Oso Cloud
  • What is Oso Cloud?
  • Tutorials
    • Quickstart
    • Intro to Polar
    • Authorization Modeling
    • End-to-End Example
  • How-To Guides
    • Model Role-Based Access Control (RBAC)
      • Multitenant Roles
      • Resource-Specific Roles
      • Global Roles
      • Custom Roles
      • Role-Based Access Control (RBAC) in Node.js
    • Model Relationship-Based Access Control (ReBAC)
      • User Groups
      • Files & Folders
      • User-Resource Relations
      • Impersonation
      • Organization Hierarchies
    • Model Attribute-Based Access Control (ABAC)
      • Public/Private Resources
      • Conditional Roles
      • Time-Based Checks
      • Entitlements
    • Field-Level Authorization
      • Model Resource Fields as Resources
      • Model Resource Fields in Permissions
    • Manage Authorization Data
      • Sync Data
      • Export Data
      • Migrate Data
    • Integrate
      • Authorize Requests
      • Enforce
      • List Filtering
      • Query Oso Cloud
      • Frontend (UI)
      • Use Policy Metadata
      • Authentication
      • GraphQL
    • Develop
      • Use the Local Oso Cloud Binary
      • Set up your Local Development Environment
      • Test your Policy Code
      • Debug an Unexpected Result
    • Run in Production
      • Deployment Models
      • Hybrid Deployment
        • Docker
      • Manage Organization Settings
      • CI and Testing
      • Backup & Recovery
  • Reference
    • Polar
      • Foundations
      • Built-in Types
      • Rules + Facts
      • Operators
      • Constants
      • Resource Blocks
      • Facts as Data
      • Tests
      • Extends
      • Common Patterns
    • Client SDK
      • CLI
      • Node.js
        • Migrating to v2
        • v1 (deprecated)
      • Python
        • Migrating to v2
        • v1 (deprecated)
      • Go
      • Java
      • Ruby
      • .NET
      • HTTP API
      • Changelog
    • Explain
    • Local Authorization
    • Glossary
    • More
      • IDE Support
        • Metric Collection
      • Sandbox Limits
  • Concepts
    • Oso Cloud Architecture
    • Modeling Building Blocks
    • Oso Cloud Data Model
    • Map Relational Data to Facts
    • Deep Dive Tutorials
      • 4 Steps to Authorization: Learning the Basics
        • 1. Application Modeling
          • Patterns in Role Based Access Control (RBAC)
          • Patterns in Relationship Based Access Control (ReBAC)
          • Patterns in Attribute Based Access Control (ABAC)
        • 2. Authorization Data
          • What are Facts?
          • Writing Facts
        • 3. Authorization Enforcement
          • Checking Authorization Decisions
        • 4. Testing, Monitoring, and Debugging Authorization
      • Writing Your First Policy
        • 1. Model Your Application’s Authorization
        • 2. Add Authorization data to Oso Cloud
        • 3. Perform Authorization Checks
        • 4. Monitor and Debug Your Authorization
        • Summary
      • Using Attributes to Control Permissions
        • Modeling Attribute Patterns
        • Authorization Data for Attributes: Facts or Context Facts?
        • Authorization Enforcement with Attributes as Context Facts
      • Code Examples
    • Authorization Best Practices (opens in a new tab)
    • Consistency
  • About
    • FAQ
    • Security (opens in a new tab)
    • Oso Status (opens in a new tab)
    • Get Help (opens in a new tab)
    • Legacy Open Source Library (opens in a new tab)
  • What is Oso Cloud?
  • Tutorials
    • Quickstart
    • Intro to Polar
    • Authorization Modeling
    • End-to-End Example
  • How-To Guides
    • Model Role-Based Access Control (RBAC)
      • Multitenant Roles
      • Resource-Specific Roles
      • Global Roles
      • Custom Roles
      • Role-Based Access Control (RBAC) in Node.js
    • Model Relationship-Based Access Control (ReBAC)
      • User Groups
      • Files & Folders
      • User-Resource Relations
      • Impersonation
      • Organization Hierarchies
    • Model Attribute-Based Access Control (ABAC)
      • Public/Private Resources
      • Conditional Roles
      • Time-Based Checks
      • Entitlements
    • Field-Level Authorization
      • Model Resource Fields as Resources
      • Model Resource Fields in Permissions
    • Manage Authorization Data
      • Sync Data
      • Export Data
      • Migrate Data
    • Integrate
      • Authorize Requests
      • Enforce
      • List Filtering
      • Query Oso Cloud
      • Frontend (UI)
      • Use Policy Metadata
      • Authentication
      • GraphQL
    • Develop
      • Use the Local Oso Cloud Binary
      • Set up your Local Development Environment
      • Test your Policy Code
      • Debug an Unexpected Result
    • Run in Production
      • Deployment Models
      • Hybrid Deployment
        • Docker
      • Manage Organization Settings
      • CI and Testing
      • Backup & Recovery
  • Reference
    • Polar
      • Foundations
      • Built-in Types
      • Rules + Facts
      • Operators
      • Constants
      • Resource Blocks
      • Facts as Data
      • Tests
      • Extends
      • Common Patterns
    • Client SDK
      • CLI
      • Node.js
        • Migrating to v2
        • v1 (deprecated)
      • Python
        • Migrating to v2
        • v1 (deprecated)
      • Go
      • Java
      • Ruby
      • .NET
      • HTTP API
      • Changelog
    • Explain
    • Local Authorization
    • Glossary
    • More
      • IDE Support
        • Metric Collection
      • Sandbox Limits
  • Concepts
    • Oso Cloud Architecture
    • Modeling Building Blocks
    • Oso Cloud Data Model
    • Map Relational Data to Facts
    • Deep Dive Tutorials
      • 4 Steps to Authorization: Learning the Basics
        • 1. Application Modeling
          • Patterns in Role Based Access Control (RBAC)
          • Patterns in Relationship Based Access Control (ReBAC)
          • Patterns in Attribute Based Access Control (ABAC)
        • 2. Authorization Data
          • What are Facts?
          • Writing Facts
        • 3. Authorization Enforcement
          • Checking Authorization Decisions
        • 4. Testing, Monitoring, and Debugging Authorization
      • Writing Your First Policy
        • 1. Model Your Application’s Authorization
        • 2. Add Authorization data to Oso Cloud
        • 3. Perform Authorization Checks
        • 4. Monitor and Debug Your Authorization
        • Summary
      • Using Attributes to Control Permissions
        • Modeling Attribute Patterns
        • Authorization Data for Attributes: Facts or Context Facts?
        • Authorization Enforcement with Attributes as Context Facts
      • Code Examples
    • Authorization Best Practices (opens in a new tab)
    • Consistency
  • About
    • FAQ
    • Security (opens in a new tab)
    • Oso Status (opens in a new tab)
    • Get Help (opens in a new tab)
    • Legacy Open Source Library (opens in a new tab)
Concepts
Deep Dive Tutorials

Deep Dive Tutorials

These are more intensive tutoirals that will show you how to get started with authorization in a production application.

  • 4 Steps to Authorization: Learning the Basics
  • Writing your First Policy
  • Using Attributes to Control Permissions
  • Code Examples
4 Steps to Authorization: Learning the Basics

© 2024 Oso Security Inc.