Skip to content
PDP

OpenID AuthZEN–compliant PDP

Interoperable JSON decisions for gateways and services. EmpowerNow extensions add constraints, obligations, and TTL.

Platform TeamsSecurity Architects +1 more
Visual representation of policy decision architecture with structured governance layers

Why it wins

AuthZEN interop: one decision contract across apps/PEPs

AI Agent guardrails: Budget 402, streaming caps, egress/model allow‑lists

Hybrid ReBAC + ABAC via Membership Service PIP

Explainable decisions + signed receipts

How it works

Subject/Resource/Action/Context → PDP → Decision. PEPs enforce constraints (sync) and obligations (async). Batch multiple checks in one call for faster pages and smoother agent runs. Deploy once to gateways/services; adopt incrementally via a PDP facade and PEP middleware.

What it is

A standards‑credible authorization brain that evaluates ABAC + relationships and returns AuthZEN‑style decisions. EmpowerNow decision extensions add constraints (sync guardrails) and obligations (async actions) so gateways and services can enforce consistently.

What you get

  • Cost control for AI agents: stop runaway spend (HTTP 402), cap tokens, restrict models/egress
  • Fewer bespoke integrations: one JSON decision contract across PEPs and vendors
  • Faster delegated flows: model human↔human and human↔agent delegations once; reuse everywhere
  • Audit confidence: signed, hash‑chained receipts and human‑readable reasons

Why it's unique

  • Graph‑anchored ABAC: policy logic in YAML via Policy nodes; fast‑moving edge constraints (budget, trust, expiry) live in graph
  • Hybrid ReBAC + ABAC: delegations, teams, ownership from the Membership Service (Neo4j) without role explosion
  • Delegation kits: human↔human and human↔agent OBO with spend caps, trust levels, expiry, consent
  • AuthZEN interop: decision exchange aligned to the OpenID WG; extensions (constraints/obligations/TTL) are product‑level
  • Plan/schema pinning: deny off‑plan tool calls and catch schema drift pre‑exec (MCP Gateway)
  • Proof by receipts: signed, hash‑chained receipts for audit and chargeback

See it

Batch decisions = fewer round‑trips, lower latency.

Send multiple checks in one call for faster pages and smoother agent runs.

Graph-Anchored ABAC Graph-Anchored ABAC Patent-Pending Hybrid: ReBAC Speed + ABAC Expressiveness 🚀 THE INNOVATION Policies ARE graph nodes WITH pointers to ABAC ❌ TRADITIONAL ABAC • Flat policy lookup No relationships = no context • External policy store only Separate DB query per decision • Limited expressiveness Can't leverage graph topology VS ✅ GRAPH-ANCHORED ABAC • Graph traversal first Relationships provide context • Policies IN graph + pointers Single query, rich rules • Best of both worlds Speed + Expressiveness 🚀 STEP 1: GRAPH LAYER (ReBAC) Fast relationship traversal • Identity topology • Neo4j Patrick AITravel Flight DELEGATES_TO HAS_CAPABILITY STEP 2: POLICY ANCHOR LAYER ⚓ THE INNOVATION: Policy nodes embedded IN the graph Each node points to external ABAC documents • Enables conflict resolution Policy Node Policy Node Policy Node STEP 3: ATTRIBUTE LAYER (ABAC) External policy documents • Rich rules • Version controlled budget.yaml spend_cap: $3000 remaining: $2280 service.yaml airlines: [AA,UA] class: economy audit.yaml obligations: - log_access POINTER POINTER POINTER STEP 4: MERGE POLICIES → CONFLICT RESOLUTION → DECISION ⚖️ Hierarchical policy merge with precedence rules • Final authorization decision Patent Claim: Policies embedded AS first-class graph nodes + pointers to external ABAC = Best of both worlds: Graph traversal speed + Policy expressiveness

AuthZEN compliance

Compatible with AuthZEN decision exchange across PDP/PEP/PIP/PAP. We keep ABAC; you adopt interoperable JSON. EmpowerNow adds decision extensions (constraints, obligations, TTL) for practical enforcement.

Note: Extensions are product‑level and not part of the current AuthZEN spec.

AI Agent governance

  • Budget holds and settle; HTTP 402 upgrade CTA
  • Model routing to mini; streaming token caps
  • Egress/model allow‑lists; consent obligations at issuance

Decision example (EmpowerNow extensions)


{
  "decision": "Permit",
  "ttl": 3000,
  "constraints": {
    "models_allow": ["gpt-4o-mini"],
    "egress_allow": ["*.example.com"],
    "stream_tokens_max": 2048
  },
  "obligations": [
    { "type": "budget_hold", "limit_usd": 2.00, "call_id": "abc-123" }
  ],
  "reasons": ["policy:agent.tools.invoke"]
}

Hybrid ReBAC with Membership Service

Combine ABAC attributes with relationship edges (delegations, teams, ownership) from the Neo4j‑backed Membership Service PIP for dynamic, auditable access.

Relationship data shape


{
  "relationships": [
    { "type": "member_of_team", "subject": "user_123", "object": "team_finance" },
    { "type": "delegates_to", "subject": "manager_9", "object": "user_123", "capabilities": ["approve"], "status": "active" }
  ]
}

Proof

  • Explainable decisions with reasons; every action emits a signed receipt
  • Budget/content/params enforced via constraints and obligations
  • Integrates with Membership Service (ReBAC) and Inventory/Search as PIPs

Integrations

Works with your gateways, LLM providers, and data plane.

Envoy / Istio ext_authz NGINX / Traefik OpenAI / Azure OpenAI / Anthropic / Vertex AI Redis / Kafka / ClickHouse Neo4j Membership Service

Is this for me?

  • Platform teams: standardize decisions across gateways and services
  • Security architects: budgets/egress/models; explainability + receipts
  • App teams: one middleware; fewer roles via delegations and ownership

Compatible with AuthZEN decision exchange; EmpowerNow decision extensions (constraints, obligations, TTL) enable practical enforcement.

AI chat budget 402

Safe stop + upgrade CTA.

Off‑plan tool deny

Plan step mismatch.

See it live Read docs

Plans

Book demo See pricing Talk to us

Read more

What is AuthZEN?

Understand decisions, constraints and obligations.

Read →

Constraints & Obligations

How PDP returns enforceable constraints with decisions.

Read →

Explainability

Expose why a decision happened for audits and UX.

Read →

Delegated Authorization

Model relationships and delegations for business context.

Explore →

What's next?

Book a demo

See decisions and constraints live.

Book demo

Talk to a specialist

Map decisions to your domain model.

Contact

Read the docs

Dive into PDP API and examples.

Docs ↗

Explore standards

AuthZEN, OAuth, DPoP and more.

Standards →

Learn more

Related reading

PDP Reference

Compare

  • OPA/Cerbos: no standard AuthZEN envelope (constraints/obligations/TTL) or conservative merge → evidence
  • AWS AVP: managed PDP; Cedar allow/forbid model without AuthZEN response semantics → evidence
  • Envoy/Istio: excellent PEPs; decision contract depends on the PDP; AuthZEN provides explainability + obligations → evidence