All integrations
Traefik
API gateways

Policy-driven authorization at the Traefik proxy

Enforce fine-grained Cerbos authorization policies at the Traefik edge — before requests reach your services.

Native Traefik support

Native Traefik support

Cerbos integrates with Traefik's ForwardAuth middleware, no custom glue code required

Unified policies

Unified policies

The same CEL-based policies that govern your application layer extend to your infrastructure

Defense in depth

Defense in depth

Authorization at every layer of your stack, managed from a single control plane

How Cerbos works with Traefik Proxy

Enforcing authorization at the Traefik Proxy gateway means unauthorized requests are rejected before they reach your services, reducing load, improving security posture, and simplifying backend code.

Cerbos provides fine-grained, context-aware authorization policies written in human-readable YAML. When integrated with Traefik Proxy, these policies are evaluated at the edge for every incoming request.

The same Cerbos policies govern authorization at the gateway and within your services, one source of truth, one audit trail, and consistent enforcement across every layer.

How Cerbos works with Traefik

  1. Deploy Cerbos alongside Traefik, Run the Cerbos PDP as a sidecar or service accessible from your Traefik proxy.
  2. Configure the ForwardAuth middleware, Set up Traefik to call Cerbos on incoming requests, passing identity and request metadata.
  3. Define authorization policies in YAML, Write policies that control access based on routes, methods, roles, and request attributes.
  4. Requests are authorized at the edge, Unauthorized requests are rejected before reaching your services, reducing load and improving security posture.

FAQ

How does Cerbos work with Traefik?

Traefik calls the Cerbos PDP for every incoming request. Cerbos evaluates your authorization policies using the request context (headers, claims, path) and returns an allow or deny decision, all at the gateway edge.

Does this replace backend authorization?

Gateway-level authorization provides defense in depth. You can enforce coarse-grained policies at the edge and fine-grained policies within your services, both managed by Cerbos.

Cerbos + Traefik Proxy

  • Cerbos evaluates fine-grained policies at the Traefik Proxy edge
  • Unauthorized requests rejected before reaching upstream services
  • Same policies enforced at the gateway and within services
  • Centrally managed and audited authorization decisions

What is Cerbos?

Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.

Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.