Delivering knowledge to solve customer challenges

Knowledge Based Access Control (KBAC)

At IndyKite, we think a lot about the changing world around us. Not only because we want to solve the challenges that the world presents, but we also want to find the opportunities.  As the number of interactions between humans and things increases, so do the complexities of answering to both. If we think about access control alone, who (and what) has access to what at what time and place presents are hard questions to solve. 

It's not for a lack of trying on the industry's part. There has been progress in the way we solve access control but we still find the solutions limiting. The most common challenge we see in the current (majority) operating state is: 

Authorization is static and is oftentimes built directly into application logic. Technology applied to authorization is brittle, project-based, costly and simply does not reflect the real-world. 

KBAC delivers dynamic authorization for the real-world

IndyKite Knowledge-Based Access Control is our authorization solution to better guard risk, improve security and uncover insights for new product creation. 

At the core of IndyKite KBAC is the knowledge graph, an interconnected dataset enriched with semantics, allowing for deep, dynamic context necessary for complex decision-making. KBAC enables businesses to leverage their expanding datasets and metadata to expand insights and perform granular decision-making that is increasingly complex in the decentralized world. 

Let's take a look at a simple comparison to understand how it works:

On the left side, we can see a typical view of identity data attached to Barabara Jensen. This identity data is the basic set of attributes and properties that most organizations would have available today - it includes things like name, data of birth, email and password.

To the right you can see what happens as we enrich the identity data with a knowledge graph. Barbara is located in the green circle, connected by all of her associated identity data. But as we enrich the graph with new identities (the additional green nodes), we can create a richer context into Barabara´s life. We can now see how Barbara moves beyond static attributes and has relationships with other people and things. By adding more data, we can create more knowledge around Barbara, increasing the value and opportunities to take action and give her or her associated relationships permissions. 

In this example it is clear that the value of your network and the associated actions increase when you enrich your data set. 

Want to learn more? Check out our webinar on Knowledge Based Access Control where we walk through how it all works.

Subscribe Icon

Keep updated

Don’t miss a beat from your favourite identity geeks 🤓

Trusted Onboarding and Verification

Proofing and Verification (KYC)

Integrate proofing and verification services with verified attributes, facial matching and biometrics, liveness checks and NFC id document scanning.

Trusted Authentication

Strong Authentication

Perform strong authentication with 3rd party authentication services (including biometric) services to enrich the user authentication journey and flow. 

Knowledge Based Access Control (KBAC)

Knowledge Based Access Control (KBAC)

Leverage the power of the knowledge graph to perform Dynamic Authorization - interrogating the continuously changing context, allowing for more advanced authorization use cases.