KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
This Leadership Compass looks at Policy-based Access Management / Control (PBAM / PBAC) solutions that utilize policies for defining the access entitlements and that are enforcing these policies at the time of authorization. Notably, such systems also can support authentication decisions by integrating with authentication solutions. This Leadership Compasses uses the term PBAM. To better understand the fundamental principles this report is based on, please refer to KuppingerCole’s Research Methodology.
Policy-Based Access Management (PBAM) is closely related to the term ABAC (Attribute-Based Access Control). ABAC is frequently used to differentiate from Role-Based Access Control (RBAC). However, roles are just one type of attribute, thus the line between ABAC and RBAC is blurred, with RBAC solutions supporting dynamic role memberships based on attributes. The primary distinction is between policy-based authorization decisions and decisions that are based on static entitlements, also frequently referred to as standing privileges. In contrast to common understanding, real-time is not a differentiator, because authorization decisions in systems relying on static entitlements also are made in real-time, for instance when checking Access Control Lists (ACLs) vs. Kerberos tickets when a user is accessing files on a Windows file server.
However, there is a real-time aspect that plays a vital role for PBAM gaining attraction. This is about changes to entitlements becoming immediately effective. In the age of agile IT and DevOps (Development & Operations), the inherent limitations of access control approaches that are based on static entitlements increasingly become unacceptable:
Policy-based approaches build on centrally managed policies that are consistent across systems and immediately enforced. When a policy changes, the authorization decisions are immediately based on the changed policy.
Another blurring line is between authentication and authorization. Both are parts of Access Management. Authentication commonly is policy-based, but only covers the initial or continual proof that a user can provide the proof of its identity. Authorization is what happens after authentication when a user accesses protected resources. It is a repeated process with high requirements on performance, scalability, and reliability. PBAM solutions thus must scale well to not become a bottleneck. This also involves the placement of PBAM components, where the policy enforcement commonly takes place very close to the application.
Organizations are well-advised first developing a PBAM strategy and blueprint. The foundation for that is identifying the current and future use cases for PBAM and assessing both the state of the infrastructure and the maturity of solutions in the market to define the PBAM roadmap.
While implementation of PBAM will follow a multi-speed approach, there are elements that must be defined early, for a gradual convergence into a consistent PBAM approach across use cases. Common across the use cases are the policy management and governance elements. Higher-level policies such as generic rules for employee vs. non-employee access or policies derived from regulations such as GDPR impact a range of lower-level policies and must be defined and managed consistently across use cases. We expect the trend to PBAM adoption to continue, driven by adoption in application-level PBAM use for modern, digital services and for managing Cloud infrastructure security.
A policy-based access management system can offer significant benefits to corporations, provided the solution is designed and deployed to meet the organization’s specific requirements.
In developing requirements and deploying a solution for PBAC, the following should be considered: