The Axiomatics technical teams across sales engineering, development and customer relations often engage with the Stack Overflow community to get insights and answers. They also contribute knowledge on access control and dynamic authorization. This question on access control models, asked by
In case you missed our press release on the Critical Data Security Trends for 2019, we're sharing the list here on the blog for the ease of our readers. What's on your priority list? We'd love to hear your feedback. More Data, More Devices and More Regulations Mean New Approaches to Data Security
We’ve been hearing a lot from our customers lately about the power of using APIs and microservices to expand business and speed time-to-market for new offerings. These new projects are almost always built using many different components and with that have complex security requirements – the
During Gartner’s recent IAM conference, I noticed an emerging conversation around the issues of API usage at the enterprise level. Enterprise adoption of APIs is viewed as an inevitable consequence of the ongoing digital transformation many IT professionals are managing. API stands for
Part 1: OAuth and OpenID Connect Come Together with Externalized Dynamic Authorization Want the fast track of dynamic authorization in a microservices world? Check out this webinar session. This is a multi-part series of articles describing why and how one can approach applying Externalized
Whether it’s via a mobile, laptop or desktop, in the cloud or on the ground, APIs have become the defacto method for connecting people with data. This is great news for users: access is much smoother and often instantaneous. But for administrators controlling sensitive data, and in particular
Common use case scenarios which the Axiomatics Professional Services Organization (PSO) frequently encounters are customer portals in various shapes and flavors. A common denominator in successful deployments is a structured and efficient approach to API management. As companies and
How ABAC works with an API Gateway Many insurance companies use Attribute Based Access Control (ABAC) solutions to enable partners or clients to directly manage their own information within the insurance company’s infrastructure. In this blog we’ll have a closer look at a typical deployment