Permguard Enterprise

Permguard community

Join the open-source Permguard community (Apache 2.0 licensed)

Secure your apps with Zero Trust authorization in minutes.

Get Startedbackground

With Permguard Community, application boundaries are secured using Zero Trust principles.

Zero trust principles

Central Configuration

AuthZ Reinvented for the Cloud-Native Era

Run your own AuthZ server. Define your trust zones and policies, and finally enforce authorization with zero coupling.

Zone

Zone

Create and configure Zero Trust Zones.

Identities

Identities

Support human and non-human identities.

Repositories

Ledgers

Create Ledgers and configure their Manifest.

Policies

Policies

Define policies to control what is permitted or forbidden.

Permissions

Scopes

Organize policies using Scopes.

Enforce

Enforce

Enforce the permissions in the application using available SDKs.

Central Configuration

Govern Your Policies Like Code, Without Coding Deployments

In Permguard, policies are versioned, immutable, and traceable, just like code in Git. But they’re not just for developers: they’re designed for operational governance and can evolve safely over time. Deploy changes via CI/CD pipelines or manage them directly in production through the admin panel, always with correctness, compliance, and auditability in mind.

Guaranteed Versioning

Deploy and Enforcement

Deploy Your AuthZ Server and Start Enforcing Authorization

Deploy your AuthZ server and start managing your Trust Zones, Ledgers, and Policies. Finally, integrate the SDK to begin enforcing authorization in your applications.

Step: 1

Create a Permguard Zero Trust Zone, set up its Ledger, and start coding your policies

Create a Permguard Zero Trust Zone, set up its ledger, and start coding your policies
card background
arrow

Step: 2

Plan and apply policies with built-in immutability, versioning, and correctness.

Apply policies and trusted statements as Auth* Models, which are transferable, verifiable, versionable, and immutable.
card background
arrow

Step: 3

Integrate the SDK to define your secure application boundary and enforce authorization policies.

Integrate the SDK to define your secure application boundary and enforce authorization policies.
card background
arrow

Step: 4

With real-time evaluation and eventual consistency, policies remain synchronized across Kubernetes, serverless, VMs, IoT, or edge nodes. Proximity nodes ensure permissions are evaluated instantly.

With real-time evaluation and eventual consistency, policies remain synchronized
card background