Orchestrated Authorization by Axiomatics: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Updated description via script)
Tag: Reverted
(Updated via script)
Tag: Manual revert
 
Line 1: Line 1:
=Description=<br>
=Description=
Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization.=More Information=
<br>
Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization. The system is based on the XACML standard, and uses Attribute Based Access Control (ABAC) to enforce policies
<br>
=More Information=
<br>
<br>
https://axiomatics.com/orchestrated-authorization/
https://axiomatics.com/orchestrated-authorization/
[[Category:Identity & Access Management (IAM)]]
[[Category:Identity & Access Management (IAM)]]

Latest revision as of 05:02, 23 April 2024

Description


Orchestrated Authorization by Axiomatics is a system that enables the creation of fine-grained access control policies. It lets organizations specify exactly who has access to what resources, and under what conditions. This makes it possible to implement least privilege and need-to-know concepts, and fine-tune access control to the specific needs of an organization. The system is based on the XACML standard, and uses Attribute Based Access Control (ABAC) to enforce policies

More Information


https://axiomatics.com/orchestrated-authorization/