Shawn McKinneyMar 5, 20156 min readThe Seven Steps of Role EngineeringRole engineering takes us from a human readable policy syntax to what is loaded into an rbac engine and used by an application or system
Shawn McKinneyJan 4, 20152 min readWhy Another Open Source IAM Product?A question that has been lingering. It’s fair game, but before I get around to actually answering, let’s remember how we got here. Late...
Shawn McKinneyNov 29, 20141 min readABAC – Where are the Functional Specs?As a security architect I have long-awaited the means to express authorization policies using dynamic constraints – in a standard way....