Orchestrated Authorization by Axiomatics: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Created via script)
 
(Updated description via script)
Tag: Reverted
Line 1: Line 1:
=Description=
=Description=<br>
<br>
Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization.=More Information=
Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization. The system is based on the XACML standard, and uses Attribute Based Access Control (ABAC) to enforce policies
<br>
=More Information=
<br>
<br>
https://axiomatics.com/orchestrated-authorization/
https://axiomatics.com/orchestrated-authorization/
[[Category:Identity & Access Management (IAM)]]
[[Category:Identity & Access Management (IAM)]]

Revision as of 04:49, 23 April 2024

=Description=
Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization.=More Information=
https://axiomatics.com/orchestrated-authorization/