Dynamic, policy-driven access control using tags
2 controls use ABAC (Attribute-Based Access Control) for implementation.
See how ABAC (Attribute-Based Access Control) compares to other access control approaches with our detailed comparison table.
Compare Technologies