Video Blog-Moving Beyond Identity-Based Access Control

Axiomatics’ solutions implement Attribute Based Access Control (ABAC). This means that, when processing an access control request, digital rules can be evaluated to consider the attributes of the requestor, the attributes of the requested resource, and the attributes of the environment. This combination of attributes lends context to the access control request and is where the powerful advantages of ABAC really shine.

For example, in a Role Based Access Control (RBAC) model, a user identity is required for making static access control decisions. While ABAC often incorporates user attributes in making access control decisions, identities are not necessarily required. With ABAC, run-time access control decisions can be made based on existing environment variables.

Related Articles

The one with all the authorization vendors | Dynamically Speaking
Dynamically Speaking
Does it feel as though everyone’s suddenly talking about authorization? We think so too and asked Axiomatics President & CCO Jim Barkdoll his thoughts on...
The one about identity-first security | Dynamically Speaking
Dynamically Speaking
Few have their finger on the pulse of all things Identity and Access Management (IAM) like Jackson Shaw, Chief Strategy Officer for Clear Skye. In...
The Log4j vulnerability – What you need to know
Customer Alerts
As many of you know, on December 9, 2021 the Apache Log4j vulnerability (CVE-2021-4422) was discovered, affecting somewhere between 0 and 3 billion-plus devices currently...