faramesh.devBETA
docsgithubcommunityget started →

docs

Getting Started

Core

FPL

Governance

Operations

Reference

github ↗slack ↗community ↗

15 , cloud and hub

Horizon Auth and Policy Hub

Cloud and Hub workflows connect local enforcement to shared governance operations. Horizon handles authenticated cloud sync for runtime evidence, while Hub provides policy-pack distribution with versioning and signature checks. Together they let teams move from one-off local policy files to controlled policy supply chains.

The key principle is separation of concerns: local daemons still enforce decisions, but policy collaboration, distribution, and evidence visibility can happen centrally. This allows platform teams to publish reviewed packs while product teams adopt them with explicit version and signature controls.

Recommended lifecycle

Use a repeatable flow from authoring to rollout instead of ad-hoc policy copies between teams.

01Authenticate once against Horizon and verify status in automation.
02Search and pin policy packs by explicit version.
03Require signatures in CI and production installs.
04Publish new versions only after review and staged validation.

Authenticate with Horizon

Login once, then verify status before enabling sync.

bash
faramesh auth login
faramesh auth status

For self-hosted Horizon deployments, set an explicit URL:

bash
faramesh auth login --horizon-url https://horizon.example.com

Run with cloud sync

After login, enable DPR streaming to Horizon from the daemon.

bash
faramesh serve \
  --policy /etc/faramesh/policy.yaml \
  --sync-horizon

Search and install policy packs

Hub supports versioned packs and optional signature enforcement.

bash
faramesh hub search "refund"

faramesh hub install org/payment-guard@1.2.0 --require-signature

Verify and publish packs

Verify integrity before install and publish from a local file or directory.

bash
faramesh hub verify org/payment-guard@1.2.0 --require-signature

faramesh hub publish ./policy.yaml --name org/payment-guard --version 1.3.0

Operational guardrails

Prevent policy-supply incidents by enforcing these baseline controls:

!Never install unpinned pack versions in production.
!Require signature verification on all production policy pulls.
!Keep Hub publish rights limited to reviewed operator identities.
!Record policy pack source, version, and rollout scope in change logs.

Hub publish requires an auth token: pass --hub-token or set FARAMESH_HUB_TOKEN.

Need help? Use any of these support options.

open an issuejoin slackcommunity/forum
MIT License
docsgithubcommunityget started →