Policy Based Access Control with XACML 3.0

  • LANGUAGE: English DATE: Friday, October 22, 2010 TIME: 17:00 CET
Upcoming Webinars
Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar, Kuppinger Cole´s Senior Analyst Felix Gaehtgens will talk about the improvements achieved with this new standard version and describe, how these improvements can influence current and future access control initiatives. Felix will be followed by former Burton Group Analyst and now Axiomatics Americas President Gerry Gebel, who will present together with his collegue David Brossard an impressive XACML 3.0 best practice with 200 Million users.

Axiomatics has been a pioneer in creating attribute based access control (ABAC) solutions based on the relatively new access control markup language XACML. With so far limited  practical experience, data on performance and scalability of solutions based on this standard have been rare and many professionals have been in doubt regarding it´s maturity.  

"ABAC and XACML can be trusted as proven and scalable options. Extensive evaluations that have been carried out by our recent customers in the financial industries have clearly shown that our XACML based technology is mature and extremely scalable.", says Axiomatic´s Finn Frisch., describing their latest project which supports a giant number of 200 million users.

Considering the fact, that externalized authorization significantly reduces time-to-market when new services are to be deployed, ABAC would make it much easier, to rapidly and securely provision new services with sensitive information. In this webinar, KuppingerCole's Senior Analyst Felix Gaehtgens will talk about the potentials of XACML 3.0, and how it could revolutionise the way that access management and access compliance is handled.

Following Felix, Axiomatics' Gerry Gebel and David Brossard will show how Axiomatics is utilizing the features of its newly launched entitlement management solution, APS 4.0, with the new XACML 3.0 standard, in the world's largest deployment of XACML based authorization to date. When fully deployed the system will protect hundreds of applications, utilize thousands of rules and attributes and support more than 200 million users.


Speakers

David is the VP Customer Relations at Axiomatics AB, the leader in externalized authorization management. In his day-to-day job, David helps customers architect authorization solutions that enable secure data sharing in compliance with compliance and privacy regulations. David's main area of...

Gerry is responsible for sales, marketing and business development for the Americas region. In addition, he contributes to product strategy and manages Axiomatics’ global partner relations. Prior to joining Axiomatics, Gerry was Vice President and Service Director for Burton Group’s...


Gold Sponsor

Axiomatics is the world's leading independent provider of Attribute Based Access Control (ABAC) for dynamic authorization solutions. We enable organizations with highly sensitive, business-critical information to safeguard and centrally manage user access through externalized, context- and policy-based authorization solutions that work within and across enterprises. For more information about Axiomatics visit www.axiomatics.com.

Watch now

Downloads

Webinar Presentation Felix Gaehtgens

Webinar Presentation Axiomatics

Webcast download

Popular Webcasts

Next Webinar

Webinar

You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Next Conference

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Next Seminar

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00