What is Casbin?
In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration. You can customize your own access control model by combining the available models.
Casbin is a tool in the User Management and Authentication category of a tech stack.
Casbin is an open source tool with 15.7K GitHub stars and 1.6K GitHub forks. Here’s a link to Casbin's open source repository on GitHub
Who uses Casbin?
Companies
4 companies reportedly use Casbin in their tech stacks, including Application, Paradromix, and DevOps.
Developers
11 developers on StackShare have stated that they use Casbin.
Casbin Integrations
Casbin Alternatives & Comparisons
What are some alternatives to Casbin?
Auth0
A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.
Keycloak
It is an Open Source Identity and Access Management For Modern Applications and Services. It adds authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.
Amazon Cognito
You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline.
OAuth2
It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
JSON Web Token
JSON Web Token is an open standard that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed.