Policy Administration Points
The XACML policy language is almost as expressive as a natural language. However, computers are rigid and therefore the XACML grammar must be strictly adhered to. You need an editor with a complete...
View ArticlePolicy Information Points
Policy Information Point (PIP) is used as a general term for an attribute store. IT organizations typically have too many directories and databases, not too few. The last thing they need is an...
View ArticlePolicy Enforcement Points
Axiomatics offers XACML Policy Enforcement Points (PEP) for a broad variety of environments.
View ArticlePolicy Decision Points
A Policy Decision Point (PDP) loads XACML policies into memory and evaluates XACML requests against these policies. The response to a request is typically either Permit or Deny.
View ArticleXACML introduction training
The XACML introduction course provides a comprehensive overview of XACML-based Entitlement Management.
View ArticleXACML advanced training
Axiomatics advanced XACML training consists of a deep-dive into the XACML technology through the use of Axiomatics XACML based tools.
View ArticleAxiomatics Professional Services
Axiomatics offers a range of professional services designed for organizations that are evaluating or implementing the XACML technology.
View ArticleAbout Axiomatics Professional Services
Axiomatics Expert Professional Services are tailored to the specific needs of a customer and their current stage in maturity with regards to the XACML technology.
View ArticleAxiomatics Policy Auditor
The Axiomatics Policy Auditor (APA) simplifies the analysis and validation process of XACML policies. It is designed for use by managers, controllers and auditors, and features a user-friendly...
View ArticleAxiomatics Reverse Query
Authorizations impacting large data sets in multiple dimensions can be difficult to manage with XACML permit/deny decisions. Axiomatics unique and patent-pending reverse querying technology extends...
View ArticleAxiomatics Policy Server
The Axiomatics Policy Server (APS) is a powerful access control system that allows users to manage, simulate and enforce fine-grained policies written in the eXtensible Access Control Markup Language...
View ArticleXACML policy life-cycle management
The Axiomatics eXtensible authorization solutions are strongly anchored in the XACML standard. They are the leading implementations of both XACML 2.0 and XACML 3.0. The Axiomatics solutions also extend...
View ArticleAPS Developer Edition
The Axiomatics Policy Server (APS) Developer Edition is a compact and light-weight version of the Axiomatics Policy Server (APS) product. It can be installed to run on an end-user desktop to simplify...
View ArticleAxiomatics Language for Authorization (ALFA)
Simplify the development of authorization policies and empower your developers and architects with the Axiomatics Language for Authorization (ALFA). Designed to integrate with your development...
View ArticleAxiomatics Data Access Filter (ADAF)
Axiomatics Data Access Filter (ADAF) provides fine-grained, externalized authorization for database content. The unique solution promotes collaborative scenarios where only authorized content should be...
View ArticleAPS Developer Edition
The Axiomatics Policy Server (APS) Developer Edition is a compact and light-weight version of the Axiomatics Policy Server (APS) product. It can be installed to run on an end-user desktop to simplify...
View ArticleAPS Express Edition
The fastest route to Attribute Based Access Control (ABAC). With Axiomatics Policy Server Express Edition project teams get a dedicated yet full-blown ABAC solution for initiatives where robust access...
View ArticleRoles landing page
Business managers Process owners The ability of co-workers to collaborate among themselves or with customers and partners depends on information exchange. When sensitive information is at stake access...
View ArticleWhy Axiomatics landing page
Thought leadership Leading the shift to dynamic authorization Axiomatics is the leader in Attribute Based Access Control (ABAC) for dynamic authorization. Find out how Axiomatics stays ahead and do...
View ArticleChallenges Landing Page
Secure Collaboration Share information securely and effectively Safeguard sensitive information, while providing access to those that need it under the right conditions. Rapid & Secure...
View Article