Independent. Dynamic. Involved.

Access Control

Traxion Access Control includes controlling access to systems, processes and information. The access control is based on one of more authorization models.

The following authorization models are often applied:

Risk-based authentication
With risk-based authentication, characteristics are mapped and weighed with which it is determined which minimum authentication means are needed before a user gains access to the desired information.

Attribute Based authentication
Attribute Based Access Control (ABAC) is a logical access control method, based on the applicant’s attributes, information, action and context of the application.

Role based authentication
Role Based Access Control (RBAC) is an access control method based on the role of the applicant.

A combination of authentication models often occurs. Read more in the various blogs about access control.

Confidental Infomation