Get Started Now! Achieving Attribute Based Access Control (ABAC) for Applications with XACML

The Axiomatics Policy Server delivers dynamic, fine-grained authorization for applications. It enables organizations to enforce corporate policies throughout an entire organization based on multiple attributes – when, where, how. why and who – inline with attribute based access control (ABAC). The latest edition of APS sees extensive new authorization capabilities, while a new Express edition is available for those who wish to get started now.

This webinar will look at the capabilities of XACML based authorization and what it can mean for your applications. It will also explore the new authorization features in APS and explain how you can implement ABAC into your organization on a single application with the Express Edition.

Following the webinar you will have an understanding of:

  • How XACML can be applied in the organization to achieve ABAC
  • How APS can be used to achieve advanced authorization on SQL statements
  • How APS can be used to effectively filter large data sets
  • How to get started with ABAC using the Express Edition

The webinar should appeal to Security officers, IT Managers, architects and developers.

 

 

Other Resources

Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.