Proxy extensions intercept authorization requests to enrich them with data from identity providers, databases, and internal services — transparently, before policy evaluation.
Applications send minimal authorization requests — proxy extensions fetch the rest from identity providers, databases, and internal services
Redact sensitive fields, generate audit events, or reshape responses before they reach the caller
Enrichment logic is externalized from application code — data source migrations and new attributes require no application changes
Authorization decisions are only as good as the data behind them. Proxy Extensions provides real-time context (user profiles, group memberships, or external attributes) that makes Cerbos policies richer and more accurate.
Cerbos lets you write fine-grained, context-aware authorization policies in human-readable YAML. With Proxy Extensions as a context source, those policies can evaluate attributes beyond what's in the initial request.
Because enrichment happens at the policy layer, your application code stays clean, no custom plumbing to fetch and merge identity data before making authorization calls.
Authorization decisions require context — user attributes, group memberships, resource metadata — that rarely arrives in the initial request. Applications typically build bespoke data-fetching logic to assemble this context before calling the policy engine. Proxy extensions externalize this responsibility.
Extensions are implemented as Starlark scripts or Wasm modules and can be chained in priority order. The calling application is unaware of the enrichment — it makes a standard Cerbos API call.
When data-fetching logic lives in applications, multiple teams independently build the same integrations, data source changes cascade into application deployments, and authorization data flows are scattered across codebases. Proxy extensions centralize this logic alongside the policy engine, making it auditable, observable, and independent of application release cycles.
Proxy extensions are available as part of Cerbos Hub. Talk to us to learn more about externalizing authorization data enrichment.
Proxy extensions intercept authorization requests as they pass through Cerbos. They can enrich requests with additional data before policy evaluation and transform responses before they reach the caller. The calling application is unaware of the enrichment — it makes a standard Cerbos API call.
Common uses include fetching principal attributes from identity providers, looking up resource metadata from databases, redacting sensitive fields from responses, generating audit logs, and rolling out data source changes without modifying applications.
Each proxy extension has a priority value. Extensions execute in priority order. Extensions can be marked as required, which terminates the chain on failure, or optional, which allows the chain to continue.


What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.