White Papers
A Systematic Approach to Implementing Dynamic Authorization using Attribute Based Access Control
Attribute Based Access Control
Reports
Top 10 Misconceptions of a Policy-Based Approach
Attribute Based Access Control
DZone Feature: Secure Java REST APIs With JSON, XACML, and ALFA
XACML
Webinars
Authorization Made Simple: Using ALFA, REST, and JSON to Secure Applications
Access Control
Tutorials
Glossary of Terms: Understanding Attribute Based Access Control
This glossary includes terms defined for architecture, services, and key phrases related to Attribute Based Access Control and the Axiomatics Product Suite.
Webinars
Extending CA Single Sign-On with XACML Capabilities
Axiomatics CA Validated extension for CA Single Sign-On leverages Single Sign-On’s existing authorization capabilities and allows users to implement risk-intelligent policies that adapt with an organization’s changing IT environment. When used in combination, the solutions enable organizations to implement data governance with standards-based policies that control SOA and WAM. The CA Single Sign-On product is […]
Webinars
Axiomatics Back to Basics: ABAC 101
The benefits of Attribute Based Access Control (ABAC) for your organization. Attribute Based Access Control is the most robust, flexible and fine-grained solution that is ideal for access control challenges faced by today’s organizations. In this webinar, we’ll go back to the basics of ABAC. Key takeaways: Key elements of the ABAC approach Importance of policy […]
Webinars
Delivering Fine-Grained Authorization Today by Leveraging a Federated Identity Service and ABAC
A webinar with Axiomatics and Radiant Logic View the recording here: http://www.radiantlogic.com/learning-center/events/webinars/webinar-3312016/ A recent Gartner report predicts that by 2020, 70% of organizations will use Attribute-Based Access Control (ABAC) to protect critical assets, up from 5% today. We all know that ABAC—for fine-grained authorization, externalized and standards-based representation of policies—is the way to go. Along the way, […]
Webinars
Axiomatics Boot Camp – Managing Multiple Projects for Policy Authoring and Deployment
When using an Attribute Based Access Control approach, enterprises have varying requirements for segregation of an access control policy authoring and deployment architecture. These typically reflect their internal governance and compliance rules. For example, an enterprise may mandate that an employee associated with a specific department should not be able to view, much less edit, […]