Axiomatics is the leader in dynamic authorization solutions.

Wait, what's dynamic authorization?

Why Customers Choose Axiomatics


The employees at Axiomatics are thought leaders and dynamic authorization experts, and authors of industry-standard access control language. We hold over 25 patents on our technology.

Learn More

Customer and Partner Approved

Many Fortune 500 and government agencies already trust Axiomatics to protect their critical assets. Our on-premise and cloud-ready software easily integrates with other IAM technology and can work within existing infrastructure.

Learn More

Best-in-Class Software

With an average 10x gains in authorization response and 100 fold ROI on development time, our customers rave about our performance, stability and quality.

Learn More

What our Customers are Saying

What's New

CloudPOST Feature: Establishing a Secure Cloud Infrastructure with Dynamic Authorization


By David Brossard for CloudPOST Today, it is imperative for businesses to increase

DZone Feature: The Journey Toward Securing the Cloud


by Gerry Gebel for If you are in the process of moving to the cloud or still in the

Axiomatics and XMS Solutions Form Strategic Reseller Partnership


XMS will offer the Axiomatics Dynamic Authorization Suite for SharePoint, applications, data

DZone Feature: Secure Java REST APIs With JSON, XACML, and ALFA


How to use a JSON XACML Policy Enforcement Point to secure REST API endpoints using ALFA, XACML,

Axiomatics Launches Dynamic Authorization Extension for Microsoft® SharePoint


European Launch in Collaboration with Leading Consultancy, Knowit Secure AB STOCKHOLM – May 15,

The Build vs Buy Decision


Authorization of user access to data and applications is more important than ever - and enterprises

Executive Spotlight: Interview with Erika Boije, VP Engineering at Axiomatics


After more than a decade as a consultant, and then CTO of a mobile payment company, Erika Boije

A Look Back at EIC 2018


Last week we exhibited at the 2018 European Identity & Cloud Conference in Munich. For the

Why You Need Both Authorization and Authentication


How to effectively manage IAM controls to secure critical assets In previous posts I have

European Identity & Cloud Conference 2018


We're currently exhibiting at the 2018 European Identity & Cloud Conference in Munich. The

Securing APIs and Microservices with ABAC, OAuth, and OIDC


Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary

Build vs Buy for Dynamic Authorization Solutions


When making a Build vs Buy decision for IAM and dynamic authorization, you must take into account

Authorization Made Simple: Using ALFA, REST, and JSON to Secure Applications


In this webinar, Jonas Iggbom and David Brossard of Axiomatics discuss how easily authorization can

Build vs Buy for Dynamic Authorization Solutions


When should you consider investing in Dynamic Authorization software versus building your own

Technical Viewpoint: Protecting Microservices and APIs with ABAC, OAuth, and OpenID Connect


Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary

Secure your critical assets with dynamic authorization.


The fastest, most accurate and most comprehensive dynamic and externalized authorization solution available.

Read more


Policy-driven dynamic data filtering and masking for relational databases, on-premise and in the cloud.

Read more

Big Data & Cloud

Dynamic authorization for data in HADOOP systems and in the cloud.

Read more

APIs & Microservices

Fine-grained authorization easily connected to API Gateways and Microservice architectures.

Read more

Reporting & Governance

Certify your authorization policies; and identify and close security gaps in your authorization.

Learn more

See the Axiomatics Products in Action

Request a Demo

Still have questions?

Send us an email at