OrWeis Profile Banner
Or Weis Profile
Or Weis

@OrWeis

Followers
1K
Following
2K
Media
60
Statuses
915

Unrelenting entrepreneur Founder of @permit_io, @Rookoutlabs, @Reactful Permissions for the AI Era (https://t.co/3jbOiNRcAl)

Joined September 2013
Don't wanna be here? Send us removal request.
@OrWeis
Or Weis
4 months
RT @permit_io: CLI Launch Week is Coming! 🥳 . Unveiling a feature we’ve been building for a while- the CLI:. A powe….
0
1
0
@OrWeis
Or Weis
5 months
RT @permit_io: We’re beyond grateful for the upvotes, feedback, and enthusiasm around Permit AI Access Control. 🙏 . Bringing AI into the wo….
0
1
0
@OrWeis
Or Weis
5 months
#AI holds unimaginable #promise and #risk for our future. balancing that line is good old access control. Here's How we at @permit_io are setting the stage for the better.
@permit_io
Check, the Dog
5 months
Permit AI Access Control x Product Hunt 🤖 💜 😸. Fine-Grained Permissions for AI-Powered Applications Launching on Product Hunt!. #AI Access Control brings fine-grained #authorization (#FGA) to AI workflows, ensuring AI models interact safely with
0
0
0
@OrWeis
Or Weis
5 months
RBAC is great- but only if you're doing it right!.Three key things that developers are falling for when they're doing RBAC and access control today:. 🔑 leveraging JWTs for everything.🔑 Role explosion.🔑 Coupling of policy and code. How are you handling access control?
1
1
3
@OrWeis
Or Weis
8 months
I’m now sure this problem isn’t a challenge that’s unique to us. Have you encountered anything similar? I’d love to know how you solved it and what you think of this solution.🙌.
0
0
1
@OrWeis
Or Weis
8 months
This approach allows us to offer a Monthly Active User (MAU) pricing structure at a rate significantly lower than any other authorization-as-a-service provider. You can read more about our process here: 👇
Tweet card summary image
permit.io
Permit.io’s new pricing model makes for affordable, predictable, fine-grained authorization tailored to developers and companies of all sizes.
1
0
1
@OrWeis
Or Weis
8 months
We just introduced a quota on the number of resources and rules clients can define in our system and a new startup tier. With these quotas, we can now manage our operational costs more effectively, especially when it comes to caching rules and handling the volume of API calls.😎.
1
0
2
@OrWeis
Or Weis
8 months
Some companies may have a small number of users, but those can trigger a very high volume of authorization calls, meaning significant operational costs on our end. Here’s how we addressed this unpredictability:.
1
0
1
@OrWeis
Or Weis
8 months
That’s why we initially designed our pricing model around Monthly Active Users to offer a predictable cost structure. This, however, created a problem for us as a SaaS provider, as it doesn’t account for the variability in authorization usage within different applications.
1
0
1
@OrWeis
Or Weis
8 months
The thing is, authorization calls add up quickly and unpredictably. Even a single API call from a user may require multiple authorization checks. This means potentially large, unexpected expenses for our clients.
1
0
1
@OrWeis
Or Weis
8 months
It would be easiest for us to charge clients based on the number of authorization API calls we have to process, as each call directly represents a quantifiable cost in server and infrastructure resources. That’s the way most authorization providers do it.
1
0
1
@OrWeis
Or Weis
8 months
We’ve had a lot of startups reach out to us to help them implement fine-grained authorization, and, as an authorization SaaS, this created some pricing problems for us.🤔.
1
0
1
@OrWeis
Or Weis
8 months
During my work on our pricing overhaul, I’ve encountered challenges I presumed were unique to our SaaS. The more I dove in, the more I felt balancing operational costs and providing predictable pricing is something other SaaS companies probably encounter as well. A Thread 🧵
Tweet media one
1
1
2
@OrWeis
Or Weis
9 months
Open source is a cornerstone of our civilization, but just like concrete it's time for new recipes. I'm honored to write this follow up article at the @thenewstack, check it out to learn more about the topic and OpenF an alternative to open-core.
Tweet card summary image
thenewstack.io
Open source may shift and transform, but it’s as strong as ever — and likely to remain so for generations.
2
0
2
@OrWeis
Or Weis
11 months
The way to achieve this is by syncing users on the fly - either as they get created in the IdP (e.g. via SCIM, which supports) or by allowing them to propagate to the app as JWTs, and using the Authentication callback to translate to the app / Authz layer.
Tweet card summary image
permit.io
Easily bake-in access control in minutes regardless of previous experience or expertise. Based on OPA and OPAL. Treat policy as code to make Auth-z easy.
0
0
1
@OrWeis
Or Weis
11 months
The translation each layer applies is valuable - e.g., translating an org-level role like “VP of marketing” to an applicative “Editor role with specific app-resource access”.
1
0
1
@OrWeis
Or Weis
11 months
Identity information is meant to cascade like a waterfall - IdP -> Authentication -> Authorization, becoming less organization-focused and more application-specific with each step.
1
0
1
@OrWeis
Or Weis
11 months
You probably don’t want to manage your identities in your authentication layer—that’s what identity provisioning systems are for. The authentication layer is not a register; it’s meant to verify your identities, issue tokens for them, and augment them with claims and scopes.
1
0
1
@OrWeis
Or Weis
11 months
I’m often asked, “What’s the best way to migrate identities from my authentication to my authorization?” The answer is - DON’T ❌.🧵
Tweet media one
1
0
1
@OrWeis
Or Weis
1 year
There's a new Share-if in town.
@permit_io
Check, the Dog
1 year
Say hello to Permit Share-If 🤠 .Embeddable, Pre-Built Access-Sharing Components for Your Application.Now live on @ProductHunt .
0
0
4