Skip to main content
Reva AI-Powered Policy Governance and Authorization Platform simplifies access control for cloud applications. It helps both developers and business stakeholders manage who can access what, with precision and confidence. In today’s security-first world, Reva makes fine-grained authorization accessible without complexity. We streamline the entire policy lifecycle from design to enforcement.

Core Authorization Components

Reva integrates all essential policy management points:
ComponentRoleFunction
PAP (Policy Administration Point)Policy DesignerCreate, manage, and govern access policies
PIP (Policy Information Point)Data HubIntegrate user/resource data for decision-making
PDP (Policy Decision Point)Decision EngineEvaluate access requests using Cedar policies
PEP (Policy Enforcement Point)Enforcement LayerApply decisions within your applications

What is Reva?

Reva is an AI-powered platform that combines three essential authorization components:
  1. Policy Designer (PAP)
    Create, manage, and govern access policies
  2. Data Hub (PIP)
    Integrate user/resource data for authorization decisions
  3. Decision Engine (PDP)
    Evaluate access requests using Cedar policy language
Reva works seamlessly with Amazon Verified Permissions (AVP) and includes its own Cedar-based decision engine.

AI Use Cases

Reva integrates AI to enhance policy governance and authorization:
  • AI-Driven Policy Creation: Automatically generate policies from plain English descriptions, improving the efficiency of policy creation.
  • AI-Based Schema Generation: Leverage AI to generate and manage schemas based on the application’s data model, streamlining schema setup and maintenance.
  • Access Search: Use AI to search and analyze access data across multiple systems, helping identify potential risks and unauthorized access patterns.

Built for Everyone

Whether you’re a developer, security architect, or business user, Reva helps you:
  1. Design policies with no-code tools or AI-assisted editor.
  2. Model RBAC, ABAC, and ReBAC access controls.
  3. Generate policies from plain English descriptions.
  4. Test authorization scenarios before deployment.
  5. Visualize access rules with our Access Graph.

How Reva Enhances Your Ecosystem

Reva supercharges your application authorization by providing:
  1. Central policy management (PAP)
    Manage policies in one place for easier governance and consistency.
  2. Simplified data integration (PIP)
    Integrate data from multiple sources to make real-time authorization decisions.
  3. Local decision capability (PDP)
    Evaluate access requests locally, ensuring quick and accurate decisions.
  4. Access Graph visualization showing why access decisions happen
    Visualize access rules, making it easier to understand who has access to what and why.
  5. AI-Driven Policy Creation
    Automatically generate policies from plain English descriptions, improving policy creation efficiency.
  6. AI-Based Schema Generation
    Leverage AI to generate and manage schemas based on the application’s data model, streamlining schema setup and maintenance.
  7. AI-Enhanced Access Search
    Use AI to analyze access data, helping identify unauthorized access patterns or risks across your ecosystem.
  8. Library
    The Reva Library is a centralized repository for reusable policies, schemas, and entity definitions, enabling teams to share, search, and quickly use pre-built components to accelerate policy creation.
  9. Guardrail
    Guardrail is a policy governance enforcement framework that helps standardize policies and detect violations for better governance across systems.

What You’ll Learn

By the end of this guide, you will:
  1. Understand Reva’s Core Architecture: Gain a clear picture of how Reva’s components—like Policy Designer (PAP), Data Hub (PIP), and Decision Engine (PDP)—work together to enforce access control in your applications.
  2. Explore Key Concepts: Learn foundational ideas such as Policy Stores, Environments, Schemas, and Guardrails that power Reva’s governance framework.
  3. Onboard Applications and Data: Discover how to connect your applications and data sources to Reva and set up authorization-ready environments.
  4. Design and Manage Authorization Policies: Get hands-on with Reva’s intuitive interface to define, test, and activate fine-grained access policies using Cedar.
  5. Leverage Policy Governance Workflows: Learn how Reva supports policy reviews, approvals, version tracking, and violation detection to ensure enterprise-grade compliance.
  6. Enable Integrations for Continuous Access Management: Understand how to integrate Reva with platforms like Amazon Verified Permissions, GitHub, and GitLab for policy lifecycle automation.
  7. Use AI to Accelerate Access Control: See how Reva’s AI features assist in policy generation, schema building, and access analysis.
I