Enforce fine-grained Cerbos authorization policies at the Apigee edge — before requests reach your services.
Cerbos integrates with Apigee's service callout policies, no custom glue code required
The same CEL-based policies that govern your application layer extend to your infrastructure
Authorization at every layer of your stack, managed from a single control plane
Enforcing authorization at the Apigee gateway means unauthorized requests are rejected before they reach your services, reducing load, improving security posture, and simplifying backend code.
Cerbos provides fine-grained, context-aware authorization policies written in human-readable YAML. When integrated with Apigee, these policies are evaluated at the edge for every incoming request.
The same Cerbos policies govern authorization at the gateway and within your services, one source of truth, one audit trail, and consistent enforcement across every layer.
Apigee calls the Cerbos PDP for every incoming request. Cerbos evaluates your authorization policies using the request context (headers, claims, path) and returns an allow or deny decision, all at the gateway edge.
Gateway-level authorization provides defense in depth. You can enforce coarse-grained policies at the edge and fine-grained policies within your services, both managed by Cerbos.
What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.