
Enforce policy-driven authorization on Semantic Kernel plugin and function invocations using Cerbos.
Control which Semantic Kernel plugins and functions each user or role can invoke with fine-grained Cerbos policies
Authorize function calls based on user identity, roles, attributes, and request context at runtime
Every authorization decision is logged with full context, giving you a complete audit trail of AI agent behavior
AI agents and tools introduce a new class of authorization challenges. They act on behalf of users, access sensitive data, and chain operations, all of which need fine-grained access control.
Cerbos provides policy-driven authorization that controls what AI systems can do, which data they can access, and on whose behalf. Policies are written in human-readable YAML and evaluated at request time.
With Cerbos and Semantic Kernel, you get guardrails that scale with your AI adoption, centrally managed policies, full audit trails, and sub-millisecond decision times that don't slow down agent workflows.
Before a Semantic Kernel agent invokes a plugin function, the application sends the user context, function name, and target resource to the Cerbos PDP. Cerbos evaluates fine-grained policies and returns an allow or deny decision.
Yes. Cerbos policies are attribute-based, so you can restrict plugin and function access by role, department, tenant, or any other context you provide. Policies are written in YAML and managed outside your application code.
Cerbos provides SDKs for .NET, Python, and Java, matching Semantic Kernel's supported languages. Authorization is evaluated via the Cerbos PDP API, so it works with any Semantic Kernel runtime.
What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.