• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

Attribute-Based Access Control (ABAC)

What is Attribute-Based Access Control (ABAC)?

Attribute-Based Access Control (ABAC) is an advanced access control method that grants or denies access to resources based on attributes associated with the user, the resource, actions, and the operational environment. Instead of relying solely on roles, as in Role-Based Access Control (RBAC), ABAC uses a set of policies, rules, and relationships that consider specific attributes.

Key components

  • Attributes: These are distinct characteristics or metadata tags assigned to users and resources. Attributes can represent anything from a user's department, title, or location to a resource's classification level or owner.
  • Policies: These are dynamic rules or guidelines that define access conditions based on attribute values. For instance, a policy might state that only users with the attribute "Department: HR" can access resources with the attribute "Type: Employee Records."
  • Access decision: When a user attempts to access a resource, the ABAC system evaluates the user's attributes against policies to determine if access should be granted.

Implementing Attribute-Based Access Control (ABAC)

Implementing ABAC is a complex task that relies on an organization's clear understanding of its access control needs. Engaging key stakeholders, such as those from IT, security, and operations, is fundamental to this understanding. 

Once you form a clear picture, you must carefully define specific details such as job title and classification levels. Creating policies is the next critical step. These policies use attributes to control access, making sure only finance department members can access financial data during business hours. Integration with existing directory services and resource management systems ensures that the ABAC system can efficiently harness user and resource attributes. 

As with any robust system, rigorous testing is essential. This involves validating policy efficacy in controlled environments and assessing system performance under different scenarios. 

Furthermore, a proactive approach to monitoring and auditing, supported by comprehensive logging, offers insights into access patterns and potential anomalies. Periodic policy reviews, driven by organizational shifts and feedback loops, help in refining access strategies. 

Equally vital is the emphasis on training, ensuring that both system administrators and end-users are well-versed in ABAC nuances. Lastly, updating the system with software updates and attribute changes is important. This ensures that the ABAC framework remains strong, flexible, and aligned with the organization's changing needs. 

How does ABAC work?

ABAC, at its core, is an access control model that uses attributes to define security policies. These attributes can be associated with a user, a resource, an action, or the environment. When a user attempts to access a resource, ABAC evaluates these attributes and applies the relevant security policy. This decision is based on predefined rules that consider the attributes of the user, the resource, the action, and the environment.  

The operation of ABAC is straightforward yet effective. When a user tries to access a resource, the system evaluates the associated attributes. These attributes are then matched against the rules defined in the security policy. If the attributes align with the rules, access is granted; otherwise, it is denied. This approach to identity management ensures a high level of data security. 

The power of ABAC lies in its versatility and granularity. It allows organizations to define complex security policies that can accommodate a wide range of scenarios. 

Benefits of implementing ABAC (Attribute-Based Access Control)

  • Granular control: ABAC offers fine-grained access control, allowing organizations to specify access rights with great precision based on multiple conditions. 
  • Flexibility and scalability: ABAC's dynamic nature allows it to adapt to changing business needs without rigidly pre-defined roles, making it scalable across various organizational sizes and structures. 
  • Context-aware decisions: ABAC considers multiple factors, including environmental and contextual attributes, ensuring access decisions are made with a broader understanding of the situation. 
  • Enhanced security: By providing tailored access based on multiple attributes, ABAC reduces the risk of unauthorized access and data breaches.
  • Reduced complexity: While initial setup might be involved, once in place, ABAC can reduce the complexity of managing access rights, especially in environments where roles alone are insufficient. 
  • Dynamic adaptability: As attributes change, access rights can automatically adjust. For example, if an employee moves to a different department, their access can change based on their new attributes without manual intervention.
  • Regulatory compliance: Many modern regulations demand granular access controls and audit trails. ABAC's detailed policy enforcement and logging capabilities can aid in compliance with such standards.
  • Consistent policy enforcement: With a centralized policy decision point, ABAC ensures consistent application of access policies across the organization.
  • Reduction of insider threats: By adhering to the principle of least privilege and tailoring access rights closely to real needs, ABAC minimizes the potential damage insiders can inflict.
  • Improved audit and reporting: ABAC systems often provide robust logging and reporting tools, giving insights into access patterns, which is invaluable for audits and security reviews.

When it comes to addressing your precise security and compliance requirements in the realm of identity governance, there is no better partner to assist you. Discover how our expertise can empower you with Attribute-Based Access Control (ABAC), ensuring the protection of sensitive data, regardless of its location.

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy