top of page

The Seven Steps of Role Engineering

Role engineering takes us from a human readable policy syntax to what is loaded into an rbac engine and used by an application or system

Why Another Open Source IAM Product?

A question that has been lingering. It’s fair game, but before I get around to actually answering, let’s remember how we got here. Late...

ABAC – Where are the Functional Specs?

As a security architect I have long-awaited the means to express authorization policies using dynamic constraints – in a standard way....

Symas Blog

bottom of page