Get Started Now! Achieving Attribute Based Access Control (ABAC) for Applications with XACML

The Axiomatics Policy Server delivers dynamic, fine-grained authorization for applications. It enables organizations to enforce corporate policies throughout an entire organization based on multiple attributes – when, where, how. why and who – inline with attribute based access control (ABAC). The latest edition of APS sees extensive new authorization capabilities, while a new Express edition is available for those who wish to get started now.

This webinar will look at the capabilities of XACML based authorization and what it can mean for your applications. It will also explore the new authorization features in APS and explain how you can implement ABAC into your organization on a single application with the Express Edition.

Following the webinar you will have an understanding of:

  • How XACML can be applied in the organization to achieve ABAC
  • How APS can be used to achieve advanced authorization on SQL statements
  • How APS can be used to effectively filter large data sets
  • How to get started with ABAC using the Express Edition

The webinar should appeal to Security officers, IT Managers, architects and developers.



Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.