SSOCircle

  • Home
    • Service Status
  • Portfolio
    • Public IDP
      • Meta Data
      • X.509 PKI
      • AuthContext Tour
    • White Label IDP
      • Quick Tour IDPee
    • SAML Test
      • SSOCheck Tool
      • SSOCheck API
      • SAML SP Certification
      • SAML Monitor Light
    • OpenAM OS Support
    • IDP-Proxy
    • MyIdentityGraph
    • Authz as a Service
    • Support
    • Consulting/Research
    • Donation
    • Pricing
  • Knowledge Center
    • IDP Tips & Tricks
      • Public IDP How-To
      • Public IDP Data
      • Metadata Editor
      • Debugging IDP
      • SAML with cURL
        • Tutorial: Part I
        • Tutorial: Part II
    • PKI for X.509 Auth
    • SSOCheck Tool
      • Tool Quickstart
      • Sample Script 1
      • Sample Script 2
    • SSOCheck API
      • Test AuthZ API
      • Test Config API
      • Test Execution API
      • Test Rules
      • SAML with cURL
        • Tutorial Part I
        • Tutorial: Part II
    • MyIDGraph Ontology
    • MyIDGraph Manual
      • Quick Start
      • General Usage Options
      • Exploring a Vertex
      • Requesting Permissions
      • Approving and Declining Permission Requests
      • Removing Access Permissions
      • Delegate Permissions to another Person
    • AzaaS ReBAC Manual
      • ReBAC
      • AzaaS Quick Start
    • Debugging Toolbox
      • Session Cookie Decoder
      • Password Encryption
      • Password Decryption
      • SAML Decoder
      • SAML Encoder
    • Service Provider
    • Federation
      • SAML 2.0
      • Glossary
  • Blog
  • About Us
    • Contact
    • Ticket
    • Imprint
  • Sign In / Register
    • Login
    • Logout
    • Global Logout
    • Register

You are here: SSOCircle » Tag: IoT

Relationship Based Access Control in IoT and User Managed Access

English on April 25th, 2017 No Comments

Relationship Based Access Control (ReBAC) models originate from access control considerations made for Online Social Networks (OSN). In original ReBAC studies User-to-User (U2U) relations determine the access control decision made whenever a user (accessor) tries to access a resource. Policies typically evaluate the type, depth and strength of the U2U relation between the accessor and […]

Tags: IoT, MyIdentityGraph, ReBAC

RSS Kuppinger & Cole

  • Supercharge Your Access Control Capabilities With a New Approach
  • Evolveum MidPoint 4.8 Release
  • The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
  • Jan 18, 2024: SAP IDM End of Life: Die IGA-Migration souverän meistern
  • Jan 25, 2024: Beyond Secrets Management: Transforming Security in the Digital Age

RSS Gartner Blog

RSS Computer Week Security

  • Rhysida ransomware gang hits hospital holding royal family’s data
  • Cyber and remote working: How Covid moved the cursor
  • Report reveals sorry state of cyber security at UK football clubs
  • Mitre ATT&CK framework
  • The Security Interviews: Mark McClain, SailPoint Technologies
Copyright © SSOCircle | site notice | terms | privacy policy