Introducing Token-Based Access Control (TBAC)
Introducing TBAC: Token-Based Access Control

Introducing Token-Based Access Control (TBAC)

TBAC is a new access control model that leverages the rich context encoded in tokens, such as JWTs, to make dynamic, fine-grained access decisions. Unlike existing models like RBAC, ABAC, or ReBAC, which rely on roles, attributes, or relationships, TBAC evaluates access based on the information embedded in a bundle of tokens, providing unparalleled flexibility and contextual awareness.


Why TBAC?

  • Existing Limitations: RBAC: Too static, limited to predefined roles normally about people not workloads. ABAC: Too arbitrary--everything is an attribute; ReBAC: Relationship-driven but lacks broader context.
  • TBAC Advantage: Combines the strengths of all three by directly leveraging token claims (e.g., roles, attributes, session info, and more) for real-time decision-making.

Key Features of TBAC

  1. Token-Centric Authorization: Evaluates access based on a bundle of tokens provided with a request.
  2. Dynamic Context Awareness: Decisions depend on real-time information like device type, session location, or expiration times.
  3. Multi-Token Support: Processes tokens from multiple sources (e.g., federated identity providers).
  4. Fine-Grained Policies: Allows policies to incorporate detailed claims like role, department, or custom_claim.
  5. Edge or Local Evaluation: Supports efficient, WebAssembly-based policy evaluation for low-latency environments.


Applications

  1. Cloud Platforms: Enforce fine-grained permissions for APIs and multi-tenant resources.
  2. FinTech: Dynamically restrict transactions based on token claims (e.g., fraud detection).
  3. Zero Trust Architectures: Fit seamlessly into systems that require context-driven, dynamic access.
  4. IoT: Enable policy enforcement on edge devices using locally evaluated tokens.
  5. Multi-Tenant SaaS: Simplify tenant-specific policies with token-based contextual decisions.


Challenges

  • Complexity: Token validation and policy management can become intricate.
  • Token Security: Requires robust safeguards to protect token integrity and transport.


Conclusion

TBAC opens the door to dynamic, token-centric authorization, suitable for modern, distributed systems where real-time context matters. It represents a significant evolution in access control, aligning with the needs of today's cloud-native, multi-tenant, and federated architectures.

Would you like to explore how TBAC can fit into your application or infrastructure? Let's discuss!


Francis Pouatcha

Co-Founder and Technical Lead at adorsys

2 周

Great article, Mike Schwartz—your insights on TBAC brilliantly highlight how leveraging token claims can transform access control. I fully agree that TBAC is essential for implementing resilient zero trust environments, paving the way for more secure, dynamic infrastructures.

Martin Besozzi

Identity & Access Management Architect | Identity Standard Specialist | Founder

3 周

Great article, Mike! I will start using the TBAC concept when explaining authorization with token claims.

Mike Schwartz

Gluu Founder / CEO

3 周

Don't want to send JWTs over the network? Don't mind token introspection? I wrote up this quick acticle to show how you can use your reference tokens, but still have a JWT version for policy evaluation: https://www.dhirubhai.net/pulse/reference-tokens-versus-jwts-mike-schwartz-6uwtc/?trackingId=EriVearzSjkmPCwbOBu3kw%3D%3D

Jim Hartsema

Shaping the Future with Secure Digital Identity – Empowering Trust | eIDAS2.0

1 个月

But TBAC alone does not tackle the real "authentication crisis". Because who request access? An user account. Who is bound to that user account? Currently, we can not say for 100% sure right. There is a lack of true digital identity. I'm a big fan of TBAC because it enforces something I call "least privilege". But how do you ensure the account used is the legitimate person? This is something what the EU tries to solve with eIDAS2.0. Mike Schwartz some homework for your readers ??

要查看或添加评论,请登录

Mike Schwartz的更多文章

社区洞察

其他会员也浏览了