All integrations
Proxy Extensions
Context sources

Enrich authorization requests without changing application code

Proxy extensions intercept authorization requests to enrich them with data from identity providers, databases, and internal services — transparently, before policy evaluation.

Transparent enrichment

Transparent enrichment

Applications send minimal authorization requests — proxy extensions fetch the rest from identity providers, databases, and internal services

Response transformation

Response transformation

Redact sensitive fields, generate audit events, or reshape responses before they reach the caller

Zero application changes

Zero application changes

Enrichment logic is externalized from application code — data source migrations and new attributes require no application changes

How Cerbos works with Proxy Extensions

Authorization decisions are only as good as the data behind them. Proxy Extensions provides real-time context (user profiles, group memberships, or external attributes) that makes Cerbos policies richer and more accurate.

Cerbos lets you write fine-grained, context-aware authorization policies in human-readable YAML. With Proxy Extensions as a context source, those policies can evaluate attributes beyond what's in the initial request.

Because enrichment happens at the policy layer, your application code stays clean, no custom plumbing to fetch and merge identity data before making authorization calls.

The data problem in authorization

Authorization decisions require context — user attributes, group memberships, resource metadata — that rarely arrives in the initial request. Applications typically build bespoke data-fetching logic to assemble this context before calling the policy engine. Proxy extensions externalize this responsibility.

How proxy extensions work

  1. An application sends an authorization request with minimal context — a user ID and resource reference.
  2. Proxy extensions enrich the request by fetching principal attributes, group memberships, resource metadata, or any other data from configured sources.
  3. The enriched request reaches the policy engine for evaluation.
  4. Proxy extensions process the response — redacting fields, generating audit events, or triggering side effects before it is returned.

Extensions are implemented as Starlark scripts or Wasm modules and can be chained in priority order. The calling application is unaware of the enrichment — it makes a standard Cerbos API call.

Why externalize enrichment

When data-fetching logic lives in applications, multiple teams independently build the same integrations, data source changes cascade into application deployments, and authorization data flows are scattered across codebases. Proxy extensions centralize this logic alongside the policy engine, making it auditable, observable, and independent of application release cycles.

Get started

Proxy extensions are available as part of Cerbos Hub. Talk to us to learn more about externalizing authorization data enrichment.

FAQ

What are proxy extensions?

Proxy extensions intercept authorization requests as they pass through Cerbos. They can enrich requests with additional data before policy evaluation and transform responses before they reach the caller. The calling application is unaware of the enrichment — it makes a standard Cerbos API call.

What can proxy extensions do?

Common uses include fetching principal attributes from identity providers, looking up resource metadata from databases, redacting sensitive fields from responses, generating audit logs, and rolling out data source changes without modifying applications.

How are multiple proxy extensions ordered?

Each proxy extension has a priority value. Extensions execute in priority order. Extensions can be marked as required, which terminates the chain on failure, or optional, which allows the chain to continue.

Cerbos + Proxy Extensions

  • Authorization decisions enriched with real-time Proxy Extensions data
  • Context enrichment configured at the policy layer, not in application code
  • Identity attributes and business context combined in policies
  • Centrally managed authorization logic across the stack

What is Cerbos?

Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.

Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.