
Policy-Based Access Control (PBAC) is a dynamic approach to manage access control in complex environments. It utilizes a policy engine and a policy definition language (Cerbos uses simple YAML) to articulate and enforce access rules. In PBAC, policies define the criteria for access and are managed using standard software development lifecycle tools, offering a scalable and adaptable solution for varying access control needs.
apiVersion: api.cerbos.dev/v1
resourcePolicy:
version: default
resource: pbacExample
rules:
- actions:
- VIEW
effect: EFFECT_ALLOW
roles:
- USER
condition:
match:
all:
of:
- expr: request.principal.attr.department == "IT"
- expr: request.resource.attr.type == "confidential"
In this PBAC policy, access to confidential resources is granted based on the principal’s attributes pf department and the resource type. This showcases how PBAC allows for highly granular and context-specific access control.
Fit Cerbos seamlessly into your tech stack
Prototype policies in your browser right now
Implement roles & permissions in your app
Book an intro call and learn more
Join thousands of developers | Features and updates | 1x per month | No spam, just goodies.
What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.