Does the promise of attribute-based access control sound like magic? Don’t worry, you don’t need to be a wizard to write efficient and secure ABAC policies. In this bootcamp webinar, we will show you how you can easily write ABAC policies straight from within your IDE by using ALFA, the Abbreviated Language for Authorization. We will also look at deploying your policies to the Axiomatics Policy Server in the click of a button.
You will learn:
how to use ALFA to write simple authorization policies
how to structure your policies efficiently
simple best practices around ABAC policies
programmatically deploying policies to the Axiomatics Policy Server
Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.