Oso Cloud Documentation

Oso decouples authorization from your application, so you can build fine-grained access control independently of your business logic. Model RBAC, ReBAC, ABAC or any other logic using Polar, our purpose-built language for authorization. Instead of writing ad-hoc permissions checks, you call our service to determine who can do what. Think feature flags, but for access control.

Learn More ->

How Oso Works

Authorization with Oso Cloud relies on two components:

  1. An authorization policy
  2. User authorization data

Oso Cloud's authorization flow

An authorization policy is defined using Oso’s domain specific language Polar (opens in a new tab). It is a simple, expressive representation of the authorization rules in your application. A policy written in Polar can be defined using .polar files or Oso’s Workbench console.

User data are defined in Oso as Facts (opens in a new tab). While we define the authorization permissions in Oso with policies, we define the current state of users and resources by storing Facts in Oso. You can add Facts in Oso using your own code or - to get started - Oso’s Workbench console.

Get started

QuickstartInstall
Build your first policy in Oso CloudSet up your development environment

Use cases

RBACReBACABACLLMs (opens in a new tab)
Multitenant, global, and resource-specific rolesUser groups, files and folders, organization hierarchiesPublic/private, time-based checks, entitlementsPermissions-aware responses, so LLMs don't leak sensitive data to users

SDKs

Join the Community

We're obsessed with authorization. Join us in our obsession on Slack.

Search the documentation