Basics
Tutorials
Casbin Tutorials
Note that certain tutorials address Casbin's model architecture and apply universally across all language implementations, while others target specific programming languages.
Our Papers
This paper provides an in-depth exploration of Casbin's design. If you reference Casbin in academic work, please cite using the following BibTex:
@article{luo2025perm,
title={PERM: Streamlining Cloud Authorization With Flexible and Scalable Policy Enforcement},
author={Luo, Yang and Shen, Qingni and Wu, Zhonghai},
journal={IEEE Transactions on Information Forensics and Security},
year={2025},
volume={20},
number={7},
pages={8481-8496},
publisher={IEEE}
}Videos
PERM Meta-Model (Policy, Effect, Request, Matchers)
- Understanding Casbin with different Access Control Model Configurations
- Modeling Authorization with PERM in Casbin
- Designing a Flexible Permissions System with Casbin
- Authorize with Access Control Lists
- The Power of Casbin’s PERM Model – Medium by Casbin Team
- [Building Dynamic Authorization Systems with Casbin and the PERM Model – LogRocket Blog]
API Gateway and Ecosystem
Comparison and Analysis
- Casbin authorization: definition, pros and cons, and alternatives
- The 10 best RBAC open-source solutions in 2024
- 7 Best Role-Based Access Control (RBAC) Tools of 2025
- Top 7 Axiomatics Alternatives for 2025
- Top 6 Open Source Authorization Libraries
- Casbin vs ORY Hydra | What are the differences?
- What are some alternatives to Casbin?
- OPA vs Casbin
- Policy Engines: Open Policy Agent vs AWS Cedar vs Google Zanzibar
How is this guide?
