A Brief on the Role of the Axway APIGW in ABAC

Short, sweet, and to the point. Less than 500 words that talks about the role of an API Gateway in ABAC security, and how things can tie together or be orchestrated. Enjoy!

The Axway API Gateway (APIGW) has the ability to act as many roles regarding the components of ABAC security. While generally not used for the actual IDP (identity provider) portion, it does have capabilities around user generation and attribute storage. Generally the Axway APIGW will be used to connect to one or more IDPs, such as LDAP, AD, Siteminder, OAM, etc. When a user attempts to access a resource, the APIGW will authenticate the user against the appropriate IDP, which can be chosen contextually by things such as IP, URI, service invoked, digital channel [ie mobile], etc. After successful authentication, the APIGW will gather attributes from the IDP and any other sources such as attribute servers, user credential (such as a PKI credential with OU and the like), or microservices to build out a profile for the user. This profile can either be cached locally with a reference session ID or cookie given to the user for invoking future calls or given to the user to resubmit, though generally the aforementioned method is used for lowering bandwidth required and client side storage.

For the actual secured resources, the APIGW can also handle creating and storing the entitle management portion on behalf of the application or resource, can read the entitle management portion from the resource and compare it to the authorization information collected in the form of user-agent attributes, or can provide the attribute token to the resource to make the decision on its own behalf. As a result, it can act as a PDP, PEP, or both depending on the security architecture. Effectively this gives the APIGW the ability to tag the user, tag the data, and set the digital policy management to compare the security assertions created against the entitlement management to make an appropriate authorization decision regarding user access for the request, or anything in between.

The APIGW does not however have to act on the entire resource or application container. It has the ability to compare ABAC controls to apply authorization granularly to a response to redact document fields before streaming them back to the user, allowing for very fine grain control based on document markup language of field names/attributes.


Finally due to the nature of the APIGW, once it has done the authentication and attribute retrieval portions of the security, it can even generate new credentials (Basic, X509, etc) as needed and supply those dynamically to the back end based on its needs, allowing for full services as a security token service as well as a lightweight ESB. The API Management and OAuth functionality extend this further allowing developers or resource owners to choose different policies to secure their APIs and applications, as well as managing things such as OAuth rights derived from SAML, client credentials, JSON Web Tokens, etc, which it can both consume and create. The Axway APIGW is a very powerful tool that can handle all aspects of ABAC and create custom and very granular process flows for any use case.

Comments

Post a Comment

Popular posts from this blog

Firewall, IDS, IDP, WAF, API Gateway: Choose Your Shield

API Security - The Next Generation with Elastic Beam

REST API Best Practices: HTTP Status Codes and You, Part 2(xx) - Status 200; Success!