Short introduction to Access Control – Part 2

XACML standard covers three major parts:

  1. Reference Architecture: The standard proposes reference architecture with commonly accepted names for the various entities involved in the architecture.
  2. Policy Language: The standard defines syntax for the language used to write access control rules and higher-order policies.
  3. Request/Response scheme: inline with the reference architecture and using the policy language concepts the standards also defines a request-response scheme that enables interoperability.

Why XACML?

Since XACML uses the concept of Attribute-Based Access Control as the underlying model for access control, it enables easy authoring and enforcement of fine-grained access control rules. XACML also benefits from being an open standard, allowing for support from multiple vendors, platform and implementation interoperability as well as a transparent committee working on keeping the standard inline with the growing demands of the industry as well as rectifying deficiencies.

As a specification XACML is powerful enough to handle most, if not all, ABAC needs. It also provides profiles (best practices on how to use XACML to express well-defined usage scenarios) for common scenarios like RBAC, SAML, Intellectual Property Control, Export Compliant etc., providing implementers helpful guidance on how to solve the common problems.

Other Blogs

3 keys to re-evaluate your authorization management
Business
On May 27, I had the pleasure to join the KuppingerCole KCLive event with several industry peers in a panel discussion about  “Enabling the Future...
How OAuth is related to Attribute Based Access Control
Tech
What is Authorization? Authorization, also referred to as Access Control, is the process that follows authentication (which checks your identity and ensures that you are...
Modern Enterprise Authorization Management System
Business
Gartner has an interesting article titled “Modernize Your Runtime Authorization” that highlights some aspects you need from a modern enterprise authorization systems. Over the years...