Does the promise of attribute-based access control sound like magic? Don’t worry, you don’t need to be a wizard to write efficient and secure ABAC policies. In this bootcamp webinar, we will show you how you can easily write ABAC policies straight from within your IDE by using ALFA, the Abbreviated Language for Authorization. We will also look at deploying your policies to the Axiomatics Policy Server in the click of a button.
You will learn:
how to use ALFA to write simple authorization policies
how to structure your policies efficiently
simple best practices around ABAC policies
programmatically deploying policies to the Axiomatics Policy Server
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.
Axiomatics is an innovative and pioneering software company focused on helping large organizations put Authorization first. Our holistic policy management solution delivers the security, compliance and scalability needed to free up internal resource and concentrate on business growth. With customers in over 100 countries and across all industries, organizations trust Axiomatics to protect their data, assets, and processes.