• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance
  • Data Breach Mitigation

Active Directory

Azure (O365)

SAP

SAP SuccessFactors

Workday

AWS

Linux Server

LDAP

Microsoft SQL Server

Google Cloud

Windows Server

Oracle EBS

ServiceNow

SAP Fiori

Oracle Fusion

Entra ID

Salesforce

Keycloak

Custom Applications

Education

Manage identity for students, staff and alumni

Financial Services

Address the compliance and security challenges of the financial sector

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

PCI DSS

Compliance with the Payment Card Industry Data Security Standard

SOC 2

Solutions for organizations subject to SOC 2 audits

GDPR

Take advantage of OpenIAM to comply with the General Data Protection Regulation

Social Engineering Attacks

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

Attribute-Based Access Control (ABAC)

Understanding Attribute-Based Access Control (ABAC)

Attribute-Based Access Control (ABAC) is a model that makes access decisions dynamically based on attributes related to the user, resource, action, and environment. Unlike Role-Based Access Control (RBAC), which uses predefined roles, ABAC evaluates real-time conditions — such as department, location, device type, and data classification — before granting access.

This allows organizations to enforce fine-grained, context-aware policies that adapt automatically as user or system attributes change. ABAC complements RBAC within Workforce Identity, delivering flexibility and precision where static role models alone may not suffice.

Why ABAC Matters in Workforce Identity

Modern enterprises operate across hybrid environments where users, data, and systems change constantly. While RBAC defines who should have access, ABAC decides when, where, and under what conditions access should be allowed.

ABAC helps organizations:

  • Enforce adaptive, context-aware policies
  • Reduce over-provisioning and dormant access
  • Strengthen Zero Trust by validating each request dynamically
  • Simplify compliance with clear, traceable policy logic

ABAC is particularly effective in large or regulated organizations where static roles cannot capture all access nuances.

How ABAC Works

ABAC decisions are driven by attributes — metadata describing users, resources, and contextual conditions.

These attributes aren’t only used for real-time authorization; in platforms like OpenIAM, they also drive automated access assignments through business rules.

Attribute Type Example
User

Department, title, employment type, location

Resource Application, entitlement, sensitivity level 
Environment  Region, time zone, or compliance domain 

 


Decision Process in Identity Context

In OpenIAM’s implementation, ABAC isn’t just about evaluating access requests — it determines what access a user should be entitled to automatically based on their attributes.

Example:

  • If Department = Finance and Location = London → assign the role “Accounts Payable Clerk”
  • If EmploymentType = Contractor → entitle user to VPN_Contractor_Group and TimesheetApp.

Whenever a user’s attributes change (e.g., they move departments or locations), OpenIAM automatically adjusts their access to reflect the new conditions — granting or revoking entitlements as needed.

This approach makes ABAC a policy-driven entitlement engine, not just a runtime gatekeeper. It ensures users always have the right level of access without requiring manual provisioning.

In real-time authorization systems (such as OPA or application-level enforcement), ABAC can also evaluate whether a user is allowed to perform a specific action at the moment of request. Together, these two layers — entitlement determination and access enforcement — form a complete, adaptive access control model.

Business and Technical Attributes

Like RBAC’s business and technical roles, ABAC benefits from a layered approach to attributes:

  • Business Attributes describe context in business terms (e.g., Department = HR, Data Type = Employee Record).
  • Technical Attributes capture system-level data (e.g., AD_Group = HR_ReadOnly, Network = Internal_VLAN).

In OpenIAM, both are managed through a unified policy framework, ensuring that policies are understandable to business owners yet enforceable across technical systems.

Benefits of Implementing ABAC

  • Granular control: Apply access policies that reflect real-world context.
  • Dynamic adaptability: Access adjusts automatically as attributes change.
  • Reduced over-provisioning: No need to define every possible role.
  • Auditability: Every policy decision is traceable and reviewable.
  • Scalability: Works across on-premises and cloud applications.
  • Zero Trust alignment: Evaluates context for each request, continuously.

ABAC vs. RBAC — Working Together

Model Best For Limitation Combined Strength
RBAC Stable, structured access based on roles  Static — can’t reflect changing conditions  Baseline entitlements 
ABAC Contextual, dynamic access  Depends on accurate attribute data  Real-time control and adaptability 

 


Most mature IAM programs use a hybrid RBAC + ABAC model: RBAC defines the baseline, while ABAC adds dynamic conditions for fine-grained control.

Building Attribute Policies — Start with Data Quality

Effective ABAC depends on clean, reliable attribute data.

It’s best to start simple — define policies around a few high-quality attributes such as Department, Data Classification, or Device Type.

As attribute governance improves, expand your policies to include more conditions and systems.

OpenIAM’s identity governance capabilities help maintain attribute consistency across directories and applications, ensuring that ABAC decisions are always based on accurate data.

Policy Standards and Frameworks in ABAC

Over the years, several standards have influenced how ABAC policies are defined and enforced.

  • XACML (eXtensible Access Control Markup Language) introduced one of the first formal policy languages for ABAC.
  • It offered a powerful XML-based model but proved complex and difficult to adopt broadly, especially across distributed and cloud systems. Still, it laid the conceptual foundation for modern attribute-based policy models.
  • OPA (Open Policy Agent) represents a newer, cloud-native approach. It provides a lightweight, open-source engine and a declarative policy language called Rego, designed for flexibility in modern microservices and DevSecOps environments.

OpenIAM takes a standards-aware but implementation-focused approach.

The platform embraces the clarity and centralized control concept introduced by XACML while emphasizing usability, automation, and real-world integration.

Looking forward, OPA-style policy engines and declarative models align closely with OpenIAM’s long-term vision for dynamic, attribute-driven access control and future AI-assisted policy management.

Defining Attribute-Based Policies and Business Rules in OpenIAM

OpenIAM extends ABAC beyond decision-making to automated identity lifecycle operations.

Through its business rules engine, administrators can define attribute-based conditions that dynamically assign roles or entitlements.

Examples include:

  • If Department = Finance and Location = London → assign role “Accounts Payable Clerk”
  • If EmployeeType = Contractor → grant entitlements VPN_Contractor_Group and TimesheetApp directly.

When a user’s attributes change — such as department transfer or job role update — OpenIAM automatically updates their access to match. This connects attribute-based policies to real-time provisioning, minimizing manual work while maintaining governance and compliance.

With OpenIAM’s business rules, ABAC policies automatically grant, revoke, or adjust access rights in real time.

 

FAQ- Frequently Asked Questions

How does ABAC differ from RBAC?

RBAC uses predefined roles, while ABAC evaluates real-time attributes such as department, device, and data sensitivity. Together, they deliver structure and adaptability.

How to change password?

Yes. Attribute accuracy is crucial. Many organizations start with RBAC and evolve to ABAC as their identity data becomes more consistent.

Is ABAC part of Zero Trust?

Absolutely. Zero Trust assumes no implicit trust. ABAC enforces it by continuously validating each access request based on real-time context.

Related Concepts

  • Role-Based Access Control (RBAC)
  • Identity Governance (IGA)
  • Workforce Identity Concepts
  • Zero Trust Architecture (ZTA)

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy