XACML Based Authorization - Considerations for an Efficient and Flexible Architecture
- LANGUAGE: English DATE: Thursday, November 11, 2010 TIME: 17:00 CET, 11am EST
Attribute based access control (ABAC) based on the XACML standard offers a wealth of new opportunities. Successful implementations in turn depend on efficient retrieval of attributes from the various data sources in which they are being maintained. One strength of the ABAC approach is that maintenance of privilege giving attributes can be embedded in existing business processes rather than demanding a separate layer of costly IAM bureaucracy. But again, this of course calls for robust integration with the systems used to support these business processes in ways that can support corporate governance requirements.
For this webinar, KuppingerCole has brought together two vendors from related fields who combined offer a platform addressing these key success factors: Axiomatics, a leading provider of XACML based authorization solutions, and Radiant Logic, a specialist on virtual directories and their use for identity management and enterprise information integration. Based on their experience from integrations between Axiomatics Policy Server and Radiant Logic's virtual directory, KuppingerCole will lead a discussion on architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architectured and implemented to avoid bad surprises.
Radiant Logic, Inc. is the leading provider of Identity and Context Virtualization solutions. Fortune 1000 corporations use the RadiantOne Platform to abstract different forms of identity and represent application contexts for identity and data integration. This key set of services enables authentication, authorization, and provisioning for identity management initiatives, context-driven applications, and cloud-based infrastructures.
Radiant Logic's solutions have been used to solve tough identity and data integration problems at companies around the world. Organizations such as British Petroleum, Comcast, Wells Fargo, Disney, Defense Information Systems Agency, Federal Reserve Bank, Sony, Fifth Third Bank, Air Force, Disney, Intel, and Symantec use the RadiantOne solution to speed deployment, solve integration challenges, and cut costs for identity and context management projects.
Partnerships with identity management software vendors—CA and RSA/EMC— along with professional services organizations—Accenture, Booz Allen Hamilton, and Deloitte—demonstrate the broad impact of Identity and Context Virtualization on the market.
Axiomatics is the world's leading independent provider of Attribute Based Access Control (ABAC) for dynamic authorization solutions. We enable organizations with highly sensitive, business-critical information to safeguard and centrally manage user access through externalized, context- and policy-based authorization solutions that work within and across enterprises. For more information about Axiomatics visit www.axiomatics.com.
Let’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden. More and more of corporate information assets are now kept and managed outside of the company’s digital perimeter.
Paving the way for a truly customer-centric organization, which is focused on solving the customer's problems and needs in an authentic and transparent way, without messing with customer data, instantly and 24/7 – this is what Digital Transformation is all about. Consumer Identity & Access Management (CIAM) is at the heart of Digital Transformation. The Consumer Identity Summit is here to get you kickstarted into the world of CIAM, where you learn from your customers while respecting their privacy needs and securing their personal information against cyber risks.
This 1-day intense training will provide you with a solid foundation on the new European Union Data Protection Regulation, improving your understanding on the legal requirements of processing and transferring personal information to and from the EU. The trainer of this GDPR-class is an experienced European lawyer and privacy expert, offering a practical approach on how to implement the EU General Data Protection Regulation (GDPR) into your everyday business.