Route extensions expose HTTP endpoints that gateways, proxies, data platforms, and queues call to delegate access control to Cerbos policies — translating each system's native protocol into a policy evaluation.
Accept requests in any format and translate them into Cerbos policy evaluations with declarative CEL or programmable extensions
API gateways, service meshes, data platforms, queues, and internal tooling can all delegate authorization to Cerbos
Infrastructure and application layers enforce the same policies, same attribute vocabulary, same audit trail
Route Extensions provides a native integration point for Cerbos, extending policy-driven authorization to another layer of your stack without custom glue code.
Cerbos policies are written in human-readable YAML supporting RBAC, ABAC, and conditional rules. The same policies that govern your application layer now extend to Route Extensions, enforced consistently everywhere.
A unified control plane means one set of policies, one audit trail, and one management workflow, regardless of how many services and infrastructure layers your system spans.
Many infrastructure components — API gateways, service meshes, data platforms, message queues — have hooks for delegating access control to an external service. Each speaks a different protocol. Route extensions accept these requests, translate them into Cerbos policy evaluations, and return responses in the format the calling system expects.
This creates a single policy surface across your entire stack. The same policies and attribute vocabulary that govern your application layer extend to your infrastructure, with a unified audit trail.
Declarative CEL mapping handles straightforward protocol translations as configuration. Programmable extensions in Starlark or Wasm handle complex transformation logic.
Route extensions are available as part of Cerbos Hub. Talk to us to learn more about extending Cerbos authorization to your infrastructure.
Route extensions expose HTTP endpoints on Cerbos that accept requests in any format, translate them into Cerbos policy evaluations, and return responses in the format the calling system expects. This enables any infrastructure component with an external authorization hook to delegate decisions to Cerbos.
Any system that supports delegating access control via HTTP or gRPC. Common examples include API gateways, service meshes, data platforms like Kafka and Trino, message queues, and internal tooling with ad-hoc authorization logic.
Declarative mapping uses CEL expressions to define the protocol translation as configuration. Programmatic mapping uses Starlark scripts or Wasm modules when the transformation logic is more complex than CEL can express.
What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.