Next-generation access control is undergoing a bit of an identity crisis. Some call it eXternalized Authorization Management, others Dynamic Access Control and still others just refer to it as Attribute Based Access Control (ABAC). Until now, XACML and ABAC have been the two pillars supporting next-gen AuthZ. Gartner predicts that 70% of enterprises will adopt ABAC by 2020.
With ALFA, REST, and JSON, even the most complex authorization scenarios become extremely simple to implement. It's haute cuisine made simple. In this session, we will go hands-on with examples, live demos, coding, and delicious samples.
Ähnlich wie Why lasagna is better than spaghetti: baking authorization into your applications using ALFA, JSON, and REST - Cloud Identity Summit 2014 (20)
29. Summary
Acronym Name Description
EAM eXternalized
Authorization
Management
The act of cleanly separating business logic
from authorization logic and maintaining each
one independently
ABAC Attribute-based access
control
An authorization model whereby parameters
about the user, resource, action, and
environment can be used to determine access
PBAC Policy-based access
control
An authorization model which uses attributes
combined together inside policies to define
granted or denied access
XACML eXtensible Access Control
Markup Language
The standard implementation of ABAC and
PBAC – done by OASIS.