Using the Power of Federated Identity and Dynamic Authorization to Streamline Access Control – with Radiant Logic

Enterprises are implementing Attribute-Based Access Control (ABAC) for externalized dynamic authorization that is both policy-based for easier audit and fine-grained enough that it can tackle any business requirement. Along the way, deployment challenges emerge: ABAC needs attributes, and attributes are linked to entities/objects and processes that are scattered across all identity and data silos. To provide […]

Authorization that Scales to the Cloud and Beyond

Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development now takes place in the cloud at a faster pace than ever before. We see the proliferation of more services, more users, and more data which all translate to more […]

Beyond OAuth: Securing APIs with Policies & ABAC

Måns Håkansson gave his presentation on securing APIs with policies and Attribute Based Access Control (ABAC) at this year’s KuppingerCole Cyber Access Summit / Cybersecurity Leadership Summit in Berlin on November 14th, 2018. Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert […]

5 Hidden Pitfalls of DIY Access Control Development and How to Avoid Them

Build V. Buy: Organizations that attempt to build their own access control internally often overlook or significantly underestimate the effort required to build, operate, and maintain security, functionality, and compliance in their DIY solutions. This is particularly true for regulated entities where internal development efforts undervalue the burden of compliance with internal audits or regulatory regimes […]

Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value in describing and implementing a set of use cases where integrations between IGA and ABAC systems can be accomplished to further ensure best-in-class IAM. Growing customer requirements are the key […]

Securing APIs and Microservices with ABAC, OAuth, and OIDC

Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive access control for applications that are built using microservice and API approaches. In this webinar, Gerry Gebel and David Brossard outline a set of examples where security standards work together […]