Policy Based Access Control with XACML 3.0
- LANGUAGE: English DATE: Friday, October 22, 2010 TIME: 17:00 CET
Axiomatics has been a pioneer in creating attribute based access control (ABAC) solutions based on the relatively new access control markup language XACML. With so far limited practical experience, data on performance and scalability of solutions based on this standard have been rare and many professionals have been in doubt regarding it´s maturity.
"ABAC and XACML can be trusted as proven and scalable options. Extensive evaluations that have been carried out by our recent customers in the financial industries have clearly shown that our XACML based technology is mature and extremely scalable.", says Axiomatic´s Finn Frisch., describing their latest project which supports a giant number of 200 million users.
Considering the fact, that externalized authorization significantly reduces time-to-market when new services are to be deployed, ABAC would make it much easier, to rapidly and securely provision new services with sensitive information. In this webinar, KuppingerCole's Senior Analyst Felix Gaehtgens will talk about the potentials of XACML 3.0, and how it could revolutionise the way that access management and access compliance is handled.
Following Felix, Axiomatics' Gerry Gebel and David Brossard will show how Axiomatics is utilizing the features of its newly launched entitlement management solution, APS 4.0, with the new XACML 3.0 standard, in the world's largest deployment of XACML based authorization to date. When fully deployed the system will protect hundreds of applications, utilize thousands of rules and attributes and support more than 200 million users.
Axiomatics is the world's leading independent provider of Attribute Based Access Control (ABAC) for dynamic authorization solutions. We enable organizations with highly sensitive, business-critical information to safeguard and centrally manage user access through externalized, context- and policy-based authorization solutions that work within and across enterprises. For more information about Axiomatics visit www.axiomatics.com.
Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.
Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.
Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.