Download your copy of our State of Authorization: Playbook Edition Get it now »
folder tree

Axiomatics Resources

Learn how our Orchestrated Authorization solution helps enterprises meet the needs of today's access control challenges.

All resources
Reference Library

Attribute-based Access Control (ABAC)

Attribute Based Access Control (ABAC) is the de facto standard for safeguarding and securely sharing sensitive data.

Learn more
Reference Library

eXtensible Access Control Markup Language (XACML)

The standardized approach to dynamic authorization and Policy-based Access Control (PBAC).

Learn more
White Papers

Build vs Buy for Dynamic Authorization Solutions

When and why to consider investing in Dynamic Authorization software versus building your own in-house solution.

Learn more
White Papers

Technical Viewpoint: Protecting Microservices and APIs with ABAC, OAuth, and OpenID Connect

This Axiomatics Technical Viewpoint is an overview of protecting microservices and APIs with ABAC, OAuth and OpenID Connect - and how these standards work together to provide fine-grained access control.

Learn more
Case Studies

European bank achieves proactive data security, compliance with ABAC

Learn how a global bank provided data security and achieved compliance with Attribute Based Access Control (ABAC). The bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only.

Learn more
Solution Briefs

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, simplifies data access for over 175,000 user accounts.

Learn more
Reports

6 Alarming Facts About Electronic Health Records

In the the case of healthcare and insurance providers, Electronic Health Records (EHR) contain even more valuable information than most data sources due to the sensitive and detailed nature of the information.

Learn more
Use Cases

Security Compliance Using Externalized Authorization

Guidance on conducting an organizational IT risk assessment and a template for determining what type of security controls are recommended.

Learn more
Fact Sheets

5 Fast Facts for API Access Control

Download our fact sheet to learn the five key API access control facts – along with a little help on how to address them.

Learn more
Solution Briefs

Why Axiomatics?

Dynamic Authorization solutions from Axiomatics enables accelerated digital transformation, greater business agility and responsiveness, effective governance, and an improved customer experience:

Learn more
Solution Briefs

Protect Critical Data and Enable Collaboration with ABAC

Attribute Based Access Control, known in brief as ABAC, is quickly becoming the standard model for organizations confronted by the need for a robust and flexible solution to today’s increasingly complex security demands.

Learn more
Solution Briefs

Why Externalized Authorization? (for Federal Government)

The Attribute Based Access Control (ABAC) model provides Externalized Dynamic Authorization by leveraging the principle that software code should be decoupled based on the function it serves. Instead of delivering applications with authorization hard-coded...

Learn more
Use Cases

Axiomatics Policy Server for the Federal Government Product Sheet

Learn more
Case Studies

Bell: Cutting through the Code to Meet Export Control Regulations

Learn more
Solution Briefs

Five Ways to Prepare for an ABAC Program

Learn more
Case Studies

Danish Defence – A Secure Solution for Sharing Information Electronically

Learn more