Introducing Cerbos Hub Playground engine settings, authorization in Flask, practical concerns with regard to stateless architecture
View in browser
Cerbos February newsletter

Since our last update, we have introduced Cerbos Hub Playground engine settings, tailored for those of you who are building more complex policies and want a development experience that mirrors real-world deployments more closely.

 

We've also been busy expanding our educational resources - we have published a guide on API security best practices, and a demo on implementing authorization in Flask.

 

In other news, we’ve written a blog on how to implement an asynchronous fetch function in a Remix app, explored practical concerns with regard to stateless architecture, and published the final chapter of our monolith to microservice migration ebook where we look at how’s it possible to achieve effective team collaboration and code ownership.

Product Updates

Cerbos Hub

 

We have rolled out an update to the Cerbos Hub Playground, which introduces new settings in the Playground’s right-hand sidebar, letting you configure the Cerbos PDP engine used when evaluating policy during development, in a way that reflects your actual environment. You can find full details of these settings in the Cerbos configuration reference.

 

The changes include the ability to configure the default policy version, ability to enable lenient scope search, and the addition of global variables, which allow you to pass environment-specific information into your policy conditions during evaluation.

Cerbos Hub Playground engine settings

Explore Cerbos Hub

Cerbos PDP

 

In case you missed it, we released v0.40 of Cerbos PDP at the end of last year, in which we introduced a new constants policy type and improved ergonomics for test suites.

 

Constants policy type, a new way of defining structured, constant values that can be referenced in policy conditions, has been introduced. This is the perfect place to define common data such as quota levels, usage limits and configuration values which can then be interrogated in conditions across other policy types.

 

This release also includes several enhancements to the policy testing framework to help reduce repetition, increase readability and increase reliability:

  • Test fixtures now allow creation of groups of principals or resources. These grouped principals or resources can be referenced by their group name in the test cases.
  • Tests that exercise policies with time-based conditions must define the value of now at the test suite level or at the individual test case level. This ensures that tests are not flaky depending on the time of day the tests are run.

This is the last Cerbos release with support for SQL Server as a policy storage backend. It will be removed in the next release of Cerbos. 

 

You can find the full release notes here: v0.40

Cerbos PDP is open source, check out our GitHub

Helpful Content

Authorization and access control in Flask

 

You can implement authorization in your application by writing if-statements to check what actions a user can perform. However, this approach will require you to write many such statements, and ties the authorization logic to your application. To streamline your authZ process and avoid unforeseen bugs, you can adopt a central Policy Decision Point (PDP) that all your applications can connect to for authorization checks. In this demo, we go through the implementation of a blog application that integrates with a Cerbos PDP server for authorization checks.

Upcoming Events

For those of you who we met at CyberSec Asia and the Gartner IAM Summit: thank you for stopping by and chatting with us. Your support means a lot!

 

We’re looking forward to the following conferences in the coming weeks.

 

Visit our booth at:

  • CyberSec Asia, Bangkok, Thailand, January 22-23

  • DevWorld Conference, Amsterdam, Netherlands, February 27-28. Booth 5C.
  • KubeCon Europe, London, UK, April 1-4, Booth S632 in the startup section (Psst, ask us for a discount code to get 20% off your registration). And catch Daniel Maher’s talk, Authz as a dev workflow, on April 4.

Meet Daniel Maher, speaking at:

  • OWASP Snowfroc, Denver, USA, March 14

Meet Alex Olivier and Emre Baran at:

  • Gartner IAM UK, London, UK, March 24-25

Stay connected

    • Join our Slack Community to keep up-to-date with latest developments
    • Let us help you build or review your first policy. Book a 30 minute free workshop
    • Cerbos PDP is open source, feel free to browse or contribute
    • Learn more about Cerbos Hub, a complete authorization management system for authoring, testing and deploying policy
    • Browse our developer documentation for Cerbos PDP and Cerbos Hub 
    • Experience Cerbos and policy writing via an in-browser Playground

     

    You are receiving this email because either we have met, chatted, or you've visited our website cerbos.dev and asked us to keep you up-to-date. If you have been forwarded this email, you can subscribe and receive future updates directly from us. If you prefer not to receive these updates, you can unsubscribe below, but we hope you stay!

     

     

    X X
    LinkedIn LinkedIn
    YouTube YouTube
    Email Email
    GitHub Git Hub

    Cerbos, 86-90 Paul Street,  London, UK, EC2A 4NE, United Kingdom.

    Unsubscribe  Manage Preferences