Blog
Company Updates & Technology Articles

Netflix authorizes extra members using environmental attributes
Netflix recently rolled out a system to combat account sharing, on a global scale. The enforcement system uses environmental attributes to determine access. This is a great real-world use-case for an attribute-based access control (ABAC) system. Get all the details in the post!

Meet Aserto at Identity Week, Devopsdays, API World, Global AppSec, and KubeCon
We're thrilled to share the fall events we are sponsoring and speaking at. If you're attending any of these, we'd love to meet! Get all the details in this post.
Sep 13th, 2023

Introducing ds-load
Introducing ds-load
, a powerful tool that simplifies the process of extracting, transforming, and loading data from upstream sources, such as an identity provider, into the Topaz directory.
Aug 31st, 2023

Five open-source projects to secure access to your applications
Implementing user authentication and application authorization is hard. Thankfully, you don't have to do it all from scratch. Here are five open-source tools you can use to secure access to your applications and application resources.
Aug 23rd, 2023

Auth in everyday terms
“Auth” tends to be the term used to describe the process of Authentication and Authorization. But these are two distinct processes. Don't worry, even some experts make this mistake. In this post, we provide a real-world analogy that explains the differences between the two.
Aug 16th, 2023

The future of IAM is fine-grained
Identity is mostly a solved problem, access is far from that. It only makes sense for the IAM industry to tackle the most difficult problem we face today, namely how do we limit the potential damage of a breach.
Aug 9th, 2023

5 Ways to Fix Your Broken Authorization System
Authorization is broken. What would a great developer solution look like? Here are the five principles that application authorization platforms for developers should follow.
Aug 2nd, 2023