Patent attributes
This disclosure describes techniques for threat detection within access control systems having multiple entitlement repositories. An example system includes a first entitlement repository, a second entitlement repository, a third entitlement repository, and a server. The server, in response to receiving an access request to access a service on a network, queries the first, second, and third entitlement repositories based on access characteristics of a user associated with the access request and receives responses from the first, second, and third entitlement repositories. When the responses from the first, second, and third entitlement repositories all match, the server provides authorization for the user to access the service in accordance with the responses.