Questions tagged [abac]

Attribute Based Access Control (ABAC) is an access control method based on attributes (key-value pairs) that are used inside policies and rules to express access control logic.

Attribute Based Access Control (ABAC) is an access control method where subject requests to perform operations on objects are granted or denied based on assigned attributes of the subject, assigned attributes of the object, environment conditions, and a set of policies that are specified in terms of those attributes and conditions.

Source: Guide to Attribute Based Access Control (ABAC) Definition and Considerations

In short, ABAC is an evolution of the role-based access control model (). Where RBAC focuses on the user, its role(s), permissions, and optionally group(s) to define authorization logic, ABAC uses attributes and policies to define access control logic.

Attributes are key-values pairs e.g. role==manager or citizenship==Swedish. Attributes can describe:

  • the user
  • the resource or object being accessed / requested
  • the action being attempted (view, delete, approve...)
  • contextual data such as the time of the day, the user's IP, the authentication method...

is an example of a standard which implements ABAC. is a pseudo-code that can be used to design and implement ABAC policies.

286 questions
3
votes
0 answers

ABAC with Spring SPEL - check if a project is assigned to a user through a from a list of projects

I'm new to spEL. Im trying to implement attribute based access control in a spring boot application using spEL. I pass the user object and the project to the access control provider to evaluate permission. Below is my policy file to check…
Tika
  • 2,573
  • 2
  • 12
  • 10
3
votes
1 answer

Securing REST API with WSO2 IS and XACML Policy

I try to secure my rest API(in wso2 ESB) with OAuth mediator and wso2 IS. I want to permit a user with a valid token, when, the request is matching a specific URI (that call from ESB exp /sample/test) and also matches with other conditions such as…
Soli
  • 545
  • 5
  • 11
3
votes
1 answer

Authorization of UI Controls Based On Multiple Factors (User Role, Location, etc)

I have a workflow process where I am sending an object (Order in this case) through multiple departments (locations). The same form is used for every process stage, but different elements of the UI are enabled or made visible based on certain…
Kevin
  • 172
  • 1
  • 12
3
votes
2 answers

Evaluate XACML 3.0 combining algorithms

I am studying XACML 3.0 access control and I found this complex question about Evaluate XACML 3.0 combining algorithms. I can solve a simple exercise but this one hard for me and I need some help with it policy p1: - op: permit-overrides rule:…
Memo
  • 53
  • 6
3
votes
2 answers

Axiomatics - condition editor

I have a subject like "accessTo" = ["123", "123-edit"] and a resource like "interestedId" = "123" Now I'm trying to write a condition - where it checks "interestedId" concatenated with "-edit" equals "123-edit" in "AccessTo". Im trying to write rule…
user2608601
  • 147
  • 1
  • 10
3
votes
1 answer

ABAC PIP Attributes Request

How shall PIPs resolve correct attribute values? Which kind of interface should it have to be able to resolve the attribute value? For example, I need to get user roles and in this case I just need to pass an attribute for the user id. Let's now…
Artsiom Miksiuk
  • 3,896
  • 9
  • 33
  • 49
3
votes
1 answer

Java JPA: create JPA queries dynamically based on permissions

We have the following problem: we have 2 different user groups, that can form consents and a method (e.g. getAllValues()) should only return the values the user has access to. Each value has a timestamp and each consent has a beginning and an end…
3
votes
1 answer

Complex Authorization using XACML

My company is looking to implement a centralized security service, and it seems like a popular standard for that is XACML. I have a complex authorization scenario and I've been having trouble figuring out how it could be defined using attributes for…
Shawn
  • 133
  • 2
  • 10
3
votes
0 answers

ALFA to XACML plugin

The Alfa language submitted to OASIS by Axiomatics looks quite nice. However I wonder whether there is any free compiler from Alfa to XACML. The license file which comes with the Axiomatics Eclipse plugin states it is for non-commercial /…
John
  • 31
  • 1
3
votes
2 answers

Does XACML implement a “NOT EQUAL” function?

Scanning through the OASIS XACML V3 specifications I did not find any reference to a logical function [ here ] that implements a “String-not-equal” operation. The missing function is:
Claude Falbriard
  • 925
  • 8
  • 27
3
votes
1 answer

When XACML talks about a "regexp-match", which regexp rules is it referring to?

I've used up a lot of time on regular expressions that I thought concisely and accurately represented the resource URI and action string ranges I wanted to permit, but it returns a Deny for every seemingly valid match. I have yet to see a useful,…
Jerry Miller
  • 921
  • 1
  • 8
  • 11
3
votes
1 answer

Collection filtering based on permission

Lets say there are resources like the files. Who, when, where have an access to the individual file is not a problem. Assume that there is a resource like a directory which has its own attributes and contain other files, directories and/or some…
Albert
  • 78
  • 4
3
votes
2 answers

Is an ACL always required?

For web applications with highly complex access control rules, do you always use an ACL? When determining my users' privileges I have a multitude of considerations, including: Are they logged in? Are they an Admin, or a Normal User? Are they…
DatsunBing
  • 8,684
  • 17
  • 87
  • 172
3
votes
2 answers

What is a XACML profile?

I'm new to XACML (the eXtensible Access Control Markup Language), and I'm a bit confused. I don't get what a profile is. For example the RBAC or SAML profiles. What's the difference among them? Isn't the structure and elements always the same? Thank…
DeLac
  • 1,068
  • 13
  • 43
2
votes
1 answer

Filtering denied items from collection in ABAC model

I'm trying to the implement ABAC model in my application (microservices architecture) and I have one problem. I have user U which has 'deny' permission for one item X of collection CollectionX. And I don't understand, how I can implement the next…
snakeduse
  • 71
  • 4
1 2
3
19 20