Questions tagged [xacml]

XACML is the eXtensible Access Control Markup Language, an open standard for specifying and evaluating authorization and access control policies.

XACML is the eXtensible Access Control Markup Language, an open standard for specifying and evaluating of authorization and access control policies. The standard is managed by the OASIS XACML Technical Committee. The XACML 3.0 standard was ratified and released in January 2013.

XACML implements an access control model called attribute-based access control or .

The OASIS committee has identified and defined several ancillary profiles that extend the core XACML 3.0 specification for specific domains, such as the Administration and Delegation Profile, the SAML Profile, the Core and Hierarchical Role Base Access Control (RBAC) Profile, the Intellectual Property Control (IPC) profile, and the Export Compliance-US (EC-US) Profile. All of these profiles are defined on the OASIS site.

The XACML 2.0 standard was ratified in February 2005. A significant difference between the 2.0 and 3.0 standards is that 2.0 uses distinct XML element tags to separate attributes into subject, resource, action, or environment categories whereas 3.0 uses XML attributes to associate items with categories. In XACML 3.0 it's easier to define application-specific categories and the attribute processing model is more unified than in XACML 2.0.

XACML 3.0 also introduces Advice and makes Obligations more dynamic through the introduction of variables in the Obligation element.

6 questions
5
votes
2 answers

Can I use stormpath user management service with a XACML library like BALANA?

I'm trying to implement some security access control in a software I'm building. I came across Stormpath for user management and they have somewhat an approach for RBAC yet what I was considering is to rely on XACML for ABAC and more specifically…
5
votes
1 answer

How to get better IAM understanding

I'm getting interested in Identity and Access Management (IAM), but I find it hard to find complete and understandable explanations that suit me, surely because I started wrong. I began with Wikipedia and followed discussions here and there…
Bytemare
  • 143
  • 5
3
votes
1 answer

Access based on type of information requested and access grant

The simple solution to access restriction when number of users are small is Access Control Matrix. Here the rows are the users and columns are different types of asset. In my case, I have a document which I need to serve which have different…
prakharjain
  • 447
  • 1
  • 3
  • 11
1
vote
1 answer

How to implement MySQL query fo RBAC authorization with fine grained business restrictions in role?

When implementing an authorization system like RBAC/DAC, or XACML, or the AWS IAM authorization model, I see that I can't totally decouple business logic from authorization when there are fine-grained business restrictions. We don't use ORM. When…
null_pointer
  • 111
  • 2
1
vote
1 answer

Attribute-based access control standard definition

While reading a number of definitions of attribute-based access control (ABAC), I found that there are two different definitions: Access control decisions are made using the attributes of users, objects and the environment. Access control…
synthesis
  • 155
  • 1
  • 1
  • 15
1
vote
1 answer

Authorization based on OASIS ABAC/RBAC/XACML approach

Is anybody aware of any open source .NET authorization solution based on OASIS ABAC/RBAC/XACML approach? I have found some visible amount of Java based solutions but it seems .NET is completely out of it (lack of interest, not in trend?). What does…
AC.
  • 113
  • 5