Learn how to approach applying Externalized Dynamic Authorization to an API and/or microservices architecture that uses OAuth 2.0 flows and/or OpenID Connect (OIDC), with this Axiomatics Primer on the basics of OAuth and OpenID Connect.

Download


Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and collaboration slow down the research process and delay the launch of new products.

However implementing an effective data share approach can be extremely complex through a combination of business, security, privacy and regulatory concerns. It involves not only providing secure access to the data sets that an end user is entitled to view, but also limiting access to specific pieces of information within the data sets.

Download

IAM teams in the federal government are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements.

ABAC is an access control approach that is recommended by NIST and discussed in their Guide to Attribute Based Access Control (ABAC) Definition and Considerations (NIST Special Publication 800-162) document. With ABAC, the use of subject, environment, and resource attributes is virtually unlimited.

Instead of taking into account only role, other user attributes such as title, organization, geographic location, authentication information, and so forth can be used in conjunction with digital policies to make access control decisions.

This paper will explain how ABAC fits into an existing IAM framework for the federal government. 

Get Your Copy

IAM teams are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements.

ABAC is an access control approach that is recommended by NIST and discussed in their Guide to Attribute Based Access Control (ABAC) Definition and Considerations (NIST Special Publication 800-162) document. With ABAC, the use of subject, environment, and resource attributes is virtually unlimited.

Instead of taking into account only role, other user attributes such as title, organization, geographic location, authentication information, and so forth can be used in conjunction with digital policies to make access control decisions.

This paper will explain how ABAC fits into an existing IAM framework. 

Get Your Copy

Access control has gone beyond simply need-to-know to include need-to-share authorization.

Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few. But that’s changed as companies want to get more from their data and make it really work for the. Authorization is now about facilitating user access to the right data under the right conditions.

This paper covers the foundational elements of Attribute Based Access Control and introduces this new evolution in access control. 

Download the White Paper

In this whitepaper, you'll learn why Role Based Access Control must evolve. Enter ABAC.

ABAC builds upon existing roles, and expands the range of attributes used in the authorization process, while utilizing a context-rich policy language that easily caters to both simple and complex use cases. Download this paper to learn more

Get Your Copy