Cerbos enforces fine-grained authorization at the Gloo Gateway edge, using the same Envoy ext_authz protocol that powers the native Envoy integration.
Gloo Gateway uses Envoy as its data plane, so Cerbos integrates via the same native ext_authz protocol
The same Cerbos policies that govern your application layer extend to your API gateway
Unauthorized requests are rejected at the gateway before reaching your services
Gloo Gateway provides a native integration point for Cerbos, extending policy-driven authorization to another layer of your stack without custom glue code.
Cerbos policies are written in human-readable YAML supporting RBAC, ABAC, and conditional rules. The same policies that govern your application layer now extend to Gloo Gateway, enforced consistently everywhere.
A unified control plane means one set of policies, one audit trail, and one management workflow, regardless of how many services and infrastructure layers your system spans.
Gloo Gateway is an Envoy-based API gateway from Solo.io. Because it uses Envoy as its data plane, Cerbos integrates via the same ext_authz gRPC protocol used in standalone Envoy deployments.
Gloo Gateway is built on Envoy, so it inherits Envoy's ext_authz protocol. Cerbos acts as the external authorization service — Gloo forwards each request to Cerbos for policy evaluation before routing to your upstream services.
Yes. Gloo Gateway uses Envoy as its data plane. The Cerbos integration uses the same ext_authz gRPC protocol, same policy evaluation, and same configuration. You configure ext_authz via Gloo's AuthConfig resource.
No. Authorization happens at the gateway layer. Your services receive only pre-authorized traffic.
What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.