ODataAuthorization 1.2.1

dotnet add package ODataAuthorization --version 1.2.1                
NuGet\Install-Package ODataAuthorization -Version 1.2.1                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="ODataAuthorization" Version="1.2.1" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add ODataAuthorization --version 1.2.1                
#r "nuget: ODataAuthorization, 1.2.1"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install ODataAuthorization as a Cake Addin
#addin nuget:?package=ODataAuthorization&version=1.2.1

// Install ODataAuthorization as a Cake Tool
#tool nuget:?package=ODataAuthorization&version=1.2.1                

OData WebApi Authorization extensions

This library is a fork of the Microsoft.AspNetCore.OData.Authorization library, which is available at:

This fork adds support for .NET 6 and ASP.NET Core OData 8. It uses the permissions defined in the capability annotations of the OData model to apply authorization policies to an OData service based on Microsoft.AspNetCore.OData.

It has been renamed to ODataAuthorization to avoid being mistaken as an official Microsoft package.

Usage

In your Startup.cs file:

using Microsoft.AspNetCore.OData.Authorization

public void ConfigureServices(IServiceCollection services)
{
    // odata authorization services
    services.AddOData()
        .AddODataAuthorization(options => {
            // you need to register an authentication scheme/handler
            // This works similar to services.AddAuthentication
            options.ConfigureAuthentication("DefaultAuthScheme").AddScheme(/* ... */)
        });

    service.AddRouting();
}

Sample applications

  • ODataAuthorizationSample: Simple API with permission restrictions and OData authorization middleware set up with a custom authentication handler
  • CookieAuthenticationSample: Basic API with permissions restrictions and a cookie-based authentication handler

How to specify permission scopes?

By default, the library will try extract permissions from the authenticated user's claims. Specifically, it will look for claims with the key Scope. If your app is storing user scopes differently (e.g. using a different key), you can provider a scope finder delegate that returns a list of scopes from the current user:

services.AddODataAuthorization(options => {
    options.ScopeFinder = (context) => {
        var scopesClaim = context.User?.FindFirst("Permissions");
        return Task.FromResult(scopes.Value.Split(" ").AsEnumerable());
    };

    options.ConfigureAuthentication().AddJWTAuthenticationScheme();
})

For a complete working example, check the sample application.

How permissions are applied

On each request, the library extracts from the model the permissions restrictions that should apply to the route being accessed and creates an authorization policy based on those permissions. Deeper down the request pipeline, the AspNetCore filter-based authorization system will call the OData authorization handler to verify whether the current user's permissions match the ones required by the policy.

Note: If there are not permission restrictions defined for an some target (entity set/singleton/operation) in the model, then endpoints to that target will be authorized by default regardless of the user's permissions.

Example permission scopes

For the following examples, let's assume that we are working with an OData model that has the following scopes defined:

Permission scope name Where it's defined
Customers.Read ReadRestrictions of Customers entity set
Customers.ReadByKey ReadByKeyRestrictions of Customers
Customers.Insert InsertRestrictions of Customers
Customers.Delete DeleteRestrictions of Customers
Customers.Update UpdateRestrictions of Customers
CustomerOrders.Read ReadRestrictions of NavigationRestrictions of Customers on Orders property
CustomerOrders.ReadByKey ReadByKeyRestriction of NavigationRestrictions of Customers on Orders property
CustomerOrders.Insert InsertRestrictions of NavigationRestrictions of Customers on Orders property
CustomerOrders.Update UpdateRestrictions of NavigatonRestrictions of Customers on Orders property
CustomerOrders.Delete UpdateRestrictions of NavigationRestrictions of Customers on Orders property
Orders.Read ReadRestrictions of Orders entity set
Orders.ReadByKey ReadByKeyRestrictions of Orders
Orders.Update UpdateRestrictions of Orders
Orders.Delete DeleteRestrictions of Orders
Orders.Insert InsertRestrictions of Orders
Order.CalculateTax OperationRestrictions of CalculateTax bound function
UpdateTaxRate OperationRestrictions of UpdateTaxRate unbound action
TopProduct.Read ReadRestrictions of TopProduct singleton

CRUD operations on entity sets and singleton

For CRUD operations on entity sets and singleton, the permissions of the corresponding insert/update/delete/read restrictions are applied.

Endpoint Required permission scopes
GET Customers Customers.Read
GET Customers(1) Customers.Read OR Customers.ReadByKey DELETE Customers/1 |Customers.Delete POST Customers |Customers.Insert PUT Customers |Customers.Update PATCH Customers |Customers.Update`

Note, in the case of Customers(1), permissions will be extracted from two places if available. Permissions will be extracted from both ReadRestrictions as well as the ReadByKeyRestrictions property of the ReadRestrictions. If the user has any of the permissions defined in either the ReadRestrictions or ReadByKeyRestrictions, then access will be granted.

For example, if the model defines permission scopes Customers.Read in the ReadRestrictions, and Customers.ReadByKey in the ReadByKeyRestrictions, then access to the GET Customers(1) endpoint will be granted to uers with either the Customers.Read or Customers.ReadByKey permissions.

Function and Action calls

The OperationRestricitons of the function or action are applied. For function and action imports, the OperationRestrictions of the underlying function/action are applied.

Endpoint Required permission scopes
GET Orders(1)/CalculateTax Order.CalculateTax
POST UpdateTaxRate UpdateTaxRate

Note: If functions are overloaded, the operation restrictions of the specific overload being called will apply.

Operations on properties

The ReadRestrictions or UpdateRestrictions of the entity or singleton whose property are being accessed are applied.

Endpoint Restrictions applied
GET Customers(1)/Address/City Customers.Read OR Customers.ReadByKey
GET TopProduct/Price TopProduct.Read
DELETE or PUT or POST Customers(1)/Email Customers.Update

These apply the ReadRestrictions and UpdateRestrictions of the entity/singleton that contains the navigation property where the link is read/added/removed/modified.

Endpoint Restrictions applied
GET Customers(1)/Orders/$ref Customers.Read OR Customers.ReadByKey
GET TopCustomer/Orders/$ref TopProduct.Read
DELETE or PUT or POST Customers(1)/Orders/$ref Customers.Update

If the endpoint accesses a navigation properties and nested paths in general, the authorization middleware will check whether the user has permissions to access each segment of the path.

Given the endpoint GET Customers(1)/Orders, the middleware will check whether the user has read access to Customers(1) and then read access to Orders. The permissions that are checked for reading Customers(1) are extracted from the ReadRestrictions (including ReadByKeyRestrictions) of the Customers entity set. The permissions checked for Orders are extracted from both the ReadRestrictions of Orders and the ReadRestrictions of the NavigationRestrictions of Customers that apply to the Orders property (NS.EntityContainer.Customers/{key}/Orders path).

Assuming the model defines the scopes Customers.Read, Customers.ReadByKey, CustomersOrders.Read and Orders.Read, the required scopes to read the endpoint would be:

(Customers.Read OR Customers.ReadByKey) AND (CustomerOrders.Read OR Orders.Read)
Endpoint Restrictions applied
GET Customers(1)/Orders (Customers.Read OR Customers.ReadByKey) AND (CustomerOrders.Read OR Orders.Read))
GET Customers(1)/Orders(1)/Price (Customers.Read OR Customers.ReadByKey) AND (CustomerOrders.Read OR CustomerOrders.ReadByKey OR Orders.Read OR Orders.ReadByKey)
DELETE Customers(1)/Orders(1) (Customers.Update) AND (CustomerOrders.Delete OR Orders.Delete)
PUT Customers(1)/Orders(1) (Customers.Update) AND (CustomerOrders.Update or Orders.Update)
POST Customers(1)/Orders (Customers.Update) AND (CustomerOrders.Insert or Orders.Insert)
GET Customers(1)/Orders(2)/Product (Customers.Read OR Customers.ReadByKey) AND (CustomerOrders.Read OR CustomerOrders.ReadByKey OR Orders.Read OR Orders.ReadByKey) AND (OrderProduct.Read OR OrderProduct.ReadByKey OR Products.Read)

Note that a POST, PUT, PATCH or DELETE access to a navigation property is considered an update access to the entity that the navigation property belongs to.

Limitations

  • Only supports AspNetCore APIs using endpoing routing, i.e. AspNetCore 3.1
  • Does not support RestrictedProperties
  • Permissions are extracted from the model on each request, no caching is performed. It's not clear whether it's guaranteed that the model will not change after startup.
Product Compatible and additional computed target framework versions.
.NET net8.0 is compatible.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
1.2.1 1,021 9/14/2024
1.2.0 119 9/14/2024
1.1.0 6,912 6/20/2023
1.0.0 8,376 9/17/2022