Access Control 101 Archives - Page 2 of 2 - Axiomatics
Axiomatics
  • Dynamic Authorization Suite
    • Applications
    • SmartGuard® for Data
    • Databases
    • APIs and Microservices
      • Amazon API Gateway Integration
      • Apigee Integration
      • Axway API Integration
      • CA API Gateway Integration
      • IBM DataPower Gateway Integration
      • Kong Community Integration
      • MuleSoft Integration
      • Oracle API Gateway Integration
    • IAM Ecosystem Integrations
    • Reporting & Governance
    • Expert Services
  • Developers Zone
  • Resources
    • About Us
    • Analyst Reports
    • Case Studies
    • Data Sheets
    • Industry Briefs
    • Infographics
    • Product Sheets
    • Tutorials
    • Use Cases
    • Webinars
    • White Papers
  • Solutions
    • Challenges
    • Industries
    • Roles
  • Axiomatics Federal, Inc.
  • Blog
  • About Us
    • The Company
    • Working at Axiomatics
    • Press Room
    • Events
    • Partners
    • Management
    • Corporate Social Responsibility
    • Contact Us

Access Control 101

Home / Access Control 101 / Page 2
Access Control 101 Friday, 19 September 2014Tuesday, 25 April 2017 by Finn Frisch

A technical view of the business case for Attribute Based Access Control (ABAC) – Part 1

How such high-level business requirements translate to ABAC on a technical level is not always obvious. The blog post series use a sample application to illustrate the difference between existing, often role based concepts, and ABAC to examine when the latter can be motivated. The application used
Access Control 101 Friday, 28 February 2014Wednesday, 07 June 2017 by David Brossard

Using ALFA Eclipse plugin to author XACML policies – Part 1

The scenario we will use is that of a car dealership company. In the company, purchase orders are deemed as sensitive resources and hence they need to be protected. The policies we will write will revolve around purchase orders. Let’s define some vocabulary. A purchase order has an identifier,
Access Control 101 Friday, 07 February 2014Wednesday, 07 June 2017 by David Brossard

Using XACML to apply fine-grained access control on Java Servlets with Filters

XACML Policy Enforcement Points A policy enforcement point (PEP) in the XACML architecture is responsible for: intercepting a business request (e.g. a user web request to a backend servlet) creating an authorization request using any number of attributes available from the business request and
Access Control 101 Wednesday, 18 September 2013Tuesday, 25 April 2017 by Srijith Nair

Short introduction to Access Control – Part 2

XACML standard covers three major parts: Reference Architecture: The standard proposes reference architecture with commonly accepted names for the various entities involved in the architecture. Policy Language: The standard defines syntax for the language used to write access control rules and
Access Control 101 Tuesday, 10 September 2013Tuesday, 25 April 2017 by Srijith Nair

Short introduction to Access Control – Part 1

(Short) Story of Access Control Access control can be thought of as a way to selectively restrict access to a specific resource. The actual process of obtaining the access to the resource is know as authorization. Over the course of several decades, several models of access control systems have
Previous12

Subscribe to the blog

  • Authors
  • Categories
  • Tags
Srijith NairSrijith Nair
AxiomaticsAxiomatics
Pablo GiambiagiPablo Giambiagi
David BrossardDavid Brossard
Jonas IggbomJonas Iggbom
Andres MartinelliAndres Martinelli
Gerry GebelGerry Gebel
Kelly SheltonKelly Shelton
Mike GoodMike Good
Niklas JakobssonNiklas Jakobsson
Brian ColalucaBrian Colaluca
Craig GilleyCraig Gilley
Jonas MarkströmJonas Markström
Jeffrey KleinJeffrey Klein
See More Authors
  • Business Tech Question of the Week Access Control Access Control 101 Architecture API Axiomatics Data Access Filter XACML The Company ABAC Health Insurance Safe Harbor Cross-Border Privacy API
  • Whats New What's New RBAC events Dynamic Authorization data security Data Centric Security Cloud Authorization Attribute Based Access Control API Access Control ABAC101 ABAC 101 ABAC

Featured Posts

  • Enterprise-Authorization-System Business Friday, 15 January 2021Monday, 18 January 2021 by Srijith NairModern Enterprise Authorization Management SystemGartner has an interesting article titled Read more...
  • Mastering GDPR and CCPA Compliance with Dynamic Authorization Business Tuesday, 03 November 2020Monday, 18 January 2021 by AxiomaticsMastering GDPR and CCPA Compliance with Dynamic AuthorizationGlobal regulatory legislation is a headache for Read more...

Still have questions?

Send us an email at webinfo@axiomatics.com
Request a Demo

Axiomatics

  • Supplier Code of Conduct
  • Cookie Notice
  • Privacy Policy
  • Working at Axiomatics
  • It’s easy to contact Axiomatics!
  • Get Support
Copyright © 2013 - 2021 Axiomatics. All rights reserved.