Fine grained access controls extending the roles defined in Okta
Request time attribute based authorization enables more contextual access controls
Independent authorization logic avoids bloated tokens and workarounds
Define access policies using human readable YAML. No need to master a new policy language.
Dynamically derive new roles based on contextual information. Don’t be limited to what your IdP provides.
Make use of context such as IP address and time of day to make realtime access decisions
Access decisions in milliseconds.
Develop, test, and deploy policies just as you do with your source code.
Built-in policy versioning to support canary deployments and different environments.
Containerised deployment as a microservice or a sidecar. REST and gRPC interfaces. Top-notch observability.
Capture every decision and analyze them later.
Leverage our community for examples and help.