Questions tagged [abac]

Attribute Based Access Control (ABAC) is an access control method based on attributes (key-value pairs) that are used inside policies and rules to express access control logic.

Attribute Based Access Control (ABAC) is an access control method where subject requests to perform operations on objects are granted or denied based on assigned attributes of the subject, assigned attributes of the object, environment conditions, and a set of policies that are specified in terms of those attributes and conditions.

Source: Guide to Attribute Based Access Control (ABAC) Definition and Considerations

In short, ABAC is an evolution of the role-based access control model (). Where RBAC focuses on the user, its role(s), permissions, and optionally group(s) to define authorization logic, ABAC uses attributes and policies to define access control logic.

Attributes are key-values pairs e.g. role==manager or citizenship==Swedish. Attributes can describe:

  • the user
  • the resource or object being accessed / requested
  • the action being attempted (view, delete, approve...)
  • contextual data such as the time of the day, the user's IP, the authentication method...

is an example of a standard which implements ABAC. is a pseudo-code that can be used to design and implement ABAC policies.

286 questions
4
votes
1 answer

Defining Resource In ABAC

I want to develop an Attribute-based access control (ABAC) Web API in ASP .NET Core, in which other businesses can define their environments, resources, actions, and subjects, because we do not want developers to hardcode details in their code. I…
Arman Ziaei
  • 168
  • 1
  • 7
4
votes
1 answer

Spring abac data filtering vs Spring @PostFilter

I am using ABAC model for securing access to some entities in project. According to https://dzone.com/articles/simple-attribute-based-access-control-with-spring, I can easily define some policy rules for updating/deleting entities in project. After…
4
votes
1 answer

How to implement ABAC- Attribute Based Access Control in nodejs? Is it good / fit for small and large scale application?

How I can implement ABAC in nodejs. I want to give access to user using his location and role. any one have demo for it? I am refering npm package PolicyLine: npm i policyline refer link - https://www.npmjs.com/package/policyline
Vaibhav Gaikwad
  • 811
  • 2
  • 12
  • 21
4
votes
1 answer

Record level access control for REST API GET Collection call

So, I am working on the next project that requires more detailed access control functionality (i.e. Sally can only view products in her department). I get how either a role based access control model or an attribute access control model can 'wrap'…
Jeff
  • 227
  • 1
  • 4
  • 13
4
votes
1 answer

Difference between target and condition in XACML

I would like to fixe the differences between target and condition in XACML language and when should I use target or condition.
A.Gh
  • 109
  • 1
  • 1
  • 6
4
votes
1 answer

Ways to implement "Attribute Based Access Control" with GraphQL

While GraphQL mentions security should be delegated to underlying business logic, the nature of GraphQL lends itself very well to security. In GraphQL the Query can have a resolve method, also each field can have a resolve method. In a way we are…
user1354471
4
votes
4 answers

ABAC support for Spring Security or Apache Shiro

I'm trying to find any open-source or commercial implementation of Attribute-Based Access Control(ABAC) paradigm that will work together with Spring Security or Apache Shiro frameworks. Right now I can't find any of them. I don't think I'm a first…
alexanoid
  • 24,051
  • 54
  • 210
  • 410
4
votes
1 answer

Attribute based vs. activity based access control

What's the difference between attribute based access control and activity based access control within cloud authorization context?
thisisemar
  • 43
  • 4
4
votes
1 answer

Open source policy editor tool for XACML 3.0 policy creation

I am using XACML 3.0 for authorization in my project is their any open source policy editor tool so that I can create policies on the fly.
Utsav
  • 1,593
  • 4
  • 22
  • 46
3
votes
1 answer

Authorization of List/Search endpoints in REST API

I want to understand how to deal with authorization in REST API with endpoints like below GET /resource/:id DELETE /resource/:id GET /resource Assumptions User Bob is authenticated. Bob only owns resources with id 1,2,4,5,6 but 3 System has an…
Ozan ERTÜRK
  • 319
  • 5
  • 13
3
votes
3 answers

How to validate application authorizations in a hierarchical RBAC/ABAC policy definition with Open Policy Agent?

We are building a cloud based application, using C# as our main language and running on Microsoft Azure. One of the key pieces of the architecture is to have fine grained authorization rights implemented for business logic in the application. Open…
Sam Vanhoutte
  • 3,247
  • 27
  • 48
3
votes
1 answer

how to implement attribute base access control in python based web application?

i have a web application written in python(django REST framework) , now i want to implement attribute based access control(ABAC) on my web application for authorization , how can i implement ABAC policies on this application (can i use XACML…
Ziarmal
  • 41
  • 2
3
votes
0 answers

Deploy a Javascript Policy in Keycloak 10

I've followed the Create a JAR with the scripts to deploy instruction to create a custom Javascript policy for checking user attributes and it seems to be deployed successfully, however, I can't see the policy name in the create policy dropdown. Is…
3
votes
1 answer

How to do logical AND for Rule combining for XACML

My scenario is I have a Policy with several rules and all the rules need to be true for the policy to be true. For example: Policy A - Rule 1 - Rule 2 - Rule 3 For Policy A to be applicable, i need all three Rules to return…
Samuel
  • 325
  • 4
  • 10
3
votes
1 answer

Can GCP IAM can be used to provide access control on users of my business application

I'm investigating different types of authorisation solutions that would provide ABAC style access control. I was wondering if GCP IAM can be used for that purpose, to provide custom business application resource access control?
alobodzk
  • 1,284
  • 2
  • 15
  • 27
1
2
3
19 20