Add Oso to Your Go App
In this guide, we’ll cover how to add Oso to your Go application. Start here to understand how to use Oso. Then, jump into our more detailed how to section on topics that are important to you.
To use Oso, you’ll:
- Model your authorization logic by writing a policy with resources. Resources allow you to declaratively specify the permissions and roles you want your users to have.
- Enforce authorization throughout your app. Call Oso in your request handlers to reject or accept requests based on your authorization policy.
Once you’ve added policies and enforcement, you’ll have Oso setup and enforcing authorization in your application. To go further with Oso:
- Write Polar rules to extend your authorization model with custom logic. A Polar rule specifies when a user is allowed to perform a specific action on a resource. For example, you may deny access from banned users or allow any user to access a public resource.
- Filter collections of data: by applying enforcement at the data access layer. Many applications perform authorization over large collections of data that cannot be loaded into memory. Often index pages showing users a number of resources, like the repositories they can access, will need to use data filtering. The data filtering API provides support for these use cases.