cerbos VS opa-envoy-plugin

Compare cerbos vs opa-envoy-plugin and see what are their differences.

cerbos

Cerbos is the open core, language-agnostic, scalable authorization solution that makes user permissions and authorization simple to implement and manage by writing context-aware access control policies for your application resources. (by cerbos)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
cerbos opa-envoy-plugin
41 3
2,512 306
9.6% 2.6%
9.6 8.4
5 days ago 8 days ago
Go Go
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

cerbos

Posts with mentions or reviews of cerbos. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-12.

opa-envoy-plugin

Posts with mentions or reviews of opa-envoy-plugin. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-04-28.
  • Authorization for synchronous communication between services
    1 project | /r/microservices | 7 May 2022
  • How do you Integrate Emissary Ingress with OPA
    2 projects | dev.to | 28 Apr 2022
    Open Policy Agent is a well-known general-purpose policy engine and has emerged as a policy enforcer across the stacks be it API gateways, service meshes, Kubernetes, microservice, CICD, or IAC. OPA decouples decision making from policy enforcement such that whenever your software needs to make a decision regarding the incoming requests, it queries OPA. OPA-Envoy extends OPA with a gRPC server that implements the Envoy External Authorization API, thus making itself compatible to be as an external authz server to Emissary.
  • OPA + Istio/Envoy: ConfigMap
    1 project | /r/OpenPolicyAgent | 23 Feb 2021
    I'm observing the quick_start.yaml provided by OPA and trying to comprehend what's happening in the inject.rego resource (proper name?) under the ConfigMap. Can anyone break it down for me a bit? I think I have an inkling of what's happening but not sure.

What are some alternatives?

When comparing cerbos and opa-envoy-plugin you can also consider the following projects:

OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.

gatekeeper - 🐊 Gatekeeper - Policy Controller for Kubernetes

casbin-server - Casbin as a Service (CaaS)

opal - Fork of https://github.com/permitio/opal

Ory Keto - Open Source (Go) implementation of "Zanzibar: Google's Consistent, Global Authorization System". Ships gRPC, REST APIs, newSQL, and an easy and granular permission language. Supports ACL, RBAC, and other access models.

oso - Oso is a batteries-included framework for building authorization in your application.

Ory Hydra - OpenID Certifiedβ„’ OpenID Connect and OAuth Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language. Works with Hardware Security Modules. Compatible with MITREid.

sso-wall-of-shame - A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.

gloo - The Feature-rich, Kubernetes-native, Next-Generation API Gateway Built on Envoy

warrant - Warrant is a highly scalable, centralized authorization service based on Google Zanzibar, used for defining, querying, and auditing application authorization models and access control rules.

kuma - 🐻 The multi-zone service mesh for containers, Kubernetes and VMs. Built with Envoy. CNCF Sandbox Project.