Five things developers need to know about APIs and authorization
Axiomatics Blog
by David Brossard
13h ago
With the proliferation of APIs across an enterprise, it becomes increasingly difficult to fully understand what APIs are exposed and how. This is why a mature authentication & authorization layer is needed to securely expose your APIs and manage their access. Here are five things developers need to know about policy-driven authorization and API security. 1. The heavy lifting is already done You have already defined what the business object is for the API. For example, you have already decided you want to look at medical records and what you want to do with that record such as viewing it, d ..read more
Visit website
The vital role of policy-driven authorization for CISOs
Axiomatics Blog
by Jim Barkdoll
1w ago
Despite the increased visibility and significant pressures of their job, the majority of the time CISOs are not given a voice with the board and security is often viewed as a cost as opposed to a revenue generating function. However, they are still held accountable for cybersecurity breaches and attacks. And this accountability doesn’t only come from internal stakeholders. Recently, the U.S. Securities and Exchange Commission (SEC) brought charges against a company’s CISO in connection with a cybersecurity incident. Now, the SEC is requiring enterprises to increase the level of transparency ar ..read more
Visit website
Three challenges cloud architects face and how to solve them
Axiomatics Blog
by Mark Cassetta
3w ago
As enterprises continue to adopt and migrate data, applications, and assets to the cloud, new challenges and opportunities arise. It is a part of the cloud architect’s role to address these challenges and ensure the enterprise’s cloud system is optimized, monitored, and maintained to protect the data within the system. Some common challenges cloud architects face include: Taking legacy, on-premises applications and shifting them to run better as cloud applications. Some of the applications in question are likely to be homegrown, and all will have been deployed in a manner that did not account ..read more
Visit website
OAuth and Authorization: A duo in securing access to API-based services
Axiomatics Blog
by David Brossard
1M ago
What is authorization? Authorization, also referred to as fine-grained access control, is the process of ensuring users have access to resources and allowing them to perform relevant actions on the resources – but only to the extent allowed by policies and constraints imposed by the organization’s business, legal or any other categories of requirements. These rights can be as simple as viewing a file (a grant permission) or denying the ability to view a file (a deny permission). A traditional authorization architecture is role-based access control (RBAC), in which a user has a specific role as ..read more
Visit website
Gartner IAM Summit London 2024 recap
Axiomatics Blog
by Emme Reichert
1M ago
Our team had a great time at the Gartner Identity and Access Management (IAM) summit in London, UK discussing the latest innovations and trends in the identity industry. We spoke with our Chief Product Officer, Mark Cassetta, and VP Marketing & Communications, Kelly O’Dwyer-Manuel, about their time at the conference and to share some of their own highlights from the event. What was your biggest takeaway from the event? Mark: For the last twelve months, we have been seeing signs of a convergence between traditional cybersecurity teams and IAM. The opening keynote of this show “Treat Cyberse ..read more
Visit website
Scalability, flexibility, and security – Why you need a hierarchical policy structure
Axiomatics Blog
by Mark Cassetta
1M ago
One of the most common questions I hear from identity or security teams when it comes to policy-driven authorization is about how to structure policies. On the whole, policy is a better way to express authorization (when compared to other methods such as access control lists) because of its expressiveness, ease of read/write, and audit. Specifically, we’re often asked whether the policy structure should be hierarchical or flat. While it is possible to implement an external authorization solution leveraging either structure, understanding the nuances of each approach is vital, as it significant ..read more
Visit website
How can I manage many complex permit rules for the same ALFA policy?
Axiomatics Blog
by Mark Berg
2M ago
ALFA, the abbreviated language for authorization, is an easy-to-write authorization language that uses a lightweight syntax and implements attribute-based access control (ABAC). ALFA uses attributes (key-value pairs) inside policies to convey authorization statements. We won’t get into every aspect of policy authoring today. For a brief overview of what a policy is, check out the ALFA Language Basics. Using policy structure and combining algorithms to make a policy easier to read Have you ever found yourself with a long, complex list of checks that must all be true for a given object and actio ..read more
Visit website
Q&A: Auditing and Authorization
Axiomatics Blog
by Emme Reichert
2M ago
We recently sat down with our Chief Technology Officer, David Brossard, and Vice President of Customer Relations, Matt Luckett to discuss how policy-driven authorization can help improve auditing. What are the most typical pain points enterprises experience when it comes to auditing? David: The number one pain point I see is that existing identity governance and administration (IGA) systems give enterprises a false sense of security. They give this false sense by only doing audits on data they have available. If it is an audit on who has access to what data, that insight often doesn’t exist in ..read more
Visit website
Handling multi-valued attributes in ALFA – How “bag” can it get?
Axiomatics Blog
by David Brossard
2M ago
Background Attribute-based Access Control (ABAC) leverages attributes in combination with a set of policies to determine authorization decisions. A request is sent from an application, API, or another component that acts as a Policy Enforcement Point (PEP). The Policy Decision Point (PDP) receives the request and applies it to the authorization policies that it has in place. While doing so, the PDP might leverage one or more Policy Information Points (PIP) in order to retrieve additional attribute values. Attributes are bags of values An example Incoming request: “Can Tintin enter the EU?” Po ..read more
Visit website
The future of work, or work today, requires access control
Axiomatics Blog
by Mark Cassetta
3M ago
More people are working in borderless environments as enterprises have shifted to remote or hybrid workplaces. According to Upwork, an estimated 32.6 million Americans will work remotely by 2025, which is about 22% of the workforce. Plus, more organizations are hiring employees from all over the world. Both of these shifts in how the world works means there is a higher importance placed on collaboration as the world becomes borderless. The pandemic accelerated enterprises into the future of work The future of work has always been headed in the direction of being borderless. However, what was g ..read more
Visit website

Follow Axiomatics Blog on FeedSpot

Continue with Google
Continue with Apple
OR