Axiomatics Boot Camp: Testing XACML Policies Using JUnit, Eclipse, and the Abbreviated Language for Authorization (ALFA)

Experts Henrik Johansson of Knowit and David Brossard of Axiomatics provide a deep dive into testing XACML policies in this technical webinar. We start with the authorization lifecycle and how it works, and highlight the importance of testing access policies before implementing them in production. Next we provide an overview on using the Axiomatics PEP […]

Axiomatics Back to Basics: ABAC 101

The benefits of Attribute Based Access Control (ABAC) for your organization. Attribute Based Access Control is the most robust, flexible and fine-grained solution that is ideal for access control challenges faced by today’s organizations. In this webinar, we’ll go back to the basics of ABAC. Key takeaways: Key elements of the ABAC approach Importance of policy […]

Axiomatics Boot Camp: Spring Security and ABAC

To enable the use of fine-grained Attributed Based Access Control (ABAC) model within the Spring framework, Axiomatics introduced the XACML PEP SDK for Spring Security. In this refresher webinar, we cover the basics of the integration and go into the details of what has changed, and been enhanced in the SDK, based on direct customer feedback […]

Boot Camp: Creating a Policy Enforcement Point

Axiomatics has a new Java PEP SDK available with performance improvements. This boot camp session shares the details of the new SDK and what’s changed in the latest version. In addition, this boot camp covers:  How to change your current code to leverage the new SDK Using other PEP alternatives (REST/JSON)    

Toxic Pairs, Role Explosion, and the Evolution of RBAC

A Practical Guide for Fine-Grained Access Control It’s 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than ever in our increasingly complex world. IT is no stranger to these complexities. Managing access control and entitlements has become an impossible task where role-based access control has failed us […]

Proving Compliance throughout the ABAC Lifecycle

One of the benefits of Attribute Based Access Control is the ability to fine-tune compliance checks and balances in real time, and make changes to policies to meet compliance in an immediate, centralized way. What’s even more complex is proving compliance, especially when it comes to showing access control permissions in real-time. The full-circle management of […]