authorization. They needed to move away from a home-grown solution.

Learn more
Webinars

Controlling Access to Business-Critical Data

In this webinar, Axiomatics experts reveal how to use dynamic authorization to secure the content of data stores.

Learn more
White Papers

A Systematic Approach to Implementing Dynamic Authorization using Attribute Based Access Control

An overview of protecting microservices and APIs with ABAC, OAuth and OpenID Connect - and how these standards work together.

Learn more
Webinars

Using the Power of Federated Identity and Dynamic Authorization to Streamline Access Control – with Radiant Logic

Joint webinar with Axiomatics and Radiant Logic: Using the Power of Federated Identity and Dynamic Authorization to Streamline Access Control.

Learn more
Solution Briefs

Axiomatics Policy Server Product Sheet

The Axiomatics Policy Server works seamlessly within a DevOps environment and is ideal for secure new application development. It solves legacy challenges such as role explosion, segregation of duties and entitlements management, as well as evolving compliance and privacy needs, API security and digital business.

Learn more
Webinars

5 Hidden Pitfalls of DIY Access Control Development and How to Avoid Them

Learn about building vs buying dynamic authorization software, including competitive, opportunity & risk associated costs.

Learn more
Case Studies

Granular Access Control for a Complex Business Model

In this Case Study, learn how a finance company for the renewables industry securely shares data throughout the complex delivery layers of a “B2B2C” model. The Company contracts third party organizations that perform sales, marketing, and product installation.

Learn more
White Papers

Top 10 Misconceptions of a Policy-Based Approach

At its core, a policy-based access control model (also referred to as Attribute Based Access Control or “ABAC”) is a concept any developer can understand. The phrase “access control” refers to application mechanisms that govern what each user can (or can’t) see and do...

Learn more
White Papers

Get to the Cloud Faster, and More Securely

As enterprises continue to migrate applications, services and workloads to the cloud, they are addressing the challenge of how to protect resources in an open, cloud environment while also securely sharing the right information. It's time to “future-proof” access control.

Learn more
Technical Guides

MuleSoft Anypoint Platform Integration

Combining MuleSoft’s leading API management solutions with Axiomatics’ dynamic authorization (ABAC) capabilities enables MuleSoft to accommodate a broader range of enterprise customer security requirements.

Learn more
Reference Library

Fine-grained Access Control (FGAC)

FGAC is central to dynamic authorization, ensuring sensitive data is only accessible to users under the right conditions laid out in a policy.

Learn more
Reference Library

Role-based Access Control (RBAC)

Role-based Access Control (RBAC) is the traditional, static way of enforcing access to critical assets.

Learn more
Reference Library

Policy-based Access Control (PBAC)

PBAC, also known as Attribute-based Access Control (ABAC), uses attributes to dynamically enforce access controls according to your policies.

Learn more
Reference Library

Attribute-based Access Control (ABAC)

Attribute Based Access Control (ABAC) is the de facto standard for safeguarding and securely sharing sensitive data.

Learn more
Reference Library

eXtensible Access Control Markup Language (XACML)

The standardized approach to dynamic authorization and Policy-based Access Control (PBAC).

Learn more
White Papers

Build vs Buy for Dynamic Authorization Solutions

When and why to consider investing in Dynamic Authorization software versus building your own in-house solution.

Learn more
White Papers

Technical Viewpoint: Protecting Microservices and APIs with ABAC, OAuth, and OpenID Connect

This Axiomatics Technical Viewpoint is an overview of protecting microservices and APIs with ABAC, OAuth and OpenID Connect - and how these standards work together to provide fine-grained access control.

Learn more
Webinars

Streamline Access Control with Federated Identity and ABAC

This webinar features Axiomatics and Radiant Logic, and discusses how to Streamline Access Control with Federated Identity and ABAC.

Learn more
Use Cases

Federal Mission: Applying ABAC to Your Cloud Migration

Learn more
Case Studies

European bank achieves proactive data security, compliance with ABAC

Learn how a global bank provided data security and achieved compliance with Attribute Based Access Control (ABAC). The bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only.

Learn more