ABAC101 Archives - Axiomatics
Axiomatics
  • Dynamic Authorization Suite
    • Applications
    • SmartGuard® for Data
    • Databases
    • APIs and Microservices
      • Amazon API Gateway Integration
      • Apigee Integration
      • Axway API Integration
      • CA API Gateway Integration
      • IBM DataPower Gateway Integration
      • Kong Community Integration
      • MuleSoft Integration
      • Oracle API Gateway Integration
    • IAM Ecosystem Integrations
    • Reporting & Governance
    • Expert Services
  • Developers Zone
  • Resources
    • About Us
    • Analyst Reports
    • Case Studies
    • Data Sheets
    • Industry Briefs
    • Infographics
    • Product Sheets
    • Tutorials
    • Use Cases
    • Webinars
    • White Papers
  • Solutions
    • Challenges
    • Industries
    • Roles
  • Axiomatics Federal, Inc.
  • Blog
  • About Us
    • The Company
    • Working at Axiomatics
    • Press Room
    • Events
    • Partners
    • Management
    • Corporate Social Responsibility
    • Contact Us

ABAC101

Home / ABAC101
Tech Monday, 30 September 2019Friday, 27 September 2019 by David Brossard

Protect What Matters Most: The Data — Part 2

Protect What Matters Most: The Data -- Part 2, Data-Centric Security Welcome to Part 2, of Protect What Matters Most: The Data. You can find Part 1 here, if you didn't catch it. A while back, my colleague, Gerry Gebel, and I delivered a webinar on the very topic of data-centric authorization.
Tech Tuesday, 10 September 2019Thursday, 19 September 2019 by Jonas Iggbom

The Power of Dynamic Data Masking and Dynamic Authorization

Most modern environments today handle large amounts of data. Typically the data is spread across different data sources such as relational databases or even a big data system or data lake. And within these massive data stores, therein lies data that is very sensitive and critical to
Tech Tuesday, 18 June 2019Friday, 05 July 2019 by Axiomatics

Authorize Like a Pro with Axiomatics + UMA – Guest Blog Post from Gluu

Today's blog post is a post from one of our partners, Gluu. The feature writer is Mike Schwartz. He has been an entrepreneur and identity specialist for more than two decades. He is the technical and business visionary behind Gluu. Mike is an application security expert and has been a
Access Control 101 Wednesday, 24 April 2019Wednesday, 24 April 2019 by Axiomatics

Stack Overflow: Creating a consistent authorization framework

How to solve the consistency problem of managing authorization of Single Page Application & .NET Core WebAPI? Question from Stack Overflow User Ishan Akin. We are currently developing a web application that has following architecture. A single page application based on
Tech Monday, 15 April 2019Thursday, 25 April 2019 by Jonas Iggbom

Dynamic Authorization to Redact Data in for the Apigee API Gateway

Introduction Extending the authorization capabilities of an API Gateway to use fine-grained dynamic authorization with the Axiomatics Policy Server is a common use case. There are several different aspects of authorization that are typically applied to API’s: Authorizing whether or not
Business Monday, 30 October 2017Thursday, 30 November 2017 by David Brossard

Securing Access to PII and EHR in a Digitized Health Care Environment

Patient Enablement / Self-service With respect to health care, a McKinsey report from late 2014 explains that health care IT is evolving at the same speed as other industries, and this will be no different in the future. McKinsey considers that more than 75% of all patients expect to use digital
Business Wednesday, 25 October 2017Thursday, 30 November 2017 by Gerry Gebel

Cybersecurity Week in Luxembourg

A week-long cybersecurity event in Luxembourg included Axiomatics’ participation in the PwC Cybersecurity Day last Thursday. Luxembourg City was a terrific host and provided a great setting to highlight the great effort on security topics that this city and country are working on. PwC put
ABAC Thursday, 20 April 2017Tuesday, 16 October 2018 by Brian Colaluca

Federal Mission: Dissemination and Information Sharing using ABAC

This Use Case, Federal Mission: Dissemination and Information Sharing using Attribute Based Access Control (ABAC), discusses how an ABAC model can be used to disseminate information between agencies widely and securely.  By using a fine-grained, ABAC implementation such as Axiomatics Policy Server
Axiomatics Policy Server Tuesday, 28 March 2017Thursday, 20 April 2017 by Jonas Iggbom

Running Axiomatics Policy Server in the Cloud

Part 1: How to Containerize Containerization is a trend we’ve seen at the enterprise level and among the federal government for some time now. If the term is new to you, here is a simple metaphor that explains why organizations are shifting towards this IT practice: Imagine the struggle of
Business Thursday, 04 February 2016Monday, 23 October 2017 by David Brossard

Securing Access to PII and EHR in a Digitized Health Care Environment

Patient enablement / self-service With respect to health care, a McKinsey report from late 2014 explains that health care IT is evolving at the same speed as other industries, and this will be no different in the future. McKinsey considers that more than 75% of all patients expect to use digital

Subscribe to the blog

  • Authors
  • Categories
  • Tags
Srijith NairSrijith Nair
AxiomaticsAxiomatics
Pablo GiambiagiPablo Giambiagi
David BrossardDavid Brossard
Jonas IggbomJonas Iggbom
Andres MartinelliAndres Martinelli
Gerry GebelGerry Gebel
Kelly SheltonKelly Shelton
Mike GoodMike Good
Niklas JakobssonNiklas Jakobsson
Brian ColalucaBrian Colaluca
Craig GilleyCraig Gilley
Jonas MarkströmJonas Markström
Jeffrey KleinJeffrey Klein
See More Authors
  • Business Tech Question of the Week Access Control Access Control 101 Architecture API Axiomatics Data Access Filter XACML The Company ABAC Health Insurance Safe Harbor Cross-Border Privacy API
  • Whats New What's New federal government events Dynamic Authorization data security Data Centric Security Cloud Authorization Attribute Based Access Control API Access Control ABAC101 ABAC 101 ABAC

Featured Posts

  • How OAuth is related to Attribute Based Access Control Tech Monday, 08 March 2021Monday, 08 March 2021 by Srijith NairHow OAuth is related to Attribute Based Access ControlWhat is Authorization? Authorization, also Read more...
  • Enterprise-Authorization-System Business Friday, 15 January 2021Wednesday, 03 February 2021 by Srijith NairModern Enterprise Authorization Management SystemGartner has an interesting article titled Read more...

Still have questions?

Send us an email at webinfo@axiomatics.com
Request a Demo

Axiomatics

  • Supplier Code of Conduct
  • Cookie Notice
  • Privacy Policy
  • Working at Axiomatics
  • It’s easy to contact Axiomatics!
  • Get Support
Copyright © 2013 - 2021 Axiomatics. All rights reserved.