What Is Attribute-Based Access Control (ABAC)?

Attribute-based access control (ABAC) is an authorisation model that evaluates attributes (or characteristics), rather than roles, to determine access. The purpose of ABAC is to protect objects such as data, network devices, and IT resources from unauthorised users and actions—those that don’t have “approved” characteristics as defined by an…

Magic Links: Passwordless Login for Your Users

Magic links are a form of passwordless login. Instead of the user entering any login credentials to sign in, they are sent a URL with an embedded token via email, and sometimes via SMS. Once the user clicks that link to authenticate, they are redirected back to the application or system having successfully signed in—as if they used a “magic”…

5 Reasons You Want an Out-of-the-Box Identity Service

Whether you’re building a new app or migrating a legacy app to the cloud, you face a choice: build everything in-house or selectively use out-of-the-box services to make the job easier and faster. Out-of-the-box services like Twilio, for messaging, and Braintree, for payments, have gained popularity because they help lean dev teams remain agile…

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorisation credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

Byte-Sized Video: Don’t Limit the Scope of Your SSO and MFA

No matter how much you may love your users, you can’t trust all of them. With so many individuals and devices accessing your apps, and requests coming from various networks, there’s a real risk of bad actors slipping through the cracks. Single-sign on (SSO) and multi-factor authentication (MFA) are must-haves when it comes to modern security. To…

Archive

Follow Us
Share on Linkedin Share on Youtube