Early-bird Discount
expires in
Register Now

Agenda

Modern Authentication Approaches (AuthZ) 

Modern Authentication Approaches (AuthZ) 

Combined Session
Thursday, May 08, 2025 11:00—12:00
Location: B07-08

AI-Powered Access: What We Know About Knowledge and Knowledge-Based Access Control
11:00—11:20
 
As AI continues to transform the way we interact with technology, it's crucial for the Identity and Access Management (IAM) industry to evolve alongside it. Enter Knowledge-Based Access Control (KBAC)—the cutting-edge development that pushes beyond traditional Authorization models such as ABAC, ReBAC, and RBAC by integrating AI and knowledge.
In this session, you'll discover what "knowledge" truly means in the context of IAM and how KBAC enables real-time, dynamic and fully educated authorization decisions. You will learn how KBAC not only determines who has access to what at any given moment, but also answers complex questions such as who should or shouldn't have access, predicts future access needs, and can even assesses user intentions in real time.
Join us to explore how KBAC is shaping the future of authorization—where AI and knowledge combine to create smarter, more adaptive access control systems.
Alexandre Babeanu
Lead Product Manager, Access Management
IndyKite
Alex is a seasoned expert with nearly a decade of experience in leveraging graph databases for Identity and Access Management (IAM). As a certified graph and IAM consultant, he has successfully...
CBAC! Cedar Based Access Control
11:20—11:40
 
Does Cedar deserve its own Back? An argument can certainly be made that it combines RBAC and ABAC--slicing the data first with RBAC and then iterating with ABAC. However, Cedar's power also lies in its tight enforcement of schema, which enables developers to model security based on their exact entity model. To not define a new "BAC" for Cedar Based Access Control" wouldn't notify the community how revolutionary it really is.
Michael Schwartz
Founder / CEO
Gluu, Inc.
Mike is the Founder/CEO of Gluu, and leads the Linux Foundation Janssen Project. He is the co-author of the book "Securing the Perimeter", Apress 2018, about how to use open source IAM tools. In...
Almost Ready to Join the EIC 2025?
Reach out to our team with any remaining questions
Get in touch