Permguard Enterprise

Permguard community

Join the Permguard Community, Open Source. Apache 2.0.

Secure your apps with Zero Trust authorization in minutes.

Get Startedbackground

With Permguard Community, application boundaries are secured using Zero Trust principles.

Zero trust principles

Central Configuration

AuthZ Reinvented for the Cloud-Native Era

Run your own AuthZ Server. Define your Trust Zones, Identities, and Policies, and enforce authorization with zero coupling.

Zone

Zone

Create and configure an Account, optionally including its Tenants.

Identities

Identities

Create and identity source and populate it with Users and Roles using available SDKs.

Repositories

Repositories

Create Repository and configure its Schema (domains, resources and actions).

Policies

Policies

Configure Policies to define what can be permitted or forbidden.

Permissions

Permissions

Configure Permissions on policies and assign them to identities (users and roles).

Enforce

Enforce

Enforce the permissions in the application using available SDKs.

Central Configuration

Govern Your Policies Like Code, Without Coding Deployments

In PermGuard, policies are versioned, immutable, and traceable, just like code in Git. But they’re not just for developers: they’re designed for operational governance and can evolve safely over time. Deploy changes via CI/CD pipelines or manage them directly in production through the admin panel, always with correctness, compliance, and auditability in mind.

Guaranteed Versioning

Deploy and Enforcement

Deploy Your AuthZ Server and Start Enforcing Authorization

In PermGuard, policies are versioned, immutable, and traceable, just like code in Git. But they’re not just for developers: they’re designed for operational governance and can evolve safely over time. Deploy changes via CI/CD pipelines or manage them directly in production through the admin panel, always with correctness, compliance, and auditability in mind.

Step: 1

Create a Permguard Zero Trust Zone, set up its ledger, and start coding your policies

Create a Permguard Zero Trust Zone, set up its ledger, and start coding your policies
card background
arrow

Step: 2

Plan and apply policies with built-in immutability, versioning, and correctness, then enforce them everywhere with confidence.

Apply policies and trusted statements as Auth* Models, which are transferable, verifiable, versionable, and immutable.
card background
arrow

Step: 3

Integrate the SDK to define your secure application boundary and enforce authorization policies.

Integrate the SDK to define your secure application boundary and enforce authorization policies.
card background
arrow

Step: 4

With real-time evaluation and eventual consistency, policies remain synchronized across Kubernetes, serverless, VMs, IoT, or edge nodes. Proximity nodes ensure permissions are evaluated instantly.

With real-time evaluation and eventual consistency, policies remain synchronized
card background