The Axiomatics technical teams across sales engineering, development and customer relations often engage with the Stack Overflow community to get insights and answers. They also contribute knowledge on access control and dynamic authorization. This question on Alternatives for Roles/Claims
Axiomatics’ Vice President of Business Development, Gerry Gebel, was interviewed by Cynthia Artin on the intersection of Federated Identity Management with Dynamic Authorization. The virtualization of nearly everything digital is pushing more and more applications, services, storage, and compute
Today’s blog is a deep dive on various types of access control. I’ll be reviewing the differences between Expression-Based Access Control, Role Based Access Control (RBAC), and Attribute Based Access Control (ABAC), with a deeper focus on how we can use Expression-Based Access Control and
Our partner, IDF Connect, recently announced an exciting new product release for SSO/Rest™ 3.1, the first stand-alone, Zero Trust Access Management solution designed explicitly for the modern, cloud-centric era. This new release integrates the Axiomatics Policy Server, the fastest, most
Is your business preparing to move to the cloud? Or have you already adopted the cloud and are looking for ways to enhance cloud security and protect your company resources? As organizations trend towards cloud environments, new challenges and opportunities arise. A significant challenge is how to
The promise of secure DevOps can be realized through security technologies such as dynamic authorization Fundamentally, DevOps is all about speed and agility. Customers expect companies to deliver and update applications at an accelerated pace and businesses must adopt modern technologies to meet
We recently announced our partnership with MuleSoft and the new integration with their Anypoint Platform™. Axiomatics now augments existing access control with a customizable API access control policy. Combining MuleSoft’s API management solutions with Axiomatics’ Attribute Based Access
Given the popularity of APIs and microservice-based application development, it is no surprise that API security is also a topic of great interest. Many events centered around API security are emerging, and API World is one such conference that caught my interest. This year, API World invited
We are living in a data-driven world where organizations rely on data for virtually everything. Businesses across every vertical have become reliant on data for day-to-day business operations by collecting and analyzing massive amounts of data, seeking insights and trends that were previously
Organizations can enable end-to-end API security with OAuth, OpenID Connect and ABAC Modern technology is constantly making our lives easier. Our phones and the applications we use make it more convenient to work, play and listen. If you need door-to-door ground transportation, you can access a