Cerbos

Open-source, language-agnostic authorization server that evaluates RBAC and ABAC policies defined in YAML/JSON, deployable as a sidecar or service with a gRPC/REST API.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Repo ↗ Developer Tools authorization RBAC ABAC open-source self-hosted policy Zanzibar
⚙ Agent Friendliness
64
/ 100
Can an agent use this?
🔒 Security
89
/ 100
Is it safe for agents?
⚡ Reliability
85
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
--
Documentation
88
Error Messages
85
Auth Simplicity
78
Rate Limits
85

🔒 Security

TLS Enforcement
100
Auth Strength
88
Scope Granularity
80
Dep. Hygiene
87
Secret Handling
90

Self-hosted by default — no data leaves your infrastructure. Open-source codebase is auditable. Auth configuration is operator responsibility; misconfiguration can expose unauthenticated endpoints. Cerbos Hub adds managed security controls.

⚡ Reliability

Uptime/SLA
82
Version Stability
87
Breaking Changes
85
Error Recovery
86
AF Security Reliability

Best When

You need a self-hosted, open-source authorization server with strong policy-as-code workflows, compliance auditability, and no per-check cloud egress.

Avoid When

You want zero infrastructure to manage and prefer a fully managed SaaS authorization API with a UI for non-technical policy editors.

Use Cases

  • Evaluate fine-grained access control decisions in real time by calling the check API from any service or agent
  • Define and version-control human-readable YAML policies that express who can do what under which conditions
  • Audit all authorization decisions with structured decision logs for compliance and debugging
  • Run fully offline or air-gapped authorization without any external SaaS dependency
  • Test authorization policies in CI/CD pipelines using Cerbos' built-in policy testing framework

Not For

  • Teams that need a fully managed cloud service with no infrastructure to operate — Cerbos Hub exists but the core is self-hosted
  • Identity management, user authentication, or token issuance — Cerbos only handles authorization decisions
  • Relationship-based access control at massive scale (billions of tuples) — use Zanzibar-native systems like SpiceDB for that

Interface

REST API
Yes
GraphQL
No
gRPC
Yes
MCP Server
No
SDK
Yes
Webhooks
No

Authentication

Methods: mtls jwt api_key
OAuth: No Scopes: No

Auth method depends on deployment configuration. Self-hosted instances can be unauthenticated (internal network), mTLS, or JWT-gated. Cerbos Hub (cloud) uses API keys. Flexible but requires operator configuration.

Pricing

Model: open-source
Free tier: Yes
Requires CC: No

Core server is Apache 2.0 licensed and free. Cerbos Hub adds a managed control plane; pricing is usage-based.

Agent Metadata

Pagination
none
Idempotent
Full
Retry Guidance
Documented

Known Gotchas

  • Policy files must be loaded at startup or via the Admin API; dynamic policy changes require an Admin API call or server restart depending on deployment mode
  • The `principal` object must include all attributes referenced in policies — missing attributes silently evaluate as undefined, which may cause unexpected DENY decisions
  • gRPC is the preferred transport for performance; REST is available but some advanced features (batch checks) are better supported via gRPC
  • Cerbos does not store user or resource state — the calling agent must supply all relevant attributes in every check request, which increases payload size for attribute-rich policies
  • Policy condition syntax uses CEL (Common Expression Language); CEL type errors in conditions fail silently as DENY in some versions rather than returning an evaluation error

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Cerbos.

$99

Scores are editorial opinions as of 2026-03-06.

5215
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered