Role (RBAC)
Is this user a provider?
Attribute (ABAC)
Are they in the correct department?
Time (TBAC)
Is this request happening during shift hours?
Relationship (ReBAC)
Is this provider assigned to this specific patient?
User-based (UBAC)
Has the patient explicitly granted consent to share or delegated access?
Enterprise access requirements
workforce, customer-centric
The enterprise controls the digital experience, a strict list of approved apps, and the data flows between them.
Access is granted based on static roles or sets of attributes, that are only periodically reviewed.
Access control policy is typically hard-coded within each pre-selected application.
Public sector and healthcare access requirements
user-centric
Citizens and patients control their own data, accessing a diverse ecosystem of third-party apps and services.
Access is dynamically enforced in real-time based on user’s data sharing directives.
Access control needs to be decoupled from application code to enable user-centric experiences.
Our architects are ready to help you map out a user-centric security
framework that scales.





