Authorization That Understands Context — Not Just Identity
Keymate evaluates user context — like IP address, login time, department, risk score, and resource ownership — to enforce smarter, dynamic access policies in real time.
Real-Time Access Decisions Based on IP, Time, Department & Risk
How Contextual Access Decisions Work
In Keymate, context data is attached to user sessions or tokens at login. This includes attributes like IP, department, login channel, device type, or even resource ownership. These values are evaluated against DSL policies in real-time and forwarded to OpenFGA when necessary for external relationship or graph-based evaluation.
Context-Aware Evaluation Flow
In Keymate, context data is attached to user sessions or tokens at login. This includes attributes like IP, department, login channel, device type, or even resource ownership. These values are evaluated against DSL policies in real-time and forwarded to OpenFGA when necessary for external relationship or graph-based evaluationrequirements-Merged.
Example: User: user:fatma, IP: 192.168.10.3, Department: Finance, Time: 21:05. DSL Policy: user.department == "Finance" && context.ip.startsWith("192.168.") && context.time < 2100. Result: Denied (time exceeded)
Why It's Unique in Keymate
Supports attributes from both token claims and session notesrequirements-Merged.
Token + Session Context Evaluation
Supports attributes from both token claims and session notesrequirements-Merged.
OpenFGA Context Forwarding
Passes relevant context attributes to OpenFGA's authorization engine via contextualTuplesrequirements-Merged.
Custom Authenticator Integration
Capture user-specific context (IP, org, delegatedBy, etc.) at login and use in policiesrequirements-Merged.
DSL Expressions for Runtime Context
Evaluate access using context fields like context.time, context.device, context.vpn etc.
Context-Aware Risk Mitigation
Combine with RADAC to reject risky sessions based on behavior or environmentKeymate-Product-Briefin….
Audit & Debug Support
All context fields and evaluation reasons are logged and shown during simulation.
Enforce smarter, dynamic access policies in real time.
Frequently Asked Questions
Understanding Keymate's Dynamic Contextual Authorization.
How to Use in Keymate
Follow these steps to implement dynamic contextual authorization.