immutable-access-control
v0.6.0
Published
Access control for immutable modules, models and routes
Downloads
19
Readme
immutable-access-control
Immutable Access Control provides a role based permission system to control access to Immutable Core modules and methods, Immutable Core Model models and Immutable App routes.
Immutable Access Control is integrated with Immutable App Auth so immutable apps that use immutable-app-auth will have Immutable Access Control fully integrated with no additional configuration.
Account, Auth and Session
The Immutable Access Control system is designed to integrate with the other components of the Immutable App ecosystem and so it is easiest to understand how Immutable Access Control works when fully integrated with those other components.
Accounts and Sessions are fundamental to the Immutable App ecosystem.
Immutable models record the sessionId of the session that created each record by default.
Every Immutable Core Model record should have a sessionId that identifies the session that created the record.
By default Immutable models use the accountId to determine the ownership of a record.
An Immutable Core Model record with an accountId is owned by that account.
The session that creates a record may have a different accountId than the accountId that owns the record.
Having both an accountId and sessionId on a record allows for both accurate determination of ownership and accurate tracking of who created revisions.
Sessions start out anonymous. Once a users logs in the session will be associated with an accountId. A session can only be associated with one accountId. If a user logs out the session they were in is ended and a new session is created.
Account records consist only of an accountId.
In order to create an account a related Auth record must be created that specifies the auth provider and related data that allows logging into the account.
An account can have multiple auth records associated with it that allow logging in from various auth providers.
Immutable App Auth supports Google, Facebook, and local password based auth providers among others.
Roles
All access control rules are assigned to roles. Access control rules are never assigned directly to accounts.
In order to give an account permission to perform an action the access rule for that action must be assigned to a role and that role must be assigned to an account.
All, Anonymous and Authenticated Roles
Three system roles exist which apply to all sessions without being assigned to an account.
The all
role applies to all sessions. Access control rules assigned to the
all
role apply to every user.
The anonymous
role applies to all sessions that are not logged in to an
account.
The authenticated
role applies to all sessions that are logged in to an
account.
| Session State | Default Roles | |---------------|-----------------------| | Logged Out | all, anonymous | | Logged In | all, authenticated |
In addition to the default roles that exist for all sessions once a session is logged in then that session can have any number of additional custom roles assigned to it.
Permission to assign roles
Roles consist of a list of access control rules that the Role has permissions for. The permissions that can be granted are: access, assign, and revoke.
If a role has the access
permission only then accounts with that role will be
able to perform any of the actions defined in the access control rules
assigned to the role but they will not be able to assign or revoke those
permissions for any other account.
If a role has the assign
permission then an account with that role will be
able to assign that role to another account or assign individual access control
rules for that role to other role if they also have role create or role update
privileges.
If a role has the revoke
permission then an account with that role can revoke
permissions under the same conditions as they could assign them if they had
assign permissions.
Accounts can have all three role permissions (access, assign, revoke) or any subset of those permissions.
Applying access control rules
Immutable Access Control is permissive by default and follows a principle of maximum permissiveness.
Actions are allowed by default and unless a specific resources is denied by default then the roles and permissions of the accessing session will never be evaluated.
If one of the roles associated with a session grants permission for an action then permission will be granted.
Default deny rules must be specified either in code or under the all
default
role.
Deny rules specified for any role other than all
will never be evaluated and
are invalid.
Defining access control rules
Access control rules are defined as strings that identify a resource and a boolean value of '0' or '1' that specifies whether access is allowed or denied.
When using Immutable App Auth access control rules should be administered through the Immutable App Auth admin tools.
Access control rules are case sensitive
The case on module names and methods, model names, actions, and states, and route paths must match the resources.
Rules are stored and accessed via objects (hash tables) so exact matching on case is required.
Access control rules for Immutable Core Models
| Rule | Description | |-------------------------------|----------------------------------------------| | model:0 | deny access to all models and actions | | model:bar:1 | allow access to all bar actions | | model:bar:chown:own:1 | allow changing ownership of own bar records | | model:bar:chown:any:1 | allow changing ownership of any bar records | | model:bar:create:1 | allow creating new bar records | | model:bar:delete:own:1 | allow deleting own bar records | | model:bar:delete:any:1 | allow deleting any bar records | | model:bar:list:own:1 | allow listing own bar records | | model:bar:list:any:1 | allow listing any bar records | | model:bar:list:deleted:own:1 | allow listing own deleted bar records | | model:bar:list:deleted:any:1 | allow listing any deleted bar records | | model:bar:read:own:1 | allow viewing own bar records | | model:bar:read:any:1 | allow viewing any bar records | | model:bar:read:deleted:own:1 | allow viewing own deleted bar records | | model:bar:read:deleted:any:1 | allow viewing any deleted bar records | | model:bar:undelete:own:1 | allow undeleting own bar records | | model:bar:undelete:any:1 | allow undeleting any bar records | | model:bar:update:own:1 | allow updating own bar records | | model:bar:update:any:1 | allow updating any bar records |
Immutable Core Models use Immutable Core modules to perform their low level functions so Immutable Core module rules can apply to Immutable Core Models as well.
Because Immutable Core Model access control rules are much more fine grained it is usually best to define all access control rules at the model level instead of at the module level.
Access control rules for models can be specified by model, action, state, and scope.
Actions include create, delete, list, read, update, chown (change ownership).
Access to deleted records is denied by default and must be specifically allowed.
The scope of a rule can be own
or any
. own
rules apply only to records
owned by the session. any
rules apply to all records no matter who owns them.
Strict access control for models
accessControl.setRule(['all', 'model:0'])
Immutable Access Control is permissive by default so access to all models must be denied for all roles in order to create a system where access is strictly controlled.
Access control for deleted records
accessControl.setRule(['foo', 'model:foo:read:deleted:own:1'])
Access to deleted records is denied by default. This is the only exception to the general rule of allowing access to resources by default.
In order to allow access to deleted records specific rules must be set that allow access.
Access control for scopes
accessControl.setRule(['all', 'model:foo:list:any:1'])
accessControl.setRule(['all', 'model:foo:read:any:1'])
In this example access to read
and list
any
record for model foo
is
granted for all
roles.
When access is granted for any
record it is also implicitly granted for own
records that belong to the session owner.
accessControl.setRule(['all', 'model:foo:create:1'])
accessControl.setRule(['all', 'model:foo:list:any:1'])
accessControl.setRule(['all', 'model:foo:read:any:1'])
accessControl.setRule(['all', 'model:foo:update:own:1'])
accessControl.setRule(['all', 'model:foo:delete:own:1'])
accessControl.setRule(['all', 'model:foo:list:deleted:own:1'])
accessControl.setRule(['all', 'model:foo:read:deleted:own:1'])
accessControl.setRule(['all', 'model:foo:unDelete:deleted:own:1'])
In this example create
permission is granted for all
roles on model foo
.
create
access does not have a scope because scopes only apply to existing
records.
all
roles also have list
and read
access for any
record.
Additionally all
roles can update
and delete
and unDelete
their own
records as well as list
and read
their own
deleted
records.
This is a somewhat typical set of access control rules for a model where users create and manage content that is shared with others.
accessControl.setRule(['all', 'model:foo:1'])
accessControl.setRule(['all', 'model:foo:update:own:0'])
accessControl.setRule(['all', 'model:foo:delete:own:0'])
In this example access is granted for all actions on foo
to all
roles but
is denied for update
and delete
on own
records.
When access is denied on own
records it is still allowed on records owned by
other users. There are rare cases where this may be desired but in most cases
when access is denied it should be denied for any
role.
accessControl.setRule(['all', 'model:foo:1'])
accessControl.setRule(['all', 'model:foo:update:any:0'])
accessControl.setRule(['all', 'model:foo:delete:any:0'])
This example is like the previous except that update
and delete
is denied
for any
record.
When access is denied for any
record this includes own
records so in this
case no session would be allowed to update or delete any records.
Determining ownership with a custom access id property
accessControl.setAccessIdName('foo', 'fooId')
To specify a column/property name other than accountId to use for determining
ownership of a record call setAccessIdName
with the model name and access id
column/property name as arguments.
Typically the accessIdName
property should be set on the Immutable Model which
will then call setAccessIdName
for Immutable Access Control when it is
initialized.
When a custom accessIdName is used that property must be made available on the session.
Immutable App Auth will automatically load any custom accessIdName properties specified on models used by Immutable App if they are specified on the model.
Access control rules for Immutable Core modules
| Rule | Description | |-------------------|-------------------------------------------| | module:0 | deny access to all modules and methods | | module:foo:1 | allow access to all methods for foo | | module:bar:bam:1 | allow access to bam method for bar |
Access control rules for Immutable App routes
| Rule | Description | |---------------------------|--------------------------------------------------| | route:0 | deny access to all routes | | route:/admin:0 | deny access to all routes under /admin | | route:/admin/auth:1 | allow access to all methods under /admin/auth | | route:/admin/role:get:1 | allow access to get all under /admin/role | | route:/admin/role:post:1 | allow access to post all under /admin/role | | route:/admin/role:put:1 | allow access to put all under /admin/role | | route:/admin/role:delete:1| allow access to delete all under /admin/role |
Access control rules for routes can be duplicative of access control rules for models since many routes will map directly to model actions that can have their own access control rules defined at the model level.
It is usually best to define access control rules at the model level but defining coarse access control rules at the route level provides an additional safeguard against misconfigured model access control rules.
Route access control rules are evaluated earlier in the request cycle than model access control rules so using route rules is more efficient and will limit the amount of system resources that can be consumed by unauthorized users.
Access control for index pages
route:/index:1
In Immutable Access Control all routes must have a named path segment.
In Immutable Apps the /
page is called index
so /index
is used to set an
access control rule for the index page or /foo/bar/index
for an index page at
a deeper level.
This creates the possibility for conflicts with any directories named index
so if route based access control on a directory named index is required extra
care must be taken to evaluate and avoid potential conflicts with index pages.
route:/:1
If a rule is set with only a slash or a trailing slash this will be converted to /index.
Access control for child directories
route:/foo:1
This rule allows access to /foo
and all child directories of foo
.
All route access control rules apply to all the child paths of the given path.
Limiting access to child directories
route:/foo:1
route:/foo/bar:0
The first /foo
rule gives access to everything under /foo
while the second
rule denies access to /foo/bar
and everything under it.
More specific rules override less specific rules.
Case sesitivity for routes
route:/foo:get:1
route:/Foo/GET:1
Rules are case sensitive and these two rules will be evaluated differently.
It is recommended to always use lower case for both routes and methods.
Normalizing requests to lower case - ideally by redirecting upper-case requests to lower-case versions - should be done before applying access control rules.
Immutable App normalizes requests to lower case by default.
Creating a new Immutable Access Control instance
var accessControl = new ImmutableAccessControl()
Immutable Access Control has a single globalton instance that will be returned
whenever new
is called.
Setting rules
var accessControl = new ImmutableAccessControl()
accessControl.setRules([
['all', 'model:0'],
['admin', 'model:1']
])
Rules must be passed as an array of rules. Each rule must be an array of one or more role names followed by a single access control rule.
Multiple identical access control rules can be set for different roles.
An error will be thrown on any invalid rules.
Setting a single rule
accessControl.setRule(['all', 'model:0'])
The setRule
method is used by set rules and it accepts a single rule specified
as an array.
Setting a single default rule
accessControl.setRule(['all', 'model:0'], true)
By setting the default
argument to true the rule being set will be added to
the list of defaultRules
.
When replaceRules
is called default rules will be kept while all other rules
will be replaced.
This functionality supports a use case where some rules are defined in code and are loaded at compile time while other rules are dynamically load from a database and may change during the life cycle of the application.
Replacing rules
accessControl.replaceRules([
['all', 'model:0'],
['admin', 'model:1'],
['foo', 'bar:1'],
])
The replaceRules
method replaces all rules except default rules.
Rule replacement is an atomic operation and will only succeed if all rules are loaded without any errors.
Checking access to models
var accessControl = new ImmutableAccessControl()
accessControl.allowModel({
action: 'create',
model: 'foo',
session: {
roles: ['all', 'anonymous', ...],
sessionId: '...',
}
})
In this example access to the create
action on the foo
model is requested
for the session
that is passed in.
Immutable Access Control operates in strict mode by default which requires that a session with a sessionId and an array of roles be passed to each allow request.
Check access to a model with a scope
accessControl.allowModel({
action: 'list',
model: 'foo',
scope: 'any',
session: { ... }
})
In strict mode a scope is required for all actions other than create. The two
valid arguments for scope are any
and own
.
Check access to a model with states
accessControl.allowModel({
action: 'list',
model: 'foo',
scope: 'any',
session: { ... },
states: ['deleted']
})
To check access based on state the list of states that the model is in must be specified as an array. Zero or more states can be provided.
Checking access to models with strict mode disabled
var accessControl = new ImmutableAccessControl({strict: false})
accessControl.allowModel({
action: 'create',
model: 'foo',
})
With strict mode disabled a session is not required. If the session is missing or does not have roles set then default roles will be provided.
The default roles are all
and either anonymous
or authenticated
depending
on whether or not there is a session with an accountId passed.
In most cases strict mode should be enabled.
var accessControl = new ImmutableAccessControl({strict: false})
accessControl.allowModel({
action: 'delete',
model: 'foo',
})
With strict mode disabled a scope is not required and if it is missing the scope
will default to any
.
Checking what scope is available for model action
accessControl.allowModelScope({
action: 'list',
model: 'foo',
session: { ... },
})
The allowModelScope
method returns the most permissive scope allowed for an
action. The return value will be either any
, own
or undefined if no access
is allowed.
allowModelScope
accepts all the same arguments as allowModel
except scope
.
Checking access to modules
var accessControl = new ImmutableAccessControl()
accessControl.allowModule({
method: 'bar',
module: 'foo',
session: {
roles: ['all', 'anonymous', ...],
sessionId: '...',
}
})
Access for modules must be checked with a module
and method
name.
In strict mode a session with a sessionId and roles array is required.
Checking access to routes
var accessControl = new ImmutableAccessControl()
accessControl.allowRoute({
method: 'get',
path: '/',
session: {
roles: ['all', 'anonymous', ...],
sessionId: '...',
}
})
Access for routes must be checked with a path
and method
. The method
name is case sensitive and lower case should be used at all times.
It the path is a slash or has a trailing slash this will be converted to /index.
Auditing access control requests
By default Immutable Access Control audits all requests to allowModel
,
allowModelScope
, allowModule
and allowRoute
.
A new audit record is created for each allow request and replaces the previous record.
Disabling audits globally
var accessControl = new ImmutableAccessControl({audit: false})
Disabling audits for individual allow requests
var allow = accessControl.allowModule({
audit: false,
method: 'bar',
module: 'foo',
})