Entitlement Management for Custom & Third-Party Apps

With more and more workloads moving to the cloud, so has the adoption rates of Infrastructure-as-a-Service (IaaS) platforms such as AWS, Microsoft Azure, and Google Cloud Platform. These platforms host all kinds of cloud-based custom and third-party applications, are highly scalable, and give organizations much flexibility in adjusting IT infrastructure needs quickly and cost-effectively.

Organizations can integrate their own custom and third-party applications into the NextLabs platform through the use of a software development kit (SDK). With this SDK, companies can centrally manage authorization policies for their own applications, just as they can for the applications NextLabs supports out-of-the-box.

The SDK allows developers to implement attribute-based access controls and authorization management into their applications. Developers  create a policy enforcement point (PEP) for each of their applications to interface with NextLabs Control Center policy platform. These PEPs perform authorization checks based on user activities to enforce the authorization decisions of the “policy decision points” (PDPs). The PDPs provide a number of management, policy decision-making, event logging, and other functions that are independent of the application or system being enforced.

IaaS Platforms Supported
AWS, Microsoft Azure, Google Cloud Platform
Programming Language Recommended Policy Enforcement Point Client or SDK
Java OpenAz PEP Java client SDK
Javascript OpenAz PEP JavaScript client SDK
C, C++ C, C++ SDK
C#, .NET C# SDK or OpenAz PEP, .NET client SDK
Microsoft COM C++ SDK
Other cloud apps with remote PDP REST API
Feature Benefit
Externalized authorization management Simplify and reduce administration time for access control policies
Integration with several different programming languages Lower total cost of ownership by extending the NextLabs platform to include custom applications
Granular data access control Secure information sharing across employees, partners, and contractors
Simple policy creation Expedite application development for enhanced business agility
Streamlined risk analytics Reduce the cost of compliance through more efficient data monitoring and audit