English   Deutsch   Русский   中文    

XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value.

In order to watch a podcast you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the podcast download statistics.


Existing user
E-mail:
Password:
Connect Log in using two-factor authentication
Use your Facebook account to log in
Sign in with Google Account
New user
If you don't have an account yet, please create one by following the link below
Create account 
Password lost?
If you have forgot your password, use the link below to reset it
Reset password 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Real-time Security Intelligence
Over the last couple of years, challenges in the IT industry have led to the emergence of a new technology called Real-time Security Intelligence. The biggest technological breakthrough that made these solutions possible is Big Data analytics. The industry has finally reached the point, when business intelligence algorithms for large-scale data processing have become commoditized. This makes it possible to combine real-time and historical analysis and identify new incidents as being related to others that occurred in the past, which can greatly facilitate identification of ongoing APT attacks on the network.
KuppingerCole Analyst Services
KuppingerCole offers clients a wide range of reports, consulting options and events aimed at providing companies and organizations with a clear understanding of both technology and markets, enabling them to fine-tune their own strategies and projects avoid costly mistakes in choosing vendors and solutions.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole