SlideShare a Scribd company logo
Kondo-ing API Authorization
Remy Lyle
OCT 2019
1 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.
HI! I’M REMY
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.2
• Global Tech Enablement Team @ Ping
Identity
• Denver, CO, USA
• Convinced that APIs are the next frontier
for identity and security
• Marie Kondo is a personal hero
MARIE KONDO
 Tidying Expert,
Bestselling Author,
Netflix Hit Show Star
 NYTimes Best Selling
Book, The Life
Changing Magic of
Tidying Up
 “Does it spark joy?”
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.3
BUT… FOR
API
AUTHORIZATIONS?
4 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.
https://www.wsj.com/articles/kondo-ing-a-
guru-of-organizing-becomes-a-verb-
11547745648
ANATOMY OF AN API
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.5
JSON
GET /getData
ANATOMY OF AN API
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.6
JSON
GET /getData
Scopes
Identity
Attributes
Privacy
Preferences
User Consents
Data
Regulations
Zero Trust
AND HOW MANY DO YOU HAVE?
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.7 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.7
FOUR DATA OBSTACLES
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.8
1. Data is detailed and complex.
2. It’s everywhere and accessed many ways.
3. Multiple stakeholders, moving targets and
ever-changing landscape of data security
policies and regulation
4. Data transactions are subjected to different
layers of authorization decisions
THIS IS A REAL PROBLEM
 OWASP Top API Security Top 10 Risk
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.9
https://www.owasp.org/index.php/OWASP_API_Security_Project
WITH REAL-LIFE CONSEQUENCES
 In 2018, a research fellow with Mozilla Foundation
scraped nearly 208 million transactions on peer-to-peer
payment app Venmo revealing purchase profiles of its
users
 In June 2019, another 7 million transactions were
scraped using the company’s developer API over six
months
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.10
Sources: https://www.darkreading.com/application-security/apis-get-their-own-top-10-security-list/d/d-id/1335786
https://22-8miles.com/public-by-default/
https://www.wired.com/story/i-scraped-millions-of-venmo-payments-your-data-is-at-risk/
WHO IS RESPONSIBLE?
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.11 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.11
DEVELOPERS? CLIENTS?
X X
ENTER IN … A TIDYING LAYER
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.12 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.12
WHAT IF TIDYING WAS APPLIED
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.13
Scopes
Identity Attr
Privacy
Preferences
User Consents
Data
Regulations
Zero Trust
Business Defined
Policies
DEVELOPERS
CLIENTS
WHAT IF YOU COULD PULL FROM ANY SOURCE
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.
14
Scopes
Identity Attr
Privacy
Preferences
User Consents
Data
Regulations
Zero Trust
DBs
Directory
Other APIs
Any state
Any attribute
Any authz data
source
WHAT IF THE ARCHITECTS COULD WRITE THE POLICIES
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.15
Business-Derived
Policies
WHAT IF ACCESS CONTROLS WERE APPLIED
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.16
Allow?
Block?
Filter?
Obfuscate?
CLIENTS
FirstName
LastName
AccountNumber
Balance
FirstName
LastName
AccountNumber
Balance
OR
…
DECOUPLING AUTHZ FROM IMPLEMENTATION
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.17
API Layer that enforces fine grained access control
DECOUPLING AUTHZ FROM IMPLEMENTATION
Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.18
Marie Kondo API
Layer
Driver/Obstacle Benefits (How it Helps)
1.
Fine-grained
authorization
policy engine
Diff layers of authz
decisions
Remove developers from managing authz at the individual API level, and remove
clients from filtering data themselves at the individual API level
Reduce top API
security risk
Centralize authorization decisions, regardless of authorization data sources, and re-
use authorization policies across multiple APIs
Privacy Preferences &
Consents
Policies can enable delegated consent to data access & preference lookups and
enforce data access decision based on customers’ wishes.
Consumer Data
Regulations
Policies can enforce compliance with new and changing consumer data protection
legislation; sometimes requiring consents.
Zero Trust Set up micro-segments of data, even down to the data attribute, to enable least
privilege access for sensitive data.
Securing APIs Check and enforce policies and customer consents for data being accessed by a
third party through a customer data API.
Data is detailed Enables granular, attribute-by-attribute access control capabilities
2.
GUI
Trust
Framework
Data is everywhere Real-time connections to policy attributes anywhere (e.g. risk scores)
[All Drivers] Need for ABAC & dynamic authorization
Policies
Many stakeholders Externalizes authorization to users for collaborative policy design
Reconciling reqs Lifts burden on developers, no need to reconcile or write code
Does your API authorization model spark joy?
19 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.
PINGIDENTITY.COM
20 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.

More Related Content

PPTX
Mining API Traffic Metadata
PPTX
Next Generation API Management & Microservices Service Mesh
PPTX
Test and Protect Your API
PDF
Is Your API Being Abused – And Would You Even Notice If It Was?
PDF
apidays LIVE Hong Kong 2021 - Event-driven APIs & Schema governance for Apach...
PDF
apidays LIVE Paris - Driving innovation through External APIs without putting...
PPTX
Managing Sensitive Information in an API and Microservices World
PPTX
Adapt or Die Sydney - API Security
Mining API Traffic Metadata
Next Generation API Management & Microservices Service Mesh
Test and Protect Your API
Is Your API Being Abused – And Would You Even Notice If It Was?
apidays LIVE Hong Kong 2021 - Event-driven APIs & Schema governance for Apach...
apidays LIVE Paris - Driving innovation through External APIs without putting...
Managing Sensitive Information in an API and Microservices World
Adapt or Die Sydney - API Security

What's hot (20)

PDF
[WSO2 Integration Summit London 2019] Identity and Access Management in an AP...
PPTX
Bigger, Better Business With OAuth
PPTX
APIs for... Your Mom
PPTX
London Adapt or Die: Securing your APIs the Right Way!
PPTX
API Management Workshop (at Startupbootcamp Berlin)
PDF
Apigee and Accenture Webcast - Accenture Technology Vision 2013 - An API Cent...
PPTX
Managing Sensitive Information in an API and Microservices World
PDF
Open API and API Management - Introduction and Comparison of Products: TIBCO ...
PDF
apidays LIVE New York 2021 - API Management from a network Engineer's perspec...
PDF
apidays LIVE Paris - Drawing the right lines: DDD, APIs and Microservices by ...
PDF
apidays LIVE Jakarta - E5 ways to make your integration more resilient by Je...
PDF
apidays LIVE LONDON - Protecting financial-grade APIs - Getting the right API...
PDF
apidays LIVE Australia 2021 - Leveraging Async APIs to deliver Cross Domain A...
PDF
apidays LIVE New York 2021 - API design is where culture and tech meet each o...
PDF
Hacker vs AI
PDF
apidays LIVE London 2021 - Confessions of a Product Geek by Rosemary Missier,...
PDF
Api architectures for the modern enterprise
PDF
apidays LIVE Hong Kong - The Business of APIs by Jed Ng
PPTX
Apigee Edge Product Demo
PDF
apidays LIVE Paris - The State of SaaS Integration by Gertjan De Wilde
[WSO2 Integration Summit London 2019] Identity and Access Management in an AP...
Bigger, Better Business With OAuth
APIs for... Your Mom
London Adapt or Die: Securing your APIs the Right Way!
API Management Workshop (at Startupbootcamp Berlin)
Apigee and Accenture Webcast - Accenture Technology Vision 2013 - An API Cent...
Managing Sensitive Information in an API and Microservices World
Open API and API Management - Introduction and Comparison of Products: TIBCO ...
apidays LIVE New York 2021 - API Management from a network Engineer's perspec...
apidays LIVE Paris - Drawing the right lines: DDD, APIs and Microservices by ...
apidays LIVE Jakarta - E5 ways to make your integration more resilient by Je...
apidays LIVE LONDON - Protecting financial-grade APIs - Getting the right API...
apidays LIVE Australia 2021 - Leveraging Async APIs to deliver Cross Domain A...
apidays LIVE New York 2021 - API design is where culture and tech meet each o...
Hacker vs AI
apidays LIVE London 2021 - Confessions of a Product Geek by Rosemary Missier,...
Api architectures for the modern enterprise
apidays LIVE Hong Kong - The Business of APIs by Jed Ng
Apigee Edge Product Demo
apidays LIVE Paris - The State of SaaS Integration by Gertjan De Wilde
Ad

Similar to Kondo-ing API Authorization (20)

PDF
CIS14: Best Practices You Must Apply to Secure Your APIs
PDF
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
PPTX
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
PDF
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
PDF
APIsecure 2023 - Understanding and Identifying Threats Against APIs, Shannon ...
PDF
API Security Best Practices and Guidelines
PDF
Akamai_ API Security Best Practices - Real-world attacks and breaches
PDF
Takeaways from API Security Breaches Webinar
PDF
OWASP API Security Top 10 Examples
PDF
apidays New York 2023 - A decade of API breaches, courtesy of application fla...
PDF
5 step plan to securing your APIs
PDF
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
PDF
Api security-present
PPTX
BDSE03-1121-API-PresentationTemplate.pptx
PDF
API Vulnerabilties and What to Do About Them
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PDF
2022 apidays LIVE Helsinki & North_Future proofing API Security
PDF
APIsecure 2023 - API Security - doing more with less, Nir Paz (Standard.ai)
PDF
APISecurity_OWASP_MitigationGuide
PDF
Guidelines to protect your APIs from threats
CIS14: Best Practices You Must Apply to Secure Your APIs
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
APIsecure 2023 - Understanding and Identifying Threats Against APIs, Shannon ...
API Security Best Practices and Guidelines
Akamai_ API Security Best Practices - Real-world attacks and breaches
Takeaways from API Security Breaches Webinar
OWASP API Security Top 10 Examples
apidays New York 2023 - A decade of API breaches, courtesy of application fla...
5 step plan to securing your APIs
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
Api security-present
BDSE03-1121-API-PresentationTemplate.pptx
API Vulnerabilties and What to Do About Them
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
2022 apidays LIVE Helsinki & North_Future proofing API Security
APIsecure 2023 - API Security - doing more with less, Nir Paz (Standard.ai)
APISecurity_OWASP_MitigationGuide
Guidelines to protect your APIs from threats
Ad

More from Nordic APIs (20)

PPTX
How to Choose the Right API Platform - We Have the Tool You Need! - Mikkel Iv...
PPTX
Bulletproof Backend Architecture: Building Adaptive Services with Self-Descri...
PDF
Implementing Zero Trust Security in API Gateway with Cilium - Pubudu Gunatila...
PPTX
Event-Driven Architecture the Cloud-Native Way - Manuel Ottlik, HDI Global SE
PPTX
Navigating the Post-OpenAPI Era with Innovative API Design Frameworks - Danie...
PDF
Using Typespec for Open Finance Standards - Chris Wood, Ozone API
PPTX
Schema-first API Design Using Typespec - Cailin Smith, Microsoft
PPTX
Avoiding APIpocalypse; API Resiliency Testing FTW! - Naresh Jain, Xnsio
PPTX
How to Build an Integration Platform with Open Source - Magnus Hedner, Benify
PPTX
API Design First in Practise – An Experience Report - Hari Krishnan, Specmatic
PPTX
The Right Kind of API – How To Choose Appropriate API Protocols and Data Form...
PPTX
Why Frequent API Hackathons Are Key to Product Market Feedback and Go-to-Mark...
PPTX
Maximizing API Management Efficiency: The Power of Shifting Down with APIOps ...
PPTX
APIs Vs Events - Bala Bairapaka, Sandvik AB
PPTX
GraphQL in the Post-Hype Era - Daniel Hervas, Reckon Digital
PPTX
From Good API Design to Secure Design - Axel Grosse, 42Crunch
PPTX
API Revolution in IoT: How Platform Engineering Streamlines API Development -...
PPTX
Unlocking the ROI of API Platforms: What Success Actually Looks Like - Budhad...
PDF
Increase Your Productivity with No-Code GraphQL Mocking - Hugo Guerrero, Red Hat
PPTX
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Theodo ...
How to Choose the Right API Platform - We Have the Tool You Need! - Mikkel Iv...
Bulletproof Backend Architecture: Building Adaptive Services with Self-Descri...
Implementing Zero Trust Security in API Gateway with Cilium - Pubudu Gunatila...
Event-Driven Architecture the Cloud-Native Way - Manuel Ottlik, HDI Global SE
Navigating the Post-OpenAPI Era with Innovative API Design Frameworks - Danie...
Using Typespec for Open Finance Standards - Chris Wood, Ozone API
Schema-first API Design Using Typespec - Cailin Smith, Microsoft
Avoiding APIpocalypse; API Resiliency Testing FTW! - Naresh Jain, Xnsio
How to Build an Integration Platform with Open Source - Magnus Hedner, Benify
API Design First in Practise – An Experience Report - Hari Krishnan, Specmatic
The Right Kind of API – How To Choose Appropriate API Protocols and Data Form...
Why Frequent API Hackathons Are Key to Product Market Feedback and Go-to-Mark...
Maximizing API Management Efficiency: The Power of Shifting Down with APIOps ...
APIs Vs Events - Bala Bairapaka, Sandvik AB
GraphQL in the Post-Hype Era - Daniel Hervas, Reckon Digital
From Good API Design to Secure Design - Axel Grosse, 42Crunch
API Revolution in IoT: How Platform Engineering Streamlines API Development -...
Unlocking the ROI of API Platforms: What Success Actually Looks Like - Budhad...
Increase Your Productivity with No-Code GraphQL Mocking - Hugo Guerrero, Red Hat
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Theodo ...

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Modernizing your data center with Dell and AMD
PDF
cuic standard and advanced reporting.pdf
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
A Presentation on Artificial Intelligence
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Modernizing your data center with Dell and AMD
cuic standard and advanced reporting.pdf
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks
A Presentation on Artificial Intelligence
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf

Kondo-ing API Authorization

  • 1. Kondo-ing API Authorization Remy Lyle OCT 2019 1 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.
  • 2. HI! I’M REMY Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.2 • Global Tech Enablement Team @ Ping Identity • Denver, CO, USA • Convinced that APIs are the next frontier for identity and security • Marie Kondo is a personal hero
  • 3. MARIE KONDO  Tidying Expert, Bestselling Author, Netflix Hit Show Star  NYTimes Best Selling Book, The Life Changing Magic of Tidying Up  “Does it spark joy?” Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.3
  • 4. BUT… FOR API AUTHORIZATIONS? 4 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved. https://www.wsj.com/articles/kondo-ing-a- guru-of-organizing-becomes-a-verb- 11547745648
  • 5. ANATOMY OF AN API Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.5 JSON GET /getData
  • 6. ANATOMY OF AN API Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.6 JSON GET /getData Scopes Identity Attributes Privacy Preferences User Consents Data Regulations Zero Trust
  • 7. AND HOW MANY DO YOU HAVE? Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.7 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.7
  • 8. FOUR DATA OBSTACLES Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.8 1. Data is detailed and complex. 2. It’s everywhere and accessed many ways. 3. Multiple stakeholders, moving targets and ever-changing landscape of data security policies and regulation 4. Data transactions are subjected to different layers of authorization decisions
  • 9. THIS IS A REAL PROBLEM  OWASP Top API Security Top 10 Risk Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.9 https://www.owasp.org/index.php/OWASP_API_Security_Project
  • 10. WITH REAL-LIFE CONSEQUENCES  In 2018, a research fellow with Mozilla Foundation scraped nearly 208 million transactions on peer-to-peer payment app Venmo revealing purchase profiles of its users  In June 2019, another 7 million transactions were scraped using the company’s developer API over six months Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.10 Sources: https://www.darkreading.com/application-security/apis-get-their-own-top-10-security-list/d/d-id/1335786 https://22-8miles.com/public-by-default/ https://www.wired.com/story/i-scraped-millions-of-venmo-payments-your-data-is-at-risk/
  • 11. WHO IS RESPONSIBLE? Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.11 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.11 DEVELOPERS? CLIENTS? X X
  • 12. ENTER IN … A TIDYING LAYER Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.12 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.12
  • 13. WHAT IF TIDYING WAS APPLIED Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.13 Scopes Identity Attr Privacy Preferences User Consents Data Regulations Zero Trust Business Defined Policies DEVELOPERS CLIENTS
  • 14. WHAT IF YOU COULD PULL FROM ANY SOURCE Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved. 14 Scopes Identity Attr Privacy Preferences User Consents Data Regulations Zero Trust DBs Directory Other APIs Any state Any attribute Any authz data source
  • 15. WHAT IF THE ARCHITECTS COULD WRITE THE POLICIES Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.15 Business-Derived Policies
  • 16. WHAT IF ACCESS CONTROLS WERE APPLIED Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.16 Allow? Block? Filter? Obfuscate? CLIENTS FirstName LastName AccountNumber Balance FirstName LastName AccountNumber Balance OR …
  • 17. DECOUPLING AUTHZ FROM IMPLEMENTATION Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.17 API Layer that enforces fine grained access control
  • 18. DECOUPLING AUTHZ FROM IMPLEMENTATION Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.18 Marie Kondo API Layer Driver/Obstacle Benefits (How it Helps) 1. Fine-grained authorization policy engine Diff layers of authz decisions Remove developers from managing authz at the individual API level, and remove clients from filtering data themselves at the individual API level Reduce top API security risk Centralize authorization decisions, regardless of authorization data sources, and re- use authorization policies across multiple APIs Privacy Preferences & Consents Policies can enable delegated consent to data access & preference lookups and enforce data access decision based on customers’ wishes. Consumer Data Regulations Policies can enforce compliance with new and changing consumer data protection legislation; sometimes requiring consents. Zero Trust Set up micro-segments of data, even down to the data attribute, to enable least privilege access for sensitive data. Securing APIs Check and enforce policies and customer consents for data being accessed by a third party through a customer data API. Data is detailed Enables granular, attribute-by-attribute access control capabilities 2. GUI Trust Framework Data is everywhere Real-time connections to policy attributes anywhere (e.g. risk scores) [All Drivers] Need for ABAC & dynamic authorization Policies Many stakeholders Externalizes authorization to users for collaborative policy design Reconciling reqs Lifts burden on developers, no need to reconcile or write code
  • 19. Does your API authorization model spark joy? 19 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.
  • 20. PINGIDENTITY.COM 20 Confidential | Do not distribute — Copyright ©2019 Ping Identity Corporation. All rights reserved.