Oso Cloud
  • Tutorials
    • Quickstart
    • Authorization Modeling
    • End-to-End Example
  • How-To Guides
    • Model Role-Based Access Control (RBAC)
      • Multitenant Roles
      • Resource-Specific Roles
      • Global Roles
      • Custom Roles
    • Model Relationship-Based Access Control (ReBAC)
      • User Groups
      • Files & Folders
      • User-Resource Relations
      • Impersonation
      • Organization Hierarchies
    • Model Attribute-Based Access Control (ABAC)
      • Public/Private Resources
      • Conditional Roles
      • Time-Based Checks
      • Entitlements
      • Sync and Export Data
      • Migrate Data and Policies
      • Enforce
      • Filter lists
      • Query Oso Cloud
      • Frontend (UI)
      • Authentication
      • GraphQL
      • Debug an Unexpected Result
      • Local Development
      • Local Environment
      • Policy Tests
      • CI and Testing
      • Fallback
        • Docker
      • Manage Organization Settings
      • Recovery
      • CLI
      • Node.js
      • Python
      • Go
      • Ruby
      • .NET
      • HTTP API
      • Patterns
      • Syntax
      • Resource Blocks
      • Foundations
    • Explain
    • Glossary
      • IDE Support
        • Metric Collection
      • Sandbox Limits
    • What is Oso Cloud
    • Oso Cloud Architecture
    • Modeling Building Blocks
    • Oso Cloud Data Model
      • 4 Steps to Authorization: Learning the Basics
        • 1. Application Modeling
          • Patterns in Role Based Access Control (RBAC)
          • Patterns in Relationship Based Access Control (ReBAC)
          • Patterns in Attribute Based Access Control (ABAC)
        • 2. Authorization Data
          • What are Facts?
          • Writing Facts
        • 3. Authorization Enforcement
          • Checking Authorization Decisions
        • 4. Testing, Monitoring, and Debugging Authorization
      • Writing Your First Policy
        • 1. Model Your Application’s Authorization
        • 2. Add Authorization data to Oso Cloud
        • 3. Perform Authorization Checks
        • 4. Monitor and Debug Your Authorization
        • Summary
      • Using Attributes to Control Permissions
        • Modeling Attribute Patterns
        • Authorization Data for Attributes: Facts or Context Facts?
        • Authorization Enforcement with Attributes as Context Facts
      • Code Examples
    • Authorization Best Practices (opens in a new tab)
    • FAQ
    • Security (opens in a new tab)
    • Oso Status (opens in a new tab)
    • Get Help (opens in a new tab)
    • Legacy Open Source Library (opens in a new tab)
  • Tutorials
    • Quickstart
    • Authorization Modeling
    • End-to-End Example
  • How-To Guides
    • Model Role-Based Access Control (RBAC)
      • Multitenant Roles
      • Resource-Specific Roles
      • Global Roles
      • Custom Roles
    • Model Relationship-Based Access Control (ReBAC)
      • User Groups
      • Files & Folders
      • User-Resource Relations
      • Impersonation
      • Organization Hierarchies
    • Model Attribute-Based Access Control (ABAC)
      • Public/Private Resources
      • Conditional Roles
      • Time-Based Checks
      • Entitlements
      • Sync and Export Data
      • Migrate Data and Policies
      • Enforce
      • Filter lists
      • Query Oso Cloud
      • Frontend (UI)
      • Authentication
      • GraphQL
      • Debug an Unexpected Result
      • Local Development
      • Local Environment
      • Policy Tests
      • CI and Testing
      • Fallback
        • Docker
      • Manage Organization Settings
      • Recovery
      • CLI
      • Node.js
      • Python
      • Go
      • Ruby
      • .NET
      • HTTP API
      • Patterns
      • Syntax
      • Resource Blocks
      • Foundations
    • Explain
    • Glossary
      • IDE Support
        • Metric Collection
      • Sandbox Limits
    • What is Oso Cloud
    • Oso Cloud Architecture
    • Modeling Building Blocks
    • Oso Cloud Data Model
      • 4 Steps to Authorization: Learning the Basics
        • 1. Application Modeling
          • Patterns in Role Based Access Control (RBAC)
          • Patterns in Relationship Based Access Control (ReBAC)
          • Patterns in Attribute Based Access Control (ABAC)
        • 2. Authorization Data
          • What are Facts?
          • Writing Facts
        • 3. Authorization Enforcement
          • Checking Authorization Decisions
        • 4. Testing, Monitoring, and Debugging Authorization
      • Writing Your First Policy
        • 1. Model Your Application’s Authorization
        • 2. Add Authorization data to Oso Cloud
        • 3. Perform Authorization Checks
        • 4. Monitor and Debug Your Authorization
        • Summary
      • Using Attributes to Control Permissions
        • Modeling Attribute Patterns
        • Authorization Data for Attributes: Facts or Context Facts?
        • Authorization Enforcement with Attributes as Context Facts
      • Code Examples
    • Authorization Best Practices (opens in a new tab)
    • FAQ
    • Security (opens in a new tab)
    • Oso Status (opens in a new tab)
    • Get Help (opens in a new tab)
    • Legacy Open Source Library (opens in a new tab)
Patterns

© 2023 Oso Security Inc.