Keymate Logo

Access Decisions that React to Risk

Keymate evaluates access based on real-time risk scores, context attributes, and behavioral conditions—enabling secure, adaptive control at scale.

How Risk-Adaptive Access Works

RADAC policies respond to conditions like login time, location, IP, or risk score. Risk signals are evaluated before granting access—helping enforce Zero Trust without hardcoding logic.

RADAC Evaluation Example

RADAC policies respond to conditions like login time, location, IP, or risk score. Risk signals are evaluated before granting access—helping enforce Zero Trust without hardcoding logic.

Example: User: Ayşe, Risk Score: 7, Location: VPN. DSL Policy: risk.score <= 5 && context.ip != "vpn" leads to Access Denied.

Key Components:

User Context (Ayşe, Risk 7, VPN)
DSL Policy (risk.score <= 5 && context.ip != "vpn")
Real-time Risk Evaluation
Contextual Policy Decision
❌ Access Denied

What Makes Keymate RADAC Unique

Risk Context Evaluation

Uses risk scores from tokens, external engines, or dynamic session context.

Behavioral Rules via DSL

Model conditions like location, time, device, and user behavior.

Just-in-Time Access

Supports time-bound elevation and context-aware revocation.

Dynamic Session Restrictions

Enforce downgrade (read-only) or SoD (Separation of Duties) if risk is high.

Zero Trust & NIST Alignment

Enforces policies based on continuous adaptive trust.

Traceable Decisions

Every denial comes with a "why" trace including failed conditions.

Implement fine-grained, adaptive access control that responds to changing risk levels.

Frequently Asked Questions

Understanding Keymate's Risk-Adaptive Access Control (RADAC).

Risk-Adaptive Access Control evaluates access decisions using dynamic risk factors, not just static attributes or roles.
Via custom policies in Keycloak and real-time evaluation at the API Gateway or SDK, backed by DSL rules and session metadata.
Risk scores, login location, IP address, device fingerprint, login time, external risk engine scores.
No. It complements them by layering adaptive logic over existing policy models.

How to Use RADAC in Keymate

Implement adaptive, risk-aware access control with Keymate.

Steps to Configure and Enforce RADAC Policies

1

Define DSL rules using risk-related conditions

Craft expressive policies in Keymate DSL to check risk scores, IP addresses, location, behavior, etc.

2

Configure how risk scores are extracted

Specify if risk data comes from JWT tokens, request headers, or by calling an external risk engine API.

3

Attach RADAC policies to sensitive scopes or actions

Apply your adaptive policies to specific API endpoints, application features, or data access operations.

4

Use simulation tools to test under different conditions

Validate policy behavior with Keymate's simulation console by providing various risk contexts.

5

Enforce policies via SDK or Gateway

Integrate with Keymate's SDKs or API Gateway plugins for real-time, adaptive access enforcement.

6

Explore RADAC Hands-On

Ready to see it in action? Try the RADAC Simulation Console now.

ELEVATE YOUR IAM STRATEGY

Ready to Transform Your Keycloak Experience?

Implement fine-grained authorization, multi-tenant infrastructure, and comprehensive security policies with Keymate — built on the Keycloak foundation you already trust.