Rules are created using these attributes that establish the access policy for the organisation.
Examples of these attributes are: name and role, address information or corporate information, read and write rights and the geographical location or time.
An advantage of ABAC is the real-time access to all information within the organisation for all types of requests. This is also accomplished without the need to configure a large-scale administration model.
ABAC provides the indispensable resources to enable security to be accomplished via Who, What, Where, Why and With what.
Traxion considers ABAC to be a continuation of Role Based Access Control (RBAC). If you want to know more about Attribute-Based Access Control, the pros and cons or its implementation, feel free to contact us.Get in contact
André Crone - Architect I Eneco
The people at Traxion we work with are without exception good at their job. They are young enthusiastic professionals with a high level of knowledge. They can not only answer all our questions, but also provide a good substantiation of their advice. That gives a lot of confidence in our partnership with Traxion.