Permit.io: No-code policy pipeline for cloud-native permissions

permit.ioAn Intellyx Brain Candy Brief

The abstraction event horizon has finally arrived at the permission layer of cloud-native applications. Permit.io’s platform allows developers to call on open source access control pipelines to inject policy-based permissions into Kubernetes-based apps.

Controlling application access and permissions used to be a matter of identifying users and roles, issuing tokens and the like, and developers could afford to use authorization tools or roll their own environments. The advent of cloud-native development created an explosion of microservice environments, with ephemeral services talking to each other and disappearing too fast for access control development plans to keep up with them.

Underneath the hood of its no-code access policy design and policy management interface, Permit.io automatically writes RegO code, declares OPA open policies and pushes them through the OPAL delivery layer. With simple menus and checkboxes, resources and their attributes can be tagged at any level of detail, so developers can embed fine-grained access permissions for users and services into their own application code – with just a couple lines of code.

Copyright ©2022 Intellyx LLC. Intellyx publishes the Cloud-Native Computing poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

SHARE THIS:

Principal Analyst & CMO, Intellyx. Twitter: @bluefug