Video Blog-Moving Beyond Identity-Based Access Control

Axiomatics’ solutions implement Attribute Based Access Control (ABAC). This means that, when processing an access control request, digital rules can be evaluated to consider the attributes of the requestor, the attributes of the requested resource, and the attributes of the environment. This combination of attributes lends context to the access control request and is where the powerful advantages of ABAC really shine.

For example, in a Role Based Access Control (RBAC) model, a user identity is required for making static access control decisions. While ABAC often incorporates user attributes in making access control decisions, identities are not necessarily required. With ABAC, run-time access control decisions can be made based on existing environment variables.

Other Blogs

3 keys to re-evaluate your authorization management
On May 27, I had the pleasure to join the KuppingerCole KCLive event with several industry peers in a panel discussion about  “Enabling the Future...
How OAuth is related to Attribute Based Access Control
What is Authorization? Authorization, also referred to as Access Control, is the process that follows authentication (which checks your identity and ensures that you are...
Modern Enterprise Authorization Management System
Gartner has an interesting article titled “Modernize Your Runtime Authorization” that highlights some aspects you need from a modern enterprise authorization systems. Over the years...