cedar
openfga
cedar | openfga | |
---|---|---|
2 | 15 | |
724 | 2,288 | |
3.9% | 5.9% | |
9.6 | 9.7 | |
1 day ago | about 23 hours ago | |
Rust | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cedar
-
Open Policy Agent
Curious what folks think about this versus cedar (https://www.cedarpolicy.com/), the open source policy engine behind aws verified permissions.
- Cedar is a language for writing and enforcing auth policies in your applications
openfga
-
Open Policy Agent
This feels very much like OpenFGA[0]. I've been evaluating authorization tool for one of my side projects and honestly most tools feels like creating relationships in a graph-like database and querying to see if there is/isn't relationship between two entities. Is there more to this (besides the implementation details) or am I missing something from these tools?
[0] https://openfga.dev/
-
🚀 Top 12 Open Source Auth Projects Every Developer Should Know 🔑
OpenFGA
- Opal – an open source cross-language policy administration tool
- OpenFGA: A high performance and flexible authorization/permission engine
-
warrant VS openfga - a user suggested alternative
2 projects | 15 Aug 2023
OpenFGA is CNCF Sandbox authorization service inspired by Google Zanzibar
-
Has anyone tried OpenFGA for resource based permissions?
- https://authzed.com/spicedb/ - https://cerbos.dev/ - https://openfga.dev/ - https://www.permify.co/
-
How to setup Keycloak for separate frontend and backend services?
Thanks for the answer. I played around with Keycloak for a bit and I saw that roles could be mapped as token claims, however for systems where you need fine grained access control (where roles are not enough) you need some other solution. One option could be to use an external authorization system. One such system could be OpenFGA https://openfga.dev/ that is based on Google Zanzibar https://research.google/pubs/pub48190/ research paper. This answer on SO is also helpful https://stackoverflow.com/a/75047064/10781180
- We built an open source authorization service based on Google Zanzibar
- Show HN: Topaz: open-source authorization combining the best of OPA and Zanzibar
-
What is the coolest Go open source projects you have seen?
OpenFGA is similar to Permify https://github.com/openfga/openfga
What are some alternatives?
spicedb - Open Source, Google Zanzibar-inspired permissions database to enable fine-grained access control for customer applications
permify - Open source authorization service inspired by Google Zanzibar to build fine-grained and scalable authorization systems.
Ory Keto - Open Source (Go) implementation of "Zanzibar: Google's Consistent, Global Authorization System". Ships gRPC, REST APIs, newSQL, and an easy and granular permission language. Supports ACL, RBAC, and other access models.
topaz - Cloud-native authorization for modern applications and APIs
topaz - A high performance ruby, written in RPython
Echo - High performance, minimalist Go web framework
micro-editor - A modern and intuitive terminal-based text editor
lf - Terminal file manager
OPAL - Policy and data administration, distribution, and real-time updates on top of Policy Agents (OPA, Cedar, ...)
Redis - Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported: Strings, Lists, Sets, Sorted Sets, Hashes, Streams, HyperLogLogs, Bitmaps.
NATS - Golang client for NATS, the cloud native messaging system.
oso - Oso is a batteries-included framework for building authorization in your application.