Orchestrated Authorization by Axiomatics: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Updated description via script) Tag: Reverted |
(Updated via script) Tag: Manual revert |
||
Line 1: | Line 1: | ||
=Description=<br> | =Description= | ||
Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization.=More Information= | <br> | ||
Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization. The system is based on the XACML standard, and uses Attribute Based Access Control (ABAC) to enforce policies | |||
<br> | |||
=More Information= | |||
<br> | <br> | ||
https://axiomatics.com/orchestrated-authorization/ | https://axiomatics.com/orchestrated-authorization/ | ||
[[Category:Identity & Access Management (IAM)]] | [[Category:Identity & Access Management (IAM)]] |
Latest revision as of 05:02, 23 April 2024
Description
Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization. The system is based on the XACML standard, and uses Attribute Based Access Control (ABAC) to enforce policies