XACML Based Authorization - Considerations for an Efficient and Flexible Architecture
- LANGUAGE: English DATE: Thursday, November 11, 2010 TIME: 17:00 CET, 11am EST
Attribute based access control (ABAC) based on the XACML standard offers a wealth of new opportunities. Successful implementations in turn depend on efficient retrieval of attributes from the various data sources in which they are being maintained. One strength of the ABAC approach is that maintenance of privilege giving attributes can be embedded in existing business processes rather than demanding a separate layer of costly IAM bureaucracy. But again, this of course calls for robust integration with the systems used to support these business processes in ways that can support corporate governance requirements.
For this webinar, KuppingerCole has brought together two vendors from related fields who combined offer a platform addressing these key success factors: Axiomatics, a leading provider of XACML based authorization solutions, and Radiant Logic, a specialist on virtual directories and their use for identity management and enterprise information integration. Based on their experience from integrations between Axiomatics Policy Server and Radiant Logic's virtual directory, KuppingerCole will lead a discussion on architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architectured and implemented to avoid bad surprises.
Radiant Logic, Inc. is the leading provider of Identity and Context Virtualization solutions. Fortune 1000 corporations use the RadiantOne Platform to abstract different forms of identity and represent application contexts for identity and data integration. This key set of services enables authentication, authorization, and provisioning for identity management initiatives, context-driven applications, and cloud-based infrastructures.
Radiant Logic's solutions have been used to solve tough identity and data integration problems at companies around the world. Organizations such as British Petroleum, Comcast, Wells Fargo, Disney, Defense Information Systems Agency, Federal Reserve Bank, Sony, Fifth Third Bank, Air Force, Disney, Intel, and Symantec use the RadiantOne solution to speed deployment, solve integration challenges, and cut costs for identity and context management projects.
Partnerships with identity management software vendors—CA and RSA/EMC— along with professional services organizations—Accenture, Booz Allen Hamilton, and Deloitte—demonstrate the broad impact of Identity and Context Virtualization on the market.
Axiomatics is the world's leading independent provider of Attribute Based Access Control (ABAC) for dynamic authorization solutions. We enable organizations with highly sensitive, business-critical information to safeguard and centrally manage user access through externalized, context- and policy-based authorization solutions that work within and across enterprises. For more information about Axiomatics visit www.axiomatics.com.
Trying to find the right access security solution has always been a complex task. It is, however, even more challenging when the existing web access management solution is not sufficient anymore.
Paving the way for a truly customer-centric organization, which is focused on solving the customer's problems and needs in an authentic and transparent way, without messing with customer data, instantly and 24/7 – this is what Digital Transformation is all about. Consumer Identity & Access Management (CIAM) is at the heart of Digital Transformation. The Consumer Identity Summit is here to get you kickstarted into the world of CIAM, where you learn from your customers while respecting their privacy needs and securing their personal information against cyber risks.
In weniger als eineinhalb Jahren tritt die neue Datenschutzgrundverordnung der EU (EU-DSGVO), besser bekannt unter der englischen Abkürzung GDPR (General Data Protection Regulation), in Kraft. Höchste Zeit also, sich mit den Veränderungen zu befassen, die dieses EU-weit geltende Gesetz bringen wird, und insbesondere mit dessen Auswirkungen auf die IT. Dieser eintägige Crashkurs macht Sie fit für die neue Datenschutz-Ära und bewahrt Sie vor unangenehmen Überraschungen.