Short introduction to Access Control – Part 2

XACML standard covers three major parts:

  1. Reference Architecture: The standard proposes reference architecture with commonly accepted names for the various entities involved in the architecture.
  2. Policy Language: The standard defines syntax for the language used to write access control rules and higher-order policies.
  3. Request/Response scheme: inline with the reference architecture and using the policy language concepts the standards also defines a request-response scheme that enables interoperability.


Since XACML uses the concept of Attribute-Based Access Control as the underlying model for access control, it enables easy authoring and enforcement of fine-grained access control rules. XACML also benefits from being an open standard, allowing for support from multiple vendors, platform and implementation interoperability as well as a transparent committee working on keeping the standard inline with the growing demands of the industry as well as rectifying deficiencies.

As a specification XACML is powerful enough to handle most, if not all, ABAC needs. It also provides profiles (best practices on how to use XACML to express well-defined usage scenarios) for common scenarios like RBAC, SAML, Intellectual Property Control, Export Compliant etc., providing implementers helpful guidance on how to solve the common problems.

Related Articles

Getting started with Zero Trust using dynamic authorization | Dynamically Speaking
Dynamically Speaking
Zero Trust. It’s everywhere. It’s a methodology that’s been around for years, and we are now seeing a significant uptick in the number of enterprises...
The case for dynamic authorization in banking and finance
Attribute Based Access Control (ABAC)
More than other organizations, banks, and financial institutions face the highest levels of scrutiny when it comes to how they protect critical assets and sensitive...
Response to White House meeting on cybersecurity and NIST updates | Dynamically Speaking
Dynamically Speaking
Our customers tell us constantly – security challenges continue to evolve and become more complex almost daily. It’s why we engage in conversations with enterprises...