Kong Plugin for Authorization (via Open Policy Agent)
-
Updated
Sep 2, 2018 - Lua
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
Kong Plugin for Authorization (via Open Policy Agent)
Kubernetes Operator to manage Dynamic Admission Controllers using Open Policy Agent
Using OPA Gatekeeper to deny admission or audit Istio and Istio-related objects
Why and how would you unit test your Infrastructure-as-Code and other configuration files
Micronaut / OPA (Open Policy Agent) demo
Audit Logging for OPA Decision Logs
A e2e demo of serverless technologies
The Container Security Book—a free book for practitioners
A demo showcasing some examples of Test-Driven Development (TDD) for Infrastructure
Temporal reasoning with OPA
An easy way to generate Gatekeeper contraintTemplates from Rego files.
Anomaly Detection in OPA Decision Logs
KPR validates multiple kubernetes manifests.
OPA-Envoy-SPIRE External Authorization Example.
Rest API of Role-based Access Control using Open Policy Agent
Ansible role to install Open Policy Agent
Synchronize profile editors into the Open Policy Agent for use in MinIO Access Control / Synchronisation de données des éditeurs de profiles stockés dans Open Policy Agent, ceux-ci utilisés pour la contrôle d'accès à MinIO
An example of local Open Policy Agent (OPA) testing pipeline for Java\Spring Boot\Maven projects
Open Policy Agent and Gatekeeper exploration on Kubernetes