Smarter Access with Attributes That Matter
Keymate brings policy-based access control to life with real-time attribute evaluation, advanced policy modeling, and enterprise-grade observability.
How Attribute-Based Access Works in Keymate
Keymate evaluates access policies in real time using attributes from tokens, sessions, and request context. With DSL-based policies, OpenFGA enforcement, and Gateway/SDK-level integration, attribute logic stays secure and observable.
Real-Time ABAC Evaluation Flow
Keymate leverages a powerful combination of real-time attribute sourcing, a flexible policy language, and robust enforcement mechanisms to deliver fine-grained, context-aware access control.
Example: Example: User Emre attempts to Approve invoice:987. Policy checks user.department (finance) and risk_score (<3) from token/session. Access Granted based on matching attributes.
Key Components:
What Makes Keymate ABAC Different
Keymate's ABAC goes beyond basic attribute checks, offering a comprehensive suite of tools for modern, scalable, and auditable access control.
Attribute Mapping Engine
Map claims from tokens or request context using JSONPath expressions, simplifying attribute ingestion.
Context-Aware Enforcement
Policies can utilize user, resource, and environmental attributes—like time, IP, or location—for truly dynamic decisions.
Realtime Attribute Evaluation
Enforce policies via API Gateway or SDK without touching frontend code, ensuring consistency and security.
Dry-Run & Simulation Tools
Safely test attribute logic and policy changes before going live using built-in simulators and what-if analysis.
Visual DSL + Audit Logs
Understand why an attribute-based decision was made with a clear DSL and full traceability through comprehensive audit logs.
ABAC + RBAC Hybrid
Combine the strengths of ABAC and RBAC. Use attribute checks within role-scoped decisions for layered and flexible access logic.
Empowering enterprises with flexible, observable, and secure attribute-based access.
Try Attribute-Based Access Control in Action
Simulate real-world ABAC decisions using token attributes, DSL policies, and contextual data. Preview outcomes and debug results in one place.
Configure ABAC Simulation:
Policy Evaluation Result:
✅ Access Granted
All policy conditions met.
Active Policy DSL: (Finance Document Access Policy)
allow if (action == "read" or action == "approve") and user.department == "finance" and user.riskScore < 3 and (resource.sensitivity == "high" ? user.country == "TR" : true) and context.ip not in BLACKLIST_IP_RANGE
Frequently Asked Questions
Common questions about Keymate's Attribute-Based Access Control, its features, and how it compares.
How to Use ABAC in Keymate
Follow these steps to integrate and leverage Keymate's advanced ABAC capabilities in your applications.
Implementing Keymate ABAC in Your Ecosystem
Define Attribute-Based Policies
Write your access policies using Keymate's expressive DSL, referencing user, resource, and environment attributes.
Configure Attribute Mapping
Use the mapping engine to extract and normalize attributes from JWT tokens, API request context, or other session data sources.
Deploy Policies to OpenFGA
Manage and deploy your policies to the OpenFGA authorization service using the Keymate Admin Console or programmatically via APIs.
Enforce with SDK or Gateway
Integrate Keymate's SDKs in your applications or use the API Gateway plugin to evaluate policies in real-time at the edge.
Monitor & Simulate
Track every access decision through detailed logs and OpenTelemetry. Use the Admin Console to simulate policy changes and understand their impact.