Limitations
Cedar policies and the current Amazon Bedrock AgentCore Gateway implementation have certain limitations that affect policy authoring and functionality.
Cedar language limitations
The following limitations are inherent to the Cedar policy language:
-
No floating-point numbers - Cedar does not support float types. Use Decimal for fractional values (limited to 4 decimal places)
-
No regular expressions - Pattern matching is limited to the like operator with * wildcards
Current implementation limitations
The following limitations are specific to the current Amazon Bedrock AgentCore Gateway implementation:
-
Custom claims in NL2Cedar - to use custom claims with NL2Cedar, provide the custom claims in the prompt
-
Limited decimal precision - Decimal values are limited to 4 decimal places and a specific range
-
Cedar schema size - supported schemas size under 200 kb
-
Max Policies per Engine - 1000
-
Max Policy Engines per account - 1000
These implementation limitations may be addressed in future releases.
Fine-grained authorization on IAM principals
When using an IAM-authenticated Gateway, fine-grained authorization on IAM principals is not currently supported in Cedar policies.
For Gateways configured with IAM authentication:
-
The
principalin Cedar policies must remain unconstrained (wildcard). -
You cannot use
==,in, orisconstraints to restrict specific IAM principals within Cedar. -
Policies such as
permit(principal, action, resource);express a wildcard principal by leaving theprincipalvariable unconstrained.
To implement fine-grained authorization on the calling IAM principal, use IAM policies. IAM policies are evaluated before Cedar policies during request processing. After IAM authorization succeeds, Cedar policies can be used to enforce fine-grained constraints on actions, resources, tool inputs, and contextual attributes.