openfga
permify
openfga | permify | |
---|---|---|
18 | 46 | |
3,500 | 5,358 | |
5.8% | 1.9% | |
9.7 | 9.9 | |
3 days ago | 7 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
openfga
-
Who Needs Roles Anymore? Introducing OpenFGA, the Future of SaaS
Itβs 2025 yβall, time to retire that ancient, one-size-fits-all approach. OpenFGA gives you the flexibility to handle complex user relationships with elegance. Whether youβre cooking up the next Slack, managing external contractors, or just tired of editing roles for your friends named Bob, ReBAC can save you from permissions purgatory.
-
Authorization (authz) and GraphQL
External Authorization System Using Policy engines like SpiceDB, OpenFGA, ORY Keto, OpenPolicy Agent (OPA), let you put your ReBAC rules in an external system and reference them from your queries. The main benefit you get from the centralized relationships model is it makes it possible to manage authorization centrally. This means that development teams can create new applications and add new relationships without needing to update any application code.
-
Show HN: Permify 1.0 β Open-source fine-grained authorization service
How does this compare to auth0's OpenFGA (based on Zanzibar)?
https://openfga.dev
-
Open Policy Agent
This feels very much like OpenFGA[0]. I've been evaluating authorization tool for one of my side projects and honestly most tools feels like creating relationships in a graph-like database and querying to see if there is/isn't relationship between two entities. Is there more to this (besides the implementation details) or am I missing something from these tools?
[0] https://openfga.dev/
-
π Top 12 Open Source Auth Projects Every Developer Should Know π
OpenFGA
- Opal β an open source cross-language policy administration tool
- OpenFGA: A high performance and flexible authorization/permission engine
-
warrant VS openfga - a user suggested alternative
2 projects | 15 Aug 2023
OpenFGA is CNCF Sandbox authorization service inspired by Google Zanzibar
-
Has anyone tried OpenFGA for resource based permissions?
- https://authzed.com/spicedb/ - https://cerbos.dev/ - https://openfga.dev/ - https://www.permify.co/
-
How to setup Keycloak for separate frontend and backend services?
Thanks for the answer. I played around with Keycloak for a bit and I saw that roles could be mapped as token claims, however for systems where you need fine grained access control (where roles are not enough) you need some other solution. One option could be to use an external authorization system. One such system could be OpenFGA https://openfga.dev/ that is based on Google Zanzibar https://research.google/pubs/pub48190/ research paper. This answer on SO is also helpful https://stackoverflow.com/a/75047064/10781180
permify
- Show HN: Permify 1.0 β Open-source fine-grained authorization service
- Launch HN: Stack Auth (YC S24) β An Open-Source Auth0/Clerk Alternative
- How to Implement Two-Factor Authentication (2FA) in Golang
-
Fine-Grained Access Control (FGAC): Comprehensive Guidance
For implementation we'll use Permify, an open source authorization service that enables developers to implement fine-grained access control scenarios easily.
-
Implementing Role Based Access Control (RBAC) in Node.js and Express App
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ β Permify v0.8.5 β β Fine-grained Authorization Service β β β β docs: ............... https://docs.permify.co β β github: .. https://github.com/Permify/permify β β blog: ............... https://permify.co/blog β β β ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ time=2024-03-22T14:59:09.851Z level=INFO msg="π starting permify service..." time=2024-03-22T14:59:09.851Z level=ERROR msg="Account ID is not set. Please fill in the Account ID for better support. Get your Account ID from https://permify.co/account" time=2024-03-22T14:59:09.859Z level=INFO msg="π grpc server successfully started: 3478" time=2024-03-22T14:59:09.859Z level=INFO msg="π invoker grpc server successfully started: 5000" time=2024-03-22T14:59:09.867Z level=INFO msg="π http server successfully started: 3476"
- Implementing Role Based Access Control in SvelteKit
-
Policy-Based Access Control (PBAC): A Comprehensive Overview
However, in this piece we're focusing on the PBAC model also known as Policy-Based Access Control and how it differentiates itself these from traditional access control models in terms of scalability, flexibility and security.
-
Show HN: AI assistant powered by Groq to generate authorization models
Hi I'm Karan, one of the maintainers of Permify (https://github.com/Permify/permify), an open source authorization service to build scalable authorization systems.
I want to share with you that we've built an AI assistant to help modeling your desired authorization logic! You can basically describe your authorization logic in Permify AI and it will generate the respective model and semantics accordingly. Think of it like ChatGPT for authorization modeling/policy generation.
Here's the project if you would like to play with it: https://ai.permify.co/.
Brief backstory:
Since authorization is generally a domain specific issue use cases vary widely - roles, relationships, attributes, hierarchies between business units, contextual permissions, etc.
To address this, we're offering a domain specific language that we built purely using golang to help model authorization logic programmatically. You can see what it looks like with sample examples in our playground: https://play.permify.co/
Although our domain specific language helps our users significantly, the general idea of policy generation is hard challenging if you have complex authorization logic and versatile permission requirements. Additionally, the flexibility of our modeling language allows for achieving the same policy/permissions through various approaches. But creating the best possible policy is crucial for several reasons including the performance of access checks, the readability of the authorization logic, visibility, and achieving least privilege, etc.
When we tallied up all those reasons, it hit us: using AI could really smooth out the policy generation process. It could not only reduce the engineering effort but also yield the best possible results. That's why we integrated Groq to make to create Permify AI!
Would love to get your feedback on this!
- OAuth 2.0 implementation in Node.js
-
Implementing JWT Authentication in a Golang Application
At that point consider exploring our solution, Permify. It's a Google Zanzibar-based open-source authorization service that helps to build scalable authorization systems.
What are some alternatives?
spicedb - Open Source, Google Zanzibar-inspired database for scalably storing and querying fine-grained authorization data
topaz - Cloud-native authorization for modern applications and APIs
Ory Keto - The most scalable and customizable permission server on the market. Fix your slow or broken permission system with Google's proven "Zanzibar" approach. Supports ACL, RBAC, and more. Written in Go, cloud native, headless, API-first. Available as a service on Ory Network and for self-hosters.
topaz - A high performance ruby, written in RPython