cerbos
opa-envoy-plugin
Our great sponsors
cerbos | opa-envoy-plugin | |
---|---|---|
41 | 3 | |
2,512 | 306 | |
9.6% | 2.6% | |
9.6 | 8.4 | |
5 days ago | 8 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cerbos
- Open Policy Agent
-
Nuxt authorization: How to implement fine-grained access control
In this tutorial you will learn how to use Cerbos to add fine-grained access control to any Nuxt web application, simplifying authorization as a result.
-
ποΈβοΈ Innovate Like Da Vinci: Blending Art and Science in Software Development
In my work with Cerbos, I apply the lessons learned from Da Vinci to tackle authorization challenges. Our approach is to create solutions where functionality seamlessly integrates with developer experience. Constantly iterating and viewing the tools through the users' lens, helps ensure that our access control solutions are robust and dev-friendly.
-
Get started with Cerbos Hub
You may already know of our open source solution - Cerbos Policy Decision Point (PDP); a devtool which helps developers enforce access control over different parts of their software. If you need to learn more about Cerbos in general, we strongly recommend checking out the website and the docs.
- π» 7 Open-Source DevTools That Save Time You Didn't Know to Exist βπ
-
Cerbos v0.32 released!
GitHub: https://github.com/cerbos/cerbos URL: https://cerbos.dev
-
Feedback needed: Cerbos Hub is now in public beta
Cerbos Hub is a managed service offering for the open source authorization product, Cerbos.
-
Feedback needed: Cerbos Hub is now in public beta!
Hello fellow devs! I'm with Cerbos (https://cerbos.dev/), a tool designed to manage who can do what in your software applications.
-
π₯π Top 10 Open-Source Must-Have Tools for Crafting Your Own Chatbot π€π¬
Check the quickstart or play with Cerbos in your browser. Support Cerbos on GitHub β
opa-envoy-plugin
- Authorization for synchronous communication between services
-
How do you Integrate Emissary Ingress with OPA
Open Policy Agent is a well-known general-purpose policy engine and has emerged as a policy enforcer across the stacks be it API gateways, service meshes, Kubernetes, microservice, CICD, or IAC. OPA decouples decision making from policy enforcement such that whenever your software needs to make a decision regarding the incoming requests, it queries OPA. OPA-Envoy extends OPA with a gRPC server that implements the Envoy External Authorization API, thus making itself compatible to be as an external authz server to Emissary.
-
OPA + Istio/Envoy: ConfigMap
I'm observing the quick_start.yaml provided by OPA and trying to comprehend what's happening in the inject.rego resource (proper name?) under the ConfigMap. Can anyone break it down for me a bit? I think I have an inkling of what's happening but not sure.
What are some alternatives?
OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.
gatekeeper - π Gatekeeper - Policy Controller for Kubernetes
casbin-server - Casbin as a Service (CaaS)
opal - Fork of https://github.com/permitio/opal
Ory Keto - Open Source (Go) implementation of "Zanzibar: Google's Consistent, Global Authorization System". Ships gRPC, REST APIs, newSQL, and an easy and granular permission language. Supports ACL, RBAC, and other access models.
oso - Oso is a batteries-included framework for building authorization in your application.
Ory Hydra - OpenID Certifiedβ’ OpenID Connect and OAuth Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language. Works with Hardware Security Modules. Compatible with MITREid.
sso-wall-of-shame - A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
gloo - The Feature-rich, Kubernetes-native, Next-Generation API Gateway Built on Envoy
warrant - Warrant is a highly scalable, centralized authorization service based on Google Zanzibar, used for defining, querying, and auditing application authorization models and access control rules.
kuma - π» The multi-zone service mesh for containers, Kubernetes and VMs. Built with Envoy. CNCF Sandbox Project.