55 E. Monroe St.
Chicago, Il. 60603, USA
How does runtime authorization work?
Runtime authorization is decoupled from access control touchpoints. This enables access control to be enforced dynamically from one centralized authorization management server throughout the enterprise and IT environment. Business policies are enforced governing who can access what, from where, at what time and for what purpose. These attributes form the basis of Attribute Based Access Control (ABAC) also known as Policy Based Access Control (PBAC) which enables critical assets to be securely shared and strict regulations to be enforced. Whenever a policy is created or edited, run-time authorization is enforced, making it ideal for handling a high volume of requests at high velocity.
Key capabilities of runtime authorization
Run-time authorization replaces the static method of enforcing access controls that relied on roles (RBAC) and had to be coded at the source. Corporate policies are evaluated in real-time before access is granted.
Architecture: Modern policy-based runtime authorization for your organization
Run-time authorization consists of several key architectural elements. Due to the agnostic nature of Attribute Based Access Control, it can be deployed to support legacy on-prem systems, as well as modern cloud and hybrid environments.
Enforcing authorization at run-time
Providing run-time authorization relies on a further two key elements.