The Express Way to ABAC

Externalised authorization is a powerful way to ensure resources are protected and restricted only to those individuals who have the appropriate permissions. Attribute-based access control (ABAC) gives you the flexibility you need to comply with complex security policies as well as regulatory requirements.

As companies discover the power of ABAC, CIOs, CISOs and security architects are pushing for this technology to be included even for smaller development projects. Project managers and developers are caught in the middle, trying to deliver the project on time and to budget, whilst meeting these increasingly challenging security requirements.

Here at Axiomatics, we’ve spoken to several customers – and systems integrators – who are in this position. People want to use best-of-breed solutions like Axiomatics Policy Server (APS), but they don’t have the time or the budget to deploy an enterprise-wide solution.

Express is a standalone application that comes packaged with a simple walkthrough installer so you can be up and running with a powerful ABAC solution in just a few minutes. Even better, the subscription license is designed to make purchasing and procurement as simple as possible. Out of the box, Express supports ABAC for one target application, but can easily be extended to support multiple applications. For more complex requirements or larger scale deployments, you can upgrade to APS Enterprise if you need to.

We have made APS Express available for evaluation with a 30-day license. You can request this via our website by clicking here. If you would like additional information on the installation and initial deployment then click here for one of our recorded webinars on this.

Other Blogs

3 keys to re-evaluate your authorization management
On May 27, I had the pleasure to join the KuppingerCole KCLive event with several industry peers in a panel discussion about  “Enabling the Future...
How OAuth is related to Attribute Based Access Control
What is Authorization? Authorization, also referred to as Access Control, is the process that follows authentication (which checks your identity and ensures that you are...
Modern Enterprise Authorization Management System
Gartner has an interesting article titled “Modernize Your Runtime Authorization” that highlights some aspects you need from a modern enterprise authorization systems. Over the years...