Entitlement Management for Custom & Third-Party Apps
With more and more workloads moving to the cloud, so has the adoption rates of Infrastructure-as-a-Service (IaaS) platforms such as AWS, Microsoft Azure, and Google Cloud Platform. These platforms host all kinds of cloud-based custom and third-party applications, are highly scalable, and give organizations much flexibility in adjusting IT infrastructure needs quickly and cost-effectively.
Organizations can integrate their own custom and third-party applications into the NextLabs platform through the use of a software development kit (SDK). With this SDK, companies can centrally manage authorization policies for their own applications, just as they can for the applications NextLabs supports out-of-the-box.
The SDK allows developers to implement attribute-based access controls and authorization management into their applications. Developers create a policy enforcement point (PEP) for each of their applications to interface with NextLabs Control Center policy platform. These PEPs perform authorization checks based on user activities to enforce the authorization decisions of the “policy decision points” (PDPs). The PDPs provide a number of management, policy decision-making, event logging, and other functions that are independent of the application or system being enforced.
IaaS Platforms Supported |
---|
AWS, Microsoft Azure, Google Cloud Platform |
Programming Language | Recommended Policy Enforcement Point Client or SDK |
---|---|
Java | OpenAz PEP Java client SDK |
Javascript | OpenAz PEP JavaScript client SDK |
C, C++ | C, C++ SDK |
C#, .NET | C# SDK or OpenAz PEP, .NET client SDK |
PHP | REST API |
Microsoft COM | C++ SDK |
Other cloud apps with remote PDP | REST API |
ABAP/SAP | SAP JCo SDK |
Feature | Benefit |
---|---|
Externalized authorization management | Simplify and reduce administration time for access control policies |
Integration with several different programming languages | Lower total cost of ownership by extending the NextLabs platform to include custom applications |
Granular data access control | Secure information sharing across employees, partners, and contractors |
Simple policy creation | Expedite application development for enhanced business agility |
Streamlined risk analytics | Reduce the cost of compliance through more efficient data monitoring and audit |