Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Authorizing a user depending on the action name

Tags:

I have many controllers with many actions. Each action has it's own Role ( Role name = ControllerName.actionName ).

In previous versions I could test if the current user can acces an action or not using a "generic" AuthorizeAttribute :

public override void OnAuthorization(System.Web.Http.Controllers.HttpActionContext actionContext) {     string currentAction = actionContext.ActionDescriptor.ActionName;     string currentController = actionContext.ActionDescriptor.ControllerDescriptor.ControllerName;     Roles = (currentController + "." + currentAction).ToLower();     base.OnAuthorization(actionContext); } 

With the version asp.net 5, I've found that I need to use requirements ( How do you create a custom AuthorizeAttribute in ASP.NET Core? ). The problem is that the AuthorizationContext does not give us the information about the action that the user is trying to get to.

I don't want to put an Authorize attribute on each action, is there any way to achieve my requirement with the new framework ? ( I prefer to avoid using HttpContext.Current, it doesn't fit well in a pipeline architecture )

like image 890
yeska Avatar asked Jul 28 '15 22:07

yeska


People also ask

What is policy based authorization?

Authorization Policy Even when you use claim-based or role-based authorization, you are actually using Policy-based Authorization. A Policy defines a collection of requirements, that the user must satisfy in order to access a resource. The user must satisfy all the requirements.

Which method is used to implement Authorize attribute?

In ASP.NET Web API authorization is implemented by using the Authorization filters which will be executed before the controller action method executed. Web API provides a built-in authorization filter, AuthorizeAttribute. This filter checks whether the user is authenticated.

How does the Authorize attribute work?

If a user is not authenticated, or doesn't have the required user name and role, then the Authorize attribute prevents access to the method and redirects the user to the login URL. When both Roles and Users are set, the effect is combined and only users with that name and in that role are authorized.

Which of the following is role-based authorization in asp net?

Role-based authorization checks specify which roles which the current user must be a member of to access the requested resource. The controller SalaryController is only accessible by users who are members of the HRManager role or the Finance role.


1 Answers

Here is the general process for enforcing custom authentication. Your situation may be able to solved completely in step one, since you could add a Claim for the Role that decorates your

1. authenticate by creating an identity for the user

Writing middleware and inserting it into the pipeline via IApplicationBuilder.UseMiddleware<> is how custom authentication is done. This is where we extract whatever info may be later needed for authorization, and put it into an ClaimsIdentity. We have an HttpContext here so we can grab info from the header, cookies, requested path, etc. Here is an example:

public class MyAuthHandler : AuthenticationHandler<MyAuthOptions> {    protected override Task<AuthenticationTicket> HandleAuthenticateAsync()    {       // grab stuff from the HttpContext       string authHeader = Request.Headers["Authorization"] ?? "";       string path = Request.Path.ToString() ?? "";        // make a MyAuth identity with claims specifying what we'll validate against       var identity = new ClaimsIdentity(new[] {          new Claim(ClaimTypes.Authentication, authHeader),          new Claim(ClaimTypes.Uri, path)       }, Options.AuthenticationScheme);        var ticket = new AuthenticationTicket(new ClaimsPrincipal(identity),           new AuthenticationProperties(), Options.AuthenticationScheme);       return Task.FromResult(ticket);    } }  public class MyAuthOptions : AuthenticationOptions {    public const string Scheme = "MyAuth";    public MyAuthOptions()    {       AuthenticationScheme = Scheme;       AutomaticAuthentication = true;    } }  public class MyAuthMiddleware : AuthenticationMiddleware<MyAuthOptions> {    public MyAuthMiddleware(                RequestDelegate next,                IDataProtectionProvider dataProtectionProvider,                ILoggerFactory loggerFactory,                IUrlEncoder urlEncoder,                IOptions<MyAuthOptions> options,                ConfigureOptions<MyAuthOptions> configureOptions)          : base(next, options, loggerFactory, urlEncoder, configureOptions)    {    }     protected override AuthenticationHandler<MyAuthOptions> CreateHandler()    {       return new MyAuthHandler();    } }  public static class MyAuthMiddlewareAppBuilderExtensions {    public static IApplicationBuilder UseMyAuthAuthentication(this IApplicationBuilder app, string optionsName = "")    {       return app.UseMiddleware<MyAuthMiddleware>(          new ConfigureOptions<MyAuthOptions>(o => new MyAuthOptions()) { Name = optionsName });    } } 

To use this middleware insert this in Startup.Configure prior to the routing: app.UseMyAuthAuthentication();

2. authorize by enforcing requirements on the identity

We've created an identity for the user but we still need to enforce it. To do this we need to write an AuthorizationHandler like this:

  public class MyAuthRequirement : AuthorizationHandler<MyAuthRequirement>, IAuthorizationRequirement   {      public override void Handle(AuthorizationContext context, MyAuthRequirement requirement)      {         // grab the identity for the MyAuth authentication         var myAuthIdentities = context.User.Identities            .Where(x => x.AuthenticationType == MyAuthOptions.Scheme).FirstOrDefault();         if (myAuthIdentities == null)         {            context.Fail();            return;         }          // grab the authentication header and uri types for our identity         var authHeaderClaim = myAuthIdentities.Claims.Where(x => x.Type == ClaimTypes.Authentication).FirstOrDefault();         var uriClaim = context.User.Claims.Where(x => x.Type == ClaimTypes.Uri).FirstOrDefault();         if (uriClaim == null || authHeaderClaim == null)         {            context.Fail();            return;         }          // enforce our requirement (evaluate values from the identity/claims)         if ( /* passes our enforcement test */ )         {            context.Succeed(requirement);         }         else         {            context.Fail();         }      }   } 

3. add the requirement handler as an authorization policy

Our authentication requirement still needs to be added to the Startup.ConfigureServices so that it can be used:

// add our policy to the authorization configuration services.ConfigureAuthorization(auth => {    auth.AddPolicy(MyAuthOptions.Scheme,        policy => policy.Requirements.Add(new MyAuthRequirement())); }); 

4. use the authorization policy

The final step is to enforce this requirement for specific actions by decorating our action or controller with [Authorize("MyAuth")]. If we have many controllers, each with many action which require enforcement, then we may want to make a base class and just decorate that single controller.

Your simpler situation:

Each action has it's own Role ( Role name = ControllerName.actionName> )

If you already have all your actions fine-tuned with [Authorize(Roles = "controllername.actionname")] then you probably only need part #1 above. Just add a new Claim(ClaimTypes.Role, "controllername.actionname") that is valid for the particular request.

like image 162
jltrem Avatar answered Oct 18 '22 03:10

jltrem