XACML and the Externalization of Authorization: How to do it Right
This training will give an overview about XACML and the concepts behind, from the way policies are expressed to the different components like PEPs, PDPs, or PAPs. It also will look at the shortcomings XACML currently has and how to best deal with them. It will look at different approaches in which XACML currently is used, showing the breadth and potential limitations of XACML. And it will discuss where to better not use XACML itself but to “translate” things.
Language: English • Duration: 01:01:31 • Resolution: 800x600
Learn more about this trainingLatest Related Videos
More Related Videos
Stay Connected
Next Webinar
Making Zero Trust a Reality: Basing Decisions on Valid Identity Data
May 18, 2022
Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables businesses to be connected and secure, but an effective identity-focused approach is essential.
How can we help you