Policy Based Access Control with XACML 3.0
- LANGUAGE: English DATE: Friday, October 22, 2010 TIME: 17:00 CET
Axiomatics has been a pioneer in creating attribute based access control (ABAC) solutions based on the relatively new access control markup language XACML. With so far limited practical experience, data on performance and scalability of solutions based on this standard have been rare and many professionals have been in doubt regarding it´s maturity.
"ABAC and XACML can be trusted as proven and scalable options. Extensive evaluations that have been carried out by our recent customers in the financial industries have clearly shown that our XACML based technology is mature and extremely scalable.", says Axiomatic´s Finn Frisch., describing their latest project which supports a giant number of 200 million users.
Considering the fact, that externalized authorization significantly reduces time-to-market when new services are to be deployed, ABAC would make it much easier, to rapidly and securely provision new services with sensitive information. In this webinar, KuppingerCole's Senior Analyst Felix Gaehtgens will talk about the potentials of XACML 3.0, and how it could revolutionise the way that access management and access compliance is handled.
Following Felix, Axiomatics' Gerry Gebel and David Brossard will show how Axiomatics is utilizing the features of its newly launched entitlement management solution, APS 4.0, with the new XACML 3.0 standard, in the world's largest deployment of XACML based authorization to date. When fully deployed the system will protect hundreds of applications, utilize thousands of rules and attributes and support more than 200 million users.
Axiomatics provides externalized authorization management for databases, Big Data, applications and APIs. Our Attribute Based Access Control (ABAC) solutions are ideal for enterprises and government agencies moving away from role-based frameworks, and into more context-aware policy-based access control models. The Axiomatics authorization suite is ideal for these organizations that must securely share information while complying with complex and ever-evolving regulations.
A key challenge in every organization is making sure that the right tools are available, in the right place, at the right time, for the right people. The continual on and off boarding of large groups of employees, external workforces or partners creates increased pressure on administrative teams within an organization. An overall change towards diverse end-user devices, both corporate and privately owned, adds a new dimension of complexity, while compliance and security requirements challenge IT, CISOs and executive management.
European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.