The authorization layer for modern infrastructure.
One policy engine for every access decision — your users, your services, your AI agents. Ultra-low latency at the edge, deployable in five minutes.
Standards-conformant. Drop-in compatible with the stack you already use.
Built for the agent era
AI agents now make more decisions than your users do.
AuthzX governs every decision your software makes — your users, your services, the AI agents acting on their behalf. One engine, one audit log, one place to debug when something gets denied at 2am.
User & workspace authz
RBAC, ABAC, multi-tenancy, fine-grained permissions. Stop scattering if (user.role === "admin") across every controller.
Service-to-service authz
Replace token-passing chaos with policy-driven service identity. Every internal API call gated by the same engine.
Agent tool gating
Every MCP tool call checked against policy before execution. Task-scoped permissions with TTL. Agents can only do what you authorized. For as long as you authorized it.
How it works
From policy to production in minutes.
Write a policy, deploy the agent, and see decisions flow through the console.
Write a policy
Define who can do what in Terraform or the dashboard. RBAC, ABAC, direct grants. Combine them in one policy.
resource "authzx_policy" "document_editor" {
application_id = authzx_application.docs.id
name = "document_editor"
effect = "ALLOW"
priority = 50
resources = [{
resource_id = authzx_resource.q4_report.id
actions = ["read", "write"]
}]
}Deploy the agent
Run the AuthzX Agent next to your app. It syncs policies from the cloud and evaluates locally in under 2ms.
# docker-compose.yml
services:
authzx-agent:
image: authzx/agent:latest
environment:
AUTHZX_API_KEY: ${AUTHZX_API_KEY}
ports:
- "8181:8181"Authorize every call
One API call from your app. Every decision logged with full context — subject, resource, action, matched policy.
POST http://localhost:8181/v1/authorize
{
"subject": { "id": "user_42" },
"resource": { "type": "document", "name": "q4_report" },
"action": "read"
}The platform
What authorization actually takes to get right.
Four pillars covering the full lifecycle: policy authoring, runtime decisions, observability, and developer experience.
Architecture
RuntimeCloud-hosted policies, local agent for under 2ms decisions. Graceful degradation when the cloud is unreachable.
Policy authoring
AuthoringMix RBAC, ABAC, and direct grants in one policy. Author in Terraform or in the dashboard. AuthZEN-conformant out of the box.
Observability
AuditEvery decision logged with subject, resource, action, matched policy, and full context. Searchable in the dashboard, available during audits.
Developer experience
DXInstall the agent, grab a key, authorize your first call. Terraform-first, SDK-native, no framework to learn.
The non-negotiables
Authz your security team can defend.
SOC 2 Type II in progress. Every decision logged with full context for audit response.
Under 2ms p95 at the local agent. No network hop for the hot path.
Our admin dashboard runs on AuthzX. Every privileged action gated by the same engine you use. If it breaks for you, it breaks for us first.
AuthZEN 1.0 conformant. Terraform provider included. No vendor lock-in.