Gartner has an interesting article titled "Modernize Your Runtime Authorization" that highlights some aspects you need from a modern enterprise authorization systems. Over the years I have seen several adjectives being used to describe an advanced authorization management system. These capture
I'm happy to share that we're ending the year with a release of the Axiomatics Data Access Filter for Multiple Databases. If you're not familiar with this solution, ADAF MD provides the ability to apply an Attribute Based Access Control approach to relational databases, featuring both Dynamic
The big data landscape is, not surprisingly, big. Matt Turck’s excellent blog (mattturck.com) has good coverage on the development in this area and captures how much the landscape has grown over the past few years. The figure below, created by Turck, captures the vendors in the Big Data
Spring Security, a project in the wider Spring framework, aims to provide an authentication and authorization framework around the core Spring. Having started its life as Acegi Security in 2003 before getting absorbed into the Spring framework, we recently saw the release of version 4 of Spring
In April 2016, Axiomatics introduced the Axiomatics Review Manager, a one-of-a-kind access review and reporting tool, that can confirm polices are enforced and compliance is met within dynamic authorization implementations with Axiomatics, that utilize an Attribute Based Access Control model
From its foundation, Axiomatics has been at the forefront of the authorization and access management technology movement. We have brought to to market solutions that are not only cutting edge, but also solve major issues faced by many large organizations that house and share sensitive information.
Earlier in the year we introduced the work we have been doing to provide our customers with a easy way to integrate the fine-grained, policy-based authorization capability provided by XACML with the powerful and enterprise-level Spring (Security) framework. Now, after several beta releases and
In this blog post we describe how the recent JSON and REST profiles of the XACML standard make it easier to use and to integrate with the externalized authorization services provided by the XACML Policy Decision Point (PDP). What is XACML? The eXtensible Access Control Markup Language (XACML)
First of all, we add the Teradata Database to the growing list of relational database systems that we support. We have had increased demand for providing strong policy-driven access control capability for Teradata databases, and with this release, we deliver on that request. In addition, with this
Spring takes away some of the great complexities of JEE and is a more light-weight and agile framework. It enables enterprise-level applications to be built with plain POJOs. But Spring also introduces dependency injection and inversion of control as important vehicles to help meet requirements