Kong Plugin for Authorization (via Open Policy Agent)
-
Updated
Sep 2, 2018 - Lua
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
Kong Plugin for Authorization (via Open Policy Agent)
Kubernetes Operator to manage Dynamic Admission Controllers using Open Policy Agent
Micronaut / OPA (Open Policy Agent) demo
Rest API of Role-based Access Control using Open Policy Agent
Ansible role to install Open Policy Agent
Synchronize profile editors into the Open Policy Agent for use in MinIO Access Control / Synchronisation de données des éditeurs de profiles stockés dans Open Policy Agent, ceux-ci utilisés pour la contrôle d'accès à MinIO
An example of local Open Policy Agent (OPA) testing pipeline for Java\Spring Boot\Maven projects
Open Policy Agent and Gatekeeper exploration on Kubernetes
A set of shared policies for use with Conftest and other Open Policy Agent tools
Open Policy Agent Demo for Webassembly in Typescript
This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)
Use Open Policy Agent in combination with Azure Kubernetes cluster
Automated manifest file validation mechanism using Open Policy Agent and GitHub Actions
Setup REST API with Open Policy Agent
Open Policy Agent Demo for Embed file in Go
Experimental AWS ApiGateway Authorizer Go Lambda with embedded Open Policy Agent
Open Policy Agent (OPA) policy coverage visualization
This example app acts as a webhook server that listens to Terraform Cloud Run Tasks and performs OPA evaluation using open-policy-agent Go API.
Open Policy Agent Terraform Example for Sophos Factory