Dispatch

MCP Needs Authorization

MCP connects AI agents to tools and data sources but has no built-in authorization. Every tool call is a trust boundary crossing without access control.

The State of Authorization in 2026: An Industry Analysis

Analysis of authorization practices across 500+ organizations. Most still use home-grown RBAC. AI agents are exposing the gaps. Broken access control remains the #1 application security risk for the fourth consecutive year.

The CISO's Guide to Fine-Grained Authorization

Broken access control is the #1 API security risk — and most organizations still treat authorization as application logic, not infrastructure. A practical guide for security leaders evaluating fine-grained authorization.

Migrating from Home-Grown RBAC to InferaDB

You started with a user_roles table. Now you have a maze of role matrices, permission overrides, and sharing logic nobody can reason about. Here's the concrete migration path from home-grown RBAC to InferaDB — step by step, with a rollback plan.

Google Zanzibar: The Authorization Model Behind Every Google Product

Google's Zanzibar handles 10 million permission checks per second across every Google product. Every open-source implementation since has hit the same ceiling: general-purpose databases. Here's how Zanzibar works and why InferaDB removes that ceiling.

How AI Agents Are Breaking Traditional Authorization

Traditional authorization handles 1-2 checks per request. AI agent workflows need dozens — and at 5-50ms each, that's seconds of latency before any work happens. The agent era needs authorization infrastructure built for machine-speed decisions.

How InferaDB Achieves 1,000x Faster Permission Checks

Authorization checks through general-purpose databases take 5-50ms. InferaDB's purpose-built storage engine delivers 2.8 microsecond p99 reads. Here's the architecture that makes it possible.

WebAssembly Policy Modules: Custom Authorization Logic in Any Language

Not everything fits into declarative rules. IP geofencing, subscription tier checks, time-window restrictions — these need real code. InferaDB lets you write that logic in any language, compile to WebAssembly, and run it inside the authorization engine with full sandboxing.

The Infera Policy Language: One Schema for Every Authorization Model

Most teams stitch together RBAC, ReBAC, and ABAC with application code. IPL unifies all three in a single declarative language — statically analyzed at deploy time, evaluated in parallel at query time. One schema, one evaluation, one audit trail.

Authorization Market: $3.32B and No Dominant Player

The fine-grained authorization market is $3.32B and growing at 19.3% CAGR — significantly outpacing the broader IAM market. Yet total VC investment is modest, there's no dominant player, and the category leader position is wide open.

Why We Chose Rust for InferaDB

An authorization service has a brutal performance contract: sub-microsecond reads, zero latency spikes, memory safety without compromise. We evaluated Go, Java, and C# seriously. Here's why Rust was the only language that met all three requirements.

Securing RAG Pipelines: Per-User Document Authorization for AI

Your RAG pipeline has a security hole. When an LLM retrieves documents to answer a question, it pulls everything the vector search returns — including documents the requesting user shouldn't see. InferaDB enforces per-user authorization before retrieval, not after.