XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

  • LANGUAGE: English DATE: Thursday, November 11, 2010 TIME: 17:00 CET, 11am EST
Upcoming Webinars
Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value.

Attribute based access control (ABAC) based on the XACML standard offers a wealth of new opportunities. Successful implementations in turn depend on efficient retrieval of attributes from the various data sources in which they are being maintained. One strength of the ABAC approach is that maintenance of privilege giving attributes can be embedded in existing business processes rather than demanding a separate layer of costly IAM bureaucracy. But again, this of course calls for robust integration with the systems used to support these business processes in ways that can support corporate governance requirements.

For this webinar, KuppingerCole has brought together two vendors from related fields who combined offer a platform addressing these key success factors: Axiomatics, a leading provider of XACML based authorization solutions, and Radiant Logic, a specialist on virtual directories and their use for identity management and enterprise information integration. Based on their experience from integrations between Axiomatics Policy Server and Radiant Logic's virtual directory, KuppingerCole will lead a discussion on architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architectured and implemented to avoid bad surprises.


Speakers

David is the VP Customer Relations at Axiomatics AB, the leader in externalized authorization management. In his day-to-day job, David helps customers architect authorization solutions that enable secure data sharing in compliance with compliance and privacy regulations. David's main area of...


Lead Sponsor

Radiant Logic, Inc. is the leading provider of Identity and Context Virtualization solutions. Fortune 1000 corporations use the RadiantOne Platform to abstract different forms of identity and represent application contexts for identity and data integration. This key set of services enables authentication, authorization, and provisioning for identity management initiatives, context-driven applications, and cloud-based infrastructures.

Radiant Logic's solutions have been used to solve tough identity and data integration problems at companies around the world. Organizations such as British Petroleum, Comcast, Wells Fargo, Disney, Defense Information Systems Agency, Federal Reserve Bank, Sony, Fifth Third Bank, Air Force, Disney, Intel, and Symantec use the RadiantOne solution to speed deployment, solve integration challenges, and cut costs for identity and context management projects.

Partnerships with identity management software vendors—CA and RSA/EMC— along with professional services organizations—Accenture, Booz Allen Hamilton, and Deloitte—demonstrate the broad impact of Identity and Context Virtualization on the market.

Gold Sponsor

Axiomatics provides externalized authorization management for databases, Big Data, applications and APIs. Our Attribute Based Access Control (ABAC) solutions are ideal for enterprises and government agencies moving away from role-based frameworks, and into more context-aware policy-based access control models. The Axiomatics authorization suite is ideal for these organizations that must securely share information while complying with complex and ever-evolving regulations.

Watch now

Downloads

Presentation Felix Gaehtgens

Presentation Axiomatics

Presentation Radiant Logic

Webcast download

Popular Webcasts

Next Webinar

Webinar

Creating Secure and Unified Next Generation Workspaces

A key challenge in every organization is making sure that the right tools are available, in the right place, at the right time, for the right people. The continual on and off boarding of large groups of employees, external workforces or partners creates increased pressure on administrative teams within an organization. An overall change towards diverse end-user devices, both corporate and privately owned, adds a new dimension of complexity, while compliance and security requirements challenge IT, CISOs and executive management.

Next Conference

Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00