Oso Cloud
  • Tutorials
    • Quickstart
    • Authorization Modeling
    • End-to-End Example
  • How-To Guides
    • Model Role-Based Access Control (RBAC)
      • Multitenant Roles
      • Resource-Specific Roles
      • Global Roles
      • Custom Roles
    • Model Relationship-Based Access Control (ReBAC)
      • User Groups
      • Files & Folders
      • User-Resource Relations
      • Impersonation
      • Organization Hierarchies
    • Model Attribute-Based Access Control (ABAC)
      • Public/Private Resources
      • Conditional Roles
      • Time-Based Checks
      • Entitlements
      • Sync and Export Data
      • Migrate Data and Policies
      • Enforce
      • Filter lists
      • Query Oso Cloud
      • Frontend (UI)
      • Authentication
      • GraphQL
      • Debug an Unexpected Result
      • Local Development
      • Local Environment
      • Policy Tests
      • CI and Testing
      • Fallback
        • Docker
      • Manage Organization Settings
      • Recovery
      • CLI
      • Node.js
      • Python
      • Go
      • Ruby
      • .NET
      • HTTP API
      • Patterns
      • Syntax
      • Resource Blocks
      • Foundations
    • Explain
    • Glossary
      • IDE Support
        • Metric Collection
      • Sandbox Limits
    • What is Oso Cloud
    • Oso Cloud Architecture
    • Modeling Building Blocks
    • Oso Cloud Data Model
      • 4 Steps to Authorization: Learning the Basics
        • 1. Application Modeling
          • Patterns in Role Based Access Control (RBAC)
          • Patterns in Relationship Based Access Control (ReBAC)
          • Patterns in Attribute Based Access Control (ABAC)
        • 2. Authorization Data
          • What are Facts?
          • Writing Facts
        • 3. Authorization Enforcement
          • Checking Authorization Decisions
        • 4. Testing, Monitoring, and Debugging Authorization
      • Writing Your First Policy
        • 1. Model Your Application’s Authorization
        • 2. Add Authorization data to Oso Cloud
        • 3. Perform Authorization Checks
        • 4. Monitor and Debug Your Authorization
        • Summary
      • Using Attributes to Control Permissions
        • Modeling Attribute Patterns
        • Authorization Data for Attributes: Facts or Context Facts?
        • Authorization Enforcement with Attributes as Context Facts
      • Code Examples
    • Authorization Best Practices (opens in a new tab)
    • FAQ
    • Security (opens in a new tab)
    • Oso Status (opens in a new tab)
    • Get Help (opens in a new tab)
    • Legacy Open Source Library (opens in a new tab)
  • Tutorials
    • Quickstart
    • Authorization Modeling
    • End-to-End Example
  • How-To Guides
    • Model Role-Based Access Control (RBAC)
      • Multitenant Roles
      • Resource-Specific Roles
      • Global Roles
      • Custom Roles
    • Model Relationship-Based Access Control (ReBAC)
      • User Groups
      • Files & Folders
      • User-Resource Relations
      • Impersonation
      • Organization Hierarchies
    • Model Attribute-Based Access Control (ABAC)
      • Public/Private Resources
      • Conditional Roles
      • Time-Based Checks
      • Entitlements
      • Sync and Export Data
      • Migrate Data and Policies
      • Enforce
      • Filter lists
      • Query Oso Cloud
      • Frontend (UI)
      • Authentication
      • GraphQL
      • Debug an Unexpected Result
      • Local Development
      • Local Environment
      • Policy Tests
      • CI and Testing
      • Fallback
        • Docker
      • Manage Organization Settings
      • Recovery
      • CLI
      • Node.js
      • Python
      • Go
      • Ruby
      • .NET
      • HTTP API
      • Patterns
      • Syntax
      • Resource Blocks
      • Foundations
    • Explain
    • Glossary
      • IDE Support
        • Metric Collection
      • Sandbox Limits
    • What is Oso Cloud
    • Oso Cloud Architecture
    • Modeling Building Blocks
    • Oso Cloud Data Model
      • 4 Steps to Authorization: Learning the Basics
        • 1. Application Modeling
          • Patterns in Role Based Access Control (RBAC)
          • Patterns in Relationship Based Access Control (ReBAC)
          • Patterns in Attribute Based Access Control (ABAC)
        • 2. Authorization Data
          • What are Facts?
          • Writing Facts
        • 3. Authorization Enforcement
          • Checking Authorization Decisions
        • 4. Testing, Monitoring, and Debugging Authorization
      • Writing Your First Policy
        • 1. Model Your Application’s Authorization
        • 2. Add Authorization data to Oso Cloud
        • 3. Perform Authorization Checks
        • 4. Monitor and Debug Your Authorization
        • Summary
      • Using Attributes to Control Permissions
        • Modeling Attribute Patterns
        • Authorization Data for Attributes: Facts or Context Facts?
        • Authorization Enforcement with Attributes as Context Facts
      • Code Examples
    • Authorization Best Practices (opens in a new tab)
    • FAQ
    • Security (opens in a new tab)
    • Oso Status (opens in a new tab)
    • Get Help (opens in a new tab)
    • Legacy Open Source Library (opens in a new tab)

How-To Guides

These guides show you how to do specific tasks with Oso Cloud. Make sure you've signed up for a free account (opens in a new tab), since you'll want to follow along.

  • Implement specific modelling patterns in Oso Cloud, e.g. RBAC and groups, with our modeling guides.
  • Add data to your Oso Cloud application with our data guides.
  • Integrate Oso with your application with our enforcement guide.
Model Role-Based Access Control (RBAC)

© 2023 Oso Security Inc.