Skip to content

CONCEPT Cited by 1 source

Authorization as a service

Definition

Authorization as a service is authorization delivered as a platform capability: application teams opt in with a single declarative statement (e.g., "protect application X") and the platform transparently handles the policy engine, bundle distribution, observability, and monitoring. The application's responsibility ends at the policies themselves — everything else belongs to the platform.

Contrast with the common anti-shape: "every team deploys its own OPA sidecar, wires its own metrics, maintains its own bundle fetch, and re-implements its own runbooks." That is OPA-as-a-library, not authorization-as-a-service.

Load-bearing properties

Seen in

  • sources/2024-12-05-zalando-open-policy-agent-in-skipper-ingress — Zalando's canonical instance. Platform team embeds OPA as a library inside Skipper ingress, hides bundle source (S3) + observability (Lightstep) + bootstrap rules behind the platform; app teams opt in with a one-line Skipper filter annotation opaAuthorizeRequest("my-application") and write Rego in their own Git repos. Explicitly framed in the post: "Enabling OPA for a specific application is as easy as just stating 'application X should be protected' without touching multiple YAML files, adding monitoring, and inheriting many more responsibilities to be compliant."
Last updated · 550 distilled / 1,221 read