A Systematic Approach to Implementing Dynamic Authorization using Attribute Based Access Control

“That sounds hard.” Shifting to a new way of managing access control requires a new way of thinking. But the approach is straighforward. This paper will break down the process into digestible, easy-to-implement steps as you switch to a policy-based approach, and upgrade your legacy role-based system. In RBAC, users are assigned roles and roles […]

Axiomatics Policy Server Product Sheet

The Axiomatics Policy Server is the industry-leading solution to control access to critical applications. Using externalized dynamic authorization, it provides the most efficient policy engine on the market, and the most complete solution available for enterprise-wide roll out of Policy and Attribute Based Access Control (PBAC and ABAC). With on-premise, hybrid and cloud-native capabilities, this […]

Axiomatics Policy Server Data Sheet

The Axiomatics Policy Server (APS) provides a complete authorization infrastructure that scales with the needs of the enterprise. Its dynamic authorization capabilities have been designed to address the access-control needs of a broad range of systems and organizations. This is a technical data sheet. The Axiomatics Policy Server is the industry-leading solution to control access […]

Top 10 Misconceptions of a Policy-Based Approach

Even for senior software developers, wading into the world of IAM (Identity & Access Management) and access control can be daunting. Making your way through the acronyms is a chore in and of itself — RBAC, ABAC, PBAC, XACML, SAML, etc. Then, you must wrap your head around the complexities of roles, permissions, attributes and so […]

Authorization Made Simple: Using ALFA, REST, and JSON to Secure Applications

As more companies across all industries develop more applications, the challenge of securing those applications becomes more complex. In this webinar, Jonas Iggbom and David Brossard of Axiomatics discuss how easily authorization can be externalized from your apps, expressed as policies, and enforced consistently using ALFA, XACML, and the Axiomatics Policy Server. Fill out the […]

KuppingerCole Report – Executive View: Axiomatics Policy Server

The Axiomatics Policy Server (APS) has been named among the leading access control solutions for its outstanding features according to KuppingerCole in this Executive View report. Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization’s breadth of access control needs. APS makes available a suite of tools and services to manage […]

SmartGuard® for Data Demo

The security risk of data stores is emerging as a threat, and data breaches will be bigger than ever – with even more data at stake. Privacy issues are compounded, and legacy access control issues just get bigger: -Role explosion with one dimensional role-based systems -Inability to capture complex policy requirements, such as segregation of […]

Glossary of Terms: Understanding Attribute Based Access Control

This glossary includes terms defined for architecture, services, and key phrases related to Attribute Based Access Control and the Axiomatics Product Suite.

Axiomatics Data Access Filter for Multiple Databases – Product Sheet

Get to the heart of access control, with policy-based authorization applied on the content of relational databases. The Axiomatics Data Access Filter for Multiple Databases derives user permissions from real-time evaluation of policies, and can filter, mask or redact based on these same policies. This data-centric security approach provides the visibility and control required in today’s […]

SC Media Feature: Writing Authorization Policies to Secure Big Data

“Enforcing authorization directly at the data level can be incredibly powerful as it could mean minimal or no changes to the applications that are accessing the data itself,” says Jonas Iggbom. In the digital age, enterprises are accumulating and storing massive amounts of data. The more data an enterprise has stored, the more critical it […]

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, stores and manages data with access in mind for over 175,000 user accounts. Over the past 50 years, the company has solved difficult technical problems for this population with innovative, forward-thinking solutions. With time however, the company had outgrown its systems, […]

KuppingerCole Report – Executive View: Axiomatics Data Centric Security

KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled. The report sheds light on two flagship products: Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control […]

Empower the New Identity Architecture: Combine a Federated Identity Service with Attribute Based Access Control (ABAC)

In today’s complex identity infrastructures, flexibility has become an essential requirement. The rise of cloud-based platforms, SaaS applications along with other industry trends such as Internet of Things (IoT), and Big Data has added to the number of distributed identity silos that enterprises must manage. Implementing fine-grained access control across a wider array of sensitive […]

KuppingerCole Executive View: Axiomatics Policy Management Suite

The Axiomatics Policy Management suite provides a solution for companies wanting to provide fine grained access control to protected resources. This means evaluating a user’s access request, at runtime, against pre-determined policies to either permit or deny the user’s request. Applications then apply the decision. The Axiomatics Policy Suite was featured in this Leadership Compass […]

Why Axiomatics?

As the global independent leader in Dynamic Authorization solutions, our people, expertise, and our best-in-class software set us apart. Customers come to us to solve complex use cases around access control to applications, databases, Big Data, microservices, and APIs. Through a policy-based approach to dynamic authorization that utilizes the Attribute Based Access Control (ABAC) model, […]

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the NIST Special Publication 800-53. Both documents, in combination, “ensure that appropriate security requirements and security controls are applied to all federal information and information systems.” These documents offer guidance on […]

What is Attribute Based Access Control?

Protect Critical Assets and Enable Information Sharing What is Attribute Based Access Control? Access control has gone beyond simply need-to-know to include need-to-share authorization. Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few. But that’s changed as companies want […]

The Basics of Attribute Based Access Control (ABAC)

Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few. But that’s changed as companies want to get more from their data and make it really work for them. Authorization is now about facilitating user access to the right data […]

Why Externalized Authorization? (for Federal Government)

“What will my organization gain from externalized authorization?” It’s a question our team hears often. Axiomatics understands our dynamic world that requires organizations to be more responsive. Typically, information and application access policies are hard coded into the application. That requires many months of coding efforts and man hours to make any policy changes, which no […]

Axiomatics Dynamic Authorization

Unified Dynamic Authorization: Enterprise Access Control, Anywhere, anytime.  Axiomatics provides externalized authorization through attribute and policy-based access control for applications, databases, Big Data, APIs and microservices. As the premier vendor in authorization, Axiomatics solutions are ideal for enterprises and government agencies that need to securely share information, while complying with complex and ever-evolving regulations. The Axiomatics […]

KuppingerCole Leadership Compass 2014

The Axiomatics Policy Server was featured in this Leadership Compass from KuppingerCole, by analyst Graham Williamson: Dynamic Authorization Management: Leaders in innovation, product features, and market reach for Dynamic Authorization Management. Your compass for finding the right path in the market. Axiomatics provides a sophisticated policy management environment. It divides policies into domains and allows a […]

KuppingerCole Executive View: Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

Authorization for Big Data: Introducing SmartGuard

Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by the various business and technical insights derived from the use of these systems, they depend on the quantity and quality of data and information captured in them. As more sensitive […]

Axiomatics Back to Basics: ABAC 101

The benefits of Attribute Based Access Control (ABAC) for your organization. Attribute Based Access Control is the most robust, flexible and fine-grained solution that is ideal for access control challenges faced by today’s organizations. In this webinar, we’ll go back to the basics of ABAC. Key takeaways: Key elements of the ABAC approach Importance of policy […]

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

A Webinar with Axiomatics and IAM Analysts KuppingerCole: Take me to recording Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute Based Access Control (ABAC). ABAC solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments […]

Delivering Fine-Grained Authorization Today by Leveraging a Federated Identity Service and ABAC

A webinar with Axiomatics and Radiant Logic View the recording here: http://www.radiantlogic.com/learning-center/events/webinars/webinar-3312016/ A recent Gartner report predicts that by 2020, 70% of organizations will use Attribute-Based Access Control (ABAC) to protect critical assets, up from 5% today. We all know that ABAC—for fine-grained authorization, externalized and standards-based representation of policies—is the way to go. Along the way, […]

Axiomatics Boot Camp: ABAC and XACML Made Easy – Using ALFA to Write Fine-Grained Authorization Policies

Does the promise of attribute-based access control sound like magic? Don’t worry, you don’t need to be a wizard to write efficient and secure ABAC policies. In this bootcamp webinar, we will show you how you can easily write ABAC policies straight from within your IDE by using ALFA, the Abbreviated Language for Authorization. We […]

New Years Detox – Eliminating Toxic Combinations in your Access Control

As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles that end up allowing access that should actually be denied. For example, the same person entering a trade should not be allowed to confirm it as well, as this can lead […]

Axiomatics Boot Camp – Managing Multiple Projects for Policy Authoring and Deployment

When using an Attribute Based Access Control approach, enterprises have varying requirements for segregation of an access control policy authoring and deployment architecture. These typically reflect their internal governance and compliance rules. For example, an enterprise may mandate that an employee associated with a specific department should not be able to view, much less edit, […]

Axiomatics Extension for CA Single Sign-On

This product sheet explains how the Axiomatics Extension for CA Single Sign-On delivers dynamic authorization for web access management by enforcing user permissions based on corporate policies and regulations.

Axiomatics Policy Auditor

The Axiomatics Policy Auditor (APA) with Prover Plug-In1 delivers a platform for auditors and IT administrators to analyze and audit eXtensible Access Control Markup Language (XACML) policies within an organization. Designed with business users in mind, the APA simplifies the task of auditing security policies by allowing its users to: Verify compliance of XACML policies. […]

XACML Experts Panel Discussion

Everything you ever wanted to know about XACML but were afraid to ask. This panel discussion features our three top experts for the XACML language. Gerry Gebel, President Americas Erik Rissanen, CTO and Author of the standard David Brossard, VP of customer relations These three compelling points of view will provide guidance on using XACML and […]

Axiomatics Bootcamp 201 – Using JSON and REST Profiles for External Authorization

JSON and REST are widely used to implement lightweight and fast web services. This Axiomatics Boot Camp session will provide technical insight into using these XACML profiles for externalized authorization. This is a prime session if you’re a developer or architect and are looking to adopt Attribute Based Access Control. Key takeaways: What is Attribute […]

Adding Fine-Grained Authorization to CA Single Sign-On

The Axiomatics Extension for CA Single Sign-On uses the Authorization API to seamlessly insert XACML capabilities into the product to add fine-grained authorization capabilities. Read more about how to add this integration on to your CA Single Sign-On installation. Key Takeaways: How the Axiomatics Extension for CA Single Sign-On allows you to combine Single Sign-On’s […]

Increasing the Value of Information with Fine Grained Security for Data Marts

Knowledge intensive industries, such as Pharma, Banking, Insurance, Media and Energy, increasingly rely upon timely access to integrated information for innovation and product development, as well as the marketing of new products and services. Critical decision making processes within these industries are based at least in part upon the value proposition that providing more stakeholders […]

Getting Started With Attribute Based Access Control

Implementation of an Attribute Based Access Control (ABAC) system is accomplished by the completion of three main task groups: Policy Modeling Attribute Sourcing Application Integration By orchestrating these three activities, organizations can effectively deploy an ABAC system and begin taking advantage of a more secure, flexible and business-driven approach to data sharing, to securing critical resources, and to […]

Manufacturing: The Essential Guide to Sharing and Securing Sensitive Data

Global industries depend on information sharing across the borders of nations and jurisdictions. Intellectual properties are at stake and export control compliance is non-negotiable. An obvious business case for XACML. Intellectual Property Control Profile simplifies access controls for the protection of copyright, trademarks, patents and trade secrets. Compliance with export control regulations can only be […]

Enhancing Spring Security

Spring Security provides authentication, basic authorization and other security features for the widely used Java application framework Spring and it is a popular choice for use in the development of enterprise applications. It also provides an elegant way to cross-cut security concerns across various layers of the application, typically business and presentation tiers. In this […]

Flexible and Dynamic Security for the Data-Centric Enterprise

Requirements for securing data often pass down from C-level executives through multiple layers: from security architects out to the teams and systems administrators responsible for implementing security requirements. At each step, different tools are used to achieve the objectives, making it difficult to trace the security configuration back to the original requirements. This results in […]

Access Control Obstacles – How to Win the Challenge of IT vs. Business Units

Attribute Based Access Control (ABAC) may be the future of identity and access management (just ask analysts Gartner and KuppingerCole) but up until now there have been certain obstacles. In the main these are non-technical – and they are now being overcome. With the launch of the Axiomatics Policy Server 6.0, Axiomatics is bridging the […]

Tutorial: A Beginner’s Guide to XACML (Part 1)

In part one of our XACML beginners tutorials we take a look at attribute based access control (ABAC) and how it can be applied in a typical scenario whereby sensitive records, namely purchase orders, have to be protected.