https://www.facebook.com/itzonepakistan
×

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2021
  • February 2021
  • December 2020
  • November 2020
  • April 2019

Categories

  • Business
  • DMS
  • Networking
  • Technology
  • Tips
  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

HOW TO SHOP

1 Login or create new account.
2 Review your order.
3 Payment & FREE shipment

If you still have problems, please let us know, by sending an email to support@website.com . Thank you!

SHOWROOM HOURS

Mon-Fri 9:00AM - 6:00AM
Sat - 9:00AM-5:00PM
Sundays by appointment only!
social sharing

SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!
QUESTIONS? CALL: 03144 166 777
  • LOGIN
  • SUPPORT

IT Zone Pakistan

IT Zone Pakistan

IT Zone Pakistan | Graphics, Web Design, ERP, Document Scanning Services, 3d interior design

T (31) 44 166 777
Email: sales@itzonepakistan.com

IT Zone Pakistan
II Chundriger Road Uni Plaza Karachi-Pakistan

Open in Google Maps
  • Home – IT Zone
  • About Us
  • Our Services
    • Office Paper Shredding Service – Free of Charge!
    • Document Scanning Services
    • Document Management Software
    • Office Computer Scrap Buying
  • Shop
  • BLOG & STORIES
    • EVENTS
  • Contact Us
  • MY CART
    No products in cart.
FREEQUOTE
  • Home
  • BLOG & STORIES
  • Uncategorized
  • Auth0’s OpenFGA explained: Open source universal authorization – CSO Online
July 1, 2025

Auth0’s OpenFGA explained: Open source universal authorization – CSO Online

Auth0’s OpenFGA explained: Open source universal authorization – CSO Online

by admin / Saturday, 24 September 2022 / Published in Uncategorized

Matthew Tyson By Matthew Tyson
Software Architect, CSO |
Auth0’s OpenFGA project is an open source effort that undertakes to provide a universal authorization solution. FGA stands for “Fine Grained Authorization,” a granular approach to authorization modeling that is flexible enough to handle almost any imaginable use case. 
Read on for an introduction to the OpenFGA project.
Authentication is concerned with who and authorization with what.  Authentication answers the question: who are you?  Authorization answers the question: given who you are, what can you do?
Both of these are essential areas of cybersecurity, but of the two, authorization presents the more demanding architectural challenge.  That is because authorization deals with more complexity and far more data points. 
Authorization has to track a whole range of permissioned entities, like URLs and business objects, as well as access types like view, create, and edit.  Not only that, it must also deal with granting and revoking permissions to these objects.  Therefore, it is responsible for determining not just who has access to what, but who has permission to control permissions, the hierarchy of control between organizations and individuals.
Anyone who has dealt with these things knows just how messy it can become.  Tracking and applying permissions is a thorny problem, and it’s one that you can’t sidestep or cut corners on.  The difficulties only multiply the larger the system becomes.  Simple scalability begins to become a real challenge in the face of millions of permissions checks against billions of entities.
Defining a generalized system to handle such requirements—one that is flexible enough to deal with the variety of in-the-world requirements, but still reliable, secure, and performant—is a substantial undertaking, but one that promises major benefits to enterprise.  Beyond making authorization more standard and eliminating the need to rebuild it per-application, such a system would enable more streamlined cross-application authorization communication.  Furthermore, concentrating authorization into a single, well-tested system offers security improvements.
Google’s Zanzibar project (whitepaper) describes such a universal authorization layer.  It incorporates a number of technological ideas to achieve the performance and availability goals of the system, and it offers a fairly developer friendly application programming interface (API) for interacting with it.  In particular, it delivers a universal domain-specific language (DSL) for describing users, groups, roles, and access control lists (ACLs) for expressing permissions.
Auth0 (now part of Okta) took up the challenge of delivering a system based on Zanzibar’s ideas in a reusable way with its upcoming Fine Grained Authorization SaaS.  Auth0 FGA essentially creates a remote API with which any app can integrate to obtain a universal permissions service.  Auth0’s Matias Woloski describes it as a high-performance and flexible authorization microservice that you don’t have to build and run yourself.  This allows application developers to offload much of the complexity in authorization to the remote service, while retaining control over most data in-house. 
Although this is a good model for many use cases, Auth0 has taken the further step of open sourcing its FGA core as the OpenFGA project (GitHub repo).  This is a significant move on a couple fronts.  For one, it represents a major commitment to open source by Auth0.  For the other, it contributes an enormous amount of know-how and capability to the OSS community.  Once the community has its hands on things, it tends to elaborate and expand upon them in unexpected ways.
In its announcement of the move, Auth0 gives several reasons and among them are the desire to encourage an active community that will support adoption, integration with technology-specific tooling, and the systemic improvement of security in the industry.  It does indeed appear we are looking at a big enterprise-open-source partnership win here.
Woloski outlines Auth0’s strategy, saying that by “open sourcing it, we let developers embed this component in their own infrastructure. Once they feel comfortable, they can decide to let us run it for them as a service with additional enterprise features, or keep using the open source version. We are committed to maintaining it in the long term.”
The core of the project is the permission engine itself, a standalone server that can handle the authorization requests.  The OpenFGA server is modular with respect to data storage, and currently you can choose between an in-memory datastore or PostgresSQL.  The ability to run the server on owned infrastructure is a key benefit, as some compliance situations demand it.   This server is fundamentally an HTTP API allowing for defining permission models, and querying/modifying them. 
The server is written in Go and can be built from sources for those interested in contributing, but most end users will deploy the binaries or Docker image.  Quickstart for running on localhost via Docker is here.
Being based on the Zanzibar architecture, the OpenFGA server is built with an eye to scaling and availability.  Of course, that depends greatly on the underlying infrastructure.
“Zanzibar implementations are heavily optimized to answer if a user can perform an action on a resource in a scalable way. OpenFGA is not an exception,” says Woloski. “When using the Auth0 FGA implementation, Auth0 will own the infrastructure and make sure it is highly scalable and available. OpenFGA users will be responsible for operating the service on their infrastructure, so the scalability/availability characteristics of the service will depend on it.”
Once the server is running, you can set up a client in your application based on the stack you are using—currently, software development kits (SDKs) exist for Node, Go and .NET.  The client allows you to interact with the server API in an idiomatic way. 
The first task is to define a store on the server, the root level container object for holding the auth information, much like a database within a database management system (DBMS).  The store is then configured with the authorization model, analogous to the schema in a database. 
Once you have the server up, a client installed and a store provisioned, you can define the model by issuing a request using JSON.  For example, using the Node client, a simple data model is configured as in Listing 1.  (This is from the Auth0 quick start).
const { authorization_model_id: id } = await fgaClient.writeAuthorizationModel({
 "type_definitions": [
   {
     "type": "document",
     "relations": {
       "reader": {
         "this": {}
       },
       "writer": {
         "this": {}
       },
       "owner": {
         "this": {}
       }
     }
   }
 ]
});
OpenFGA also supports a DSL for modeling.  The same model in the DSL is in Listing 2.
type document
  relations
    define reader as self
    define writer as self
    define owner as self
At this time it’s not usable with the in-code SDKs, but you can convert between the two and get a visualization using the OpenFGA sandbox here.  (You can also use the SyntexTransformer node library).  The DSL and visualizer are great for refining models.  You can see the simple model from Listings 1 and 2 as seen in the modeler, Figure 1.
Figure 1. Simple auth model in designer (Click image to view full-size)
Tuples are an association among three entities: a user, a relationship, and an object.  They express the instances of things within the data model.  You can create a tuple in the designer in the lower lefthand pane.  For example: owner: alice, relationship: reader, object: document:z.
With the relationship defined, you can query using the query parser at the bottom of the screen, for example: who is related to document:z as reader.  This will appropriately return the alice user as in screen 2.
Figure 2. Returning the readers on document:z (Click image to view full-size)
All relationships are modifiable via the code client.  This gives you an extraordinary amount of power for controlling authorization from within your application, including self-referential granting and revoking of authority based on groups and roles.
The docs (also now open source) cover a great deal of further ground and use cases including using openID and the specifics of securing resources like URLs.
[ Learn how to find the right testing tool for Okta, Auth0, and other SSO solutions and read our interview with Auth0’s Matias Woloski | Sign up for CSO newsletters! ]Matthew Tyson is a founder of Dark Horse Group, Inc. He believes in people-first technology. When not playing guitar, Matt explores the backcountry and the philosophical hinterlands. He has written for JavaWorld since 2007.
Copyright © 2022 IDG Communications, Inc.
Copyright © 2022 IDG Communications, Inc.

source

  • Tweet

About admin

What you can read next

HP ScanJet Pro 2600 f1 – Review 2022 – PCMag AU
WhatsApp For IOS Introduces AR Effects, Backgrounds, And Document Scanning – Tech Build Africa
The best fax machine in 2024 – TechRadar

Recent Posts

  • Samsung phones get one more way to scan documents – SamMobile

    source...
  • Geopro Consultants, LLC brings unique business and technology jobs to Lancaster – Lancaster Eagle-Gazette

    source...
  • How to Use WhatsApp’s Document Scanning Feature? – Analytics Insight

    source...
  • Google Drive update to automatically enhance scanned documents starting Jan 2025: All about the new feature – Mint

    source...
  • Scan and Send Docs in WhatsApp Without Other Apps – BizzBuzz

    source...

Recent Comments

    Featured Posts

    • Samsung phones get one more way to scan documents – SamMobile

      0 comments
    • Geopro Consultants, LLC brings unique business and technology jobs to Lancaster – Lancaster Eagle-Gazette

      0 comments
    • How to Use WhatsApp’s Document Scanning Feature? – Analytics Insight

      0 comments
    • Google Drive update to automatically enhance scanned documents starting Jan 2025: All about the new feature – Mint

      0 comments
    • Scan and Send Docs in WhatsApp Without Other Apps – BizzBuzz

      0 comments

    Archives

    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2021
    • February 2021
    • December 2020
    • November 2020
    • April 2019

    Categories

    • Business
    • DMS
    • Networking
    • Technology
    • Tips
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    GET A FREE QUOTE

    Please fill this for and we'll get back to you as soon as possible!

    FACEBOOK

    2,175
    LIKES

    TWITTER

    1,050
    Followers

    PINTEREST

    101
    follower

    FOOTER MENU

    • Terms and Conditions
    • F.A.Q.
    • Our Services
    • BLOG & STORIES

    NEWSLETTER SIGNUP

    By subscribing to our mailing list you will always be update with the latest news from us.

    We never spam!

    GET IN TOUCH

    II Chundriger Road Uni Plaza Karachi-Pakistan
    Email: Info@Itzonepakistan.com
    Phone:
    Direct+92-314-4166-777
    Sales+92-313-8854-133

    Social Platform

    • Tweet
    • Pin It

    RSS ARY NEWS

    • Govt increases petrol price for next fortnight June 30, 2025
    • GET SOCIAL
    IT Zone Pakistan

    Copyright @2024-25. All rights reserved | Design & Develop IT Zone Pakistan.

    TOP