Srijith Nair, Author at Axiomatics - Page 2 of 2
Axiomatics
  • Dynamic Authorization Suite
    • Applications
    • SmartGuard® for Data
    • Databases
    • APIs and Microservices
      • Amazon API Gateway Integration
      • Apigee Integration
      • Axway API Integration
      • CA API Gateway Integration
      • IBM DataPower Gateway Integration
      • Kong Community Integration
      • MuleSoft Integration
      • Oracle API Gateway Integration
    • IAM Ecosystem Integrations
    • Reporting & Governance
    • Expert Services
  • Developers Zone
  • Resources
    • About Us
    • Analyst Reports
    • Case Studies
    • Data Sheets
    • Industry Briefs
    • Infographics
    • Product Sheets
    • Tutorials
    • Use Cases
    • Webinars
    • White Papers
  • Solutions
    • Challenges
    • Industries
    • Roles
  • Axiomatics Federal, Inc.
  • Blog
  • About Us
    • The Company
    • Working at Axiomatics
    • Press Room
    • Events
    • Partners
    • Management
    • Corporate Social Responsibility
    • Contact Us

Srijith Nair

Home / Archives for Srijith Nair / Page 2
Access Control Friday, 12 June 2015 by Srijith Nair

Integrating XACML into Spring Security

Spring takes away some of the great complexities of JEE and is a more light-weight and agile framework. It enables enterprise-level applications to be built with plain POJOs. But Spring also introduces dependency injection and inversion of control as important vehicles to help meet requirements
Access Control Monday, 16 February 2015 by Srijith Nair

Getting OWASP Top 10 Right with Dynamic Authorization

This is a joint post with Gunnar Peterson. Gunnar (@oneraindrop) is a Managing Principal at Arctec Group. He focuses on security architecture consulting and training. Experience includes Associate Editor for IEEE Security & Privacy Journal, a contributor to the DHS Build Security In portal on
Business Friday, 23 May 2014Tuesday, 25 April 2017 by Srijith Nair

Webinar recordings, presentation and ALFA news

David Brossard gave a presentation at the European Identity Conference OASIS workshop, where he looked at externalized authorization, attribute-based access control (ABAC) and XACML and how it can help implement privacy regulations. You can find the slides of the presentation
Business Friday, 23 May 2014Monday, 24 September 2018 by Srijith Nair

Webinar recordings, presentation and ALFA news

A quick post to summarize some developments and webinars that have taken place recently. Axiomatics has decided to make its domain specific authorization language ALFA publicly available by donating it to OASIS Standards consortium as a XACML profile. More details can be found in our press
Tech Thursday, 09 January 2014Wednesday, 23 May 2018 by Srijith Nair

Custom claims-based authorization in .NET using Axiomatics PEP SDK for .NET

Implementation of the custom ClaimsAuthorizationManager The custom authorization manager should derive from ClaimsAuthorizationManager and the only method that must be implemented is CheckAccess. As a result, the simplest, minimal implementation looks like the following: To make things
Tech Thursday, 09 January 2014Wednesday, 23 May 2018 by Srijith Nair

Custom claims-based authorization in .NET using Axiomatics PEP SDK for .NET

Implementation of the custom ClaimsAuthorizationManager The custom authorization manager should derive from ClaimsAuthorizationManager and the only method that must be implemented is CheckAccess. As a result, the simplest, minimal implementation looks like the following: To make things
Access Control Tuesday, 26 November 2013Thursday, 16 November 2017 by Srijith Nair

XACML Language Structure

This is the second in the series of blog posts that covers the basics of XACML. The previous post covered the XACML reference architecture, specifically looking at the flow of control across the various entities of the architecture (PEP, PDP, PIP, PRP, PAP). This post will cover the XACML policy
Architecture Tuesday, 19 November 2013Wednesday, 01 November 2017 by Srijith Nair

XACML Reference Architecture

In this post we will dive deeper into the architecture of XACML, one of the core aspects of the standard. XACML stands for eXtensible Access Control Markup Language. It is the OASIS standard for fine-grained authorization management based on the concept of Attribute-based access control (ABAC),
Access Control 101 Wednesday, 18 September 2013Tuesday, 25 April 2017 by Srijith Nair

Short introduction to Access Control – Part 2

XACML standard covers three major parts: Reference Architecture: The standard proposes reference architecture with commonly accepted names for the various entities involved in the architecture. Policy Language: The standard defines syntax for the language used to write access control rules and
Access Control 101 Tuesday, 10 September 2013Tuesday, 25 April 2017 by Srijith Nair

Short introduction to Access Control – Part 1

(Short) Story of Access Control Access control can be thought of as a way to selectively restrict access to a specific resource. The actual process of obtaining the access to the resource is know as authorization. Over the course of several decades, several models of access control systems have
Previous12

Subscribe to the blog

  • Authors
  • Categories
  • Tags
Srijith NairSrijith Nair
AxiomaticsAxiomatics
Pablo GiambiagiPablo Giambiagi
David BrossardDavid Brossard
Jonas IggbomJonas Iggbom
Andres MartinelliAndres Martinelli
Gerry GebelGerry Gebel
Kelly SheltonKelly Shelton
Mike GoodMike Good
Niklas JakobssonNiklas Jakobsson
Brian ColalucaBrian Colaluca
Craig GilleyCraig Gilley
Jonas MarkströmJonas Markström
Jeffrey KleinJeffrey Klein
See More Authors
  • Business Tech Question of the Week Access Control Access Control 101 Architecture API Axiomatics Data Access Filter XACML The Company ABAC Health Insurance Safe Harbor Cross-Border Privacy API
  • Whats New What's New federal government events Dynamic Authorization data security Data Centric Security Cloud Authorization Attribute Based Access Control API Access Control ABAC101 ABAC 101 ABAC

Featured Posts

  • How OAuth is related to Attribute Based Access Control Tech Monday, 08 March 2021Monday, 08 March 2021 by Srijith NairHow OAuth is related to Attribute Based Access ControlWhat is Authorization? Authorization, also Read more...
  • Enterprise-Authorization-System Business Friday, 15 January 2021Wednesday, 03 February 2021 by Srijith NairModern Enterprise Authorization Management SystemGartner has an interesting article titled Read more...

Still have questions?

Send us an email at webinfo@axiomatics.com
Request a Demo

Axiomatics

  • Supplier Code of Conduct
  • Cookie Notice
  • Privacy Policy
  • Working at Axiomatics
  • It’s easy to contact Axiomatics!
  • Get Support
Copyright © 2013 - 2021 Axiomatics. All rights reserved.