Open Policy Agent (OPA) changes this. As a Unified Access Proxy, it becomes the single checkpoint for every request—across microservices, APIs, and infrastructure. No more duplicated logic. No more mismatched rules.
OPA lets you write policies once in Rego, its declarative language. These policies are portable. They run anywhere: sidecar, daemon, or embedded library. As a Unified Access Proxy, OPA sits in the request path, evaluating permissions before actions happen. It standardizes enforcement for HTTP, gRPC, Kubernetes admission, service mesh gateways, and more.
The architecture is simple but strict. Requests hit the proxy. OPA checks context—user identity, resource, action, environment. Rego policies return allow or deny. The decision is instant and consistent. Integrations with Envoy, NGINX, or custom reverse proxies make deployment flexible. Every layer uses the same ruleset.