XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

  • LANGUAGE: English DATE: Thursday, November 11, 2010 TIME: 17:00 CET, 11am EST
Upcoming Webinars
Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value.

Attribute based access control (ABAC) based on the XACML standard offers a wealth of new opportunities. Successful implementations in turn depend on efficient retrieval of attributes from the various data sources in which they are being maintained. One strength of the ABAC approach is that maintenance of privilege giving attributes can be embedded in existing business processes rather than demanding a separate layer of costly IAM bureaucracy. But again, this of course calls for robust integration with the systems used to support these business processes in ways that can support corporate governance requirements.

For this webinar, KuppingerCole has brought together two vendors from related fields who combined offer a platform addressing these key success factors: Axiomatics, a leading provider of XACML based authorization solutions, and Radiant Logic, a specialist on virtual directories and their use for identity management and enterprise information integration. Based on their experience from integrations between Axiomatics Policy Server and Radiant Logic's virtual directory, KuppingerCole will lead a discussion on architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architectured and implemented to avoid bad surprises.


Speakers

David is the VP Customer Relations at Axiomatics AB, the leader in externalized authorization management. In his day-to-day job, David helps customers architect authorization solutions that enable secure data sharing in compliance with compliance and privacy regulations. David's main area of...


Lead Sponsor

Radiant Logic, Inc. is the leading provider of Identity and Context Virtualization solutions. Fortune 1000 corporations use the RadiantOne Platform to abstract different forms of identity and represent application contexts for identity and data integration. This key set of services enables authentication, authorization, and provisioning for identity management initiatives, context-driven applications, and cloud-based infrastructures.

Radiant Logic's solutions have been used to solve tough identity and data integration problems at companies around the world. Organizations such as British Petroleum, Comcast, Wells Fargo, Disney, Defense Information Systems Agency, Federal Reserve Bank, Sony, Fifth Third Bank, Air Force, Disney, Intel, and Symantec use the RadiantOne solution to speed deployment, solve integration challenges, and cut costs for identity and context management projects.

Partnerships with identity management software vendors—CA and RSA/EMC— along with professional services organizations—Accenture, Booz Allen Hamilton, and Deloitte—demonstrate the broad impact of Identity and Context Virtualization on the market.

Gold Sponsor

Axiomatics is the leading provider of fine-grained access control. Axiomatics' solutions are utilized by Global Fortune 1000 companies and government agencies to enable digital transformation: share and safeguard sensitive information, mitigate insider threat, meet compliance and minimize data fraud. Axiomatics provides Attribute Based Access Control (ABAC) for applications, databases, Big Data, APIs and microservices. To learn more please visit: www.axiomatics.com or on Twitter @axiomatics. 

Watch now

Downloads

Presentation Felix Gaehtgens

Presentation Axiomatics

Presentation Radiant Logic

Webcast download

Popular Webcasts

Next Webinar

Webinar

GDPR Compliance Countdown to Adequacy – Minimum Preparation to be Compliant

With less than a year to go before EU GDPR (General Data Protection Regulation) comes into force your organization needs to be ready to comply with these requirements that demand better controls over how it uses and manages the personal data that it holds.

Next Conference

Conference

Consumer Identity World Tour 2017

The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00