API Authorization – Secure Sensitive Data with Attribute Based Access Control

In this session we have invited a very special guest speaker, Anderson Gray from CA Technologies for a look at the growth of APIs, trends, the use of API gateways and the need for more fine-grained access control.

APIs have revolutionized the way that application data can be accessed, shared and monetized. But data must also be protected, and complex authorization rules are required to ensure individuals see only what they’re authorized to see.

This webinar will provide an overview of the API landscape (from CA Technologies) and a deep dive into the world of policy and attribute based access control, and how this approach can help ensure the security of sensitive data.

Key takeaways:

  • Understanding the API Landscape
  • API trend evolution
  • Securing your APIs from authentication to authorization
  • APIs, policies and attributes – a top-down approach to authorization from the application to the database
  • Planning your API roadmap – a simple approach to implementing an ABAC solution


Download Q&A from webinar


Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.