Episode 122 - GluuFederation/identerati-office-hours GitHub Wiki

Title: Cedar v. Rego v. OpenFGA

Channels

Description

Cedar’s simple and intuitive syntax supports common authorization use-cases with readable policies, naturally leveraging concepts from role-based, attribute-based, and relation-based access control models. In this episode we'll discuss a paper that compares Cedar to two open-source languages: OpenFGA and Rego. And why the subjective conclusion is that Cedar has equally or more readable policies, and objectively better performance.

Homework

Takeaways

  • ⚡ 2025 is the dawn of the "Golden Age of Automated Reasoning"! Cedar creates a bridge to analyzable security via some fancy math which implementers don't need to understand. This means Cedar enables enterprises to “prove” that their policies are secure by evaluating universal statements--even about the future, like "No S3 bucket may ever be public".

  • ⚡ Rego fell into the "Turing tar-pit"--building a Rego analyzer would be difficult, as Datalog program equivalence is undecidable. Zanzibar lacks the search flexibility needed for complex ABAC filters. Cedar was developed to address deficiencies in the respective safety and flexibility of those existing solutions.

  • ⚡ Automated reasoning scales--not just from a performance, but from a governance perspective. Enterprises can eliminate the risk of a policy delta when upgrading complex systems or databases.

  • ⚡ Schema is Cedar's super power. Enterprises must define the properties of any entity about which there is a Cedar policy. That's a good thing...

  • ⚡ Cedar adoption by MongoDB for fine grain authoriation is perhaps the start of a trend by database vendors. Cedar schema maps one-to-one with database models.

Livestream Audio Archive

here