-
Notifications
You must be signed in to change notification settings - Fork 164
Roles admin service
The AuthP library contains a IAuthRolesAdminService service that contains various admin features for managing AuthP's Roles. This page describes these admin features and give you some examples of how they might be used in an application.
NOTE: the code for the AuthRolesAdminService can be found here and has plenty of comments.
How Roles are used depends on whether your application is using AuthP's multi-tenant feature. Multi-tenant applications uses the Role's RoleType parameter to provide - see this section of the Roles Explained document which explains the different type of Roles.
NOTE: A multi-tenant application doesn't have to use multi-tenant Roles feature. In the AuthP repo there are two examples of multi-tenant applications: Example3 (single-level multi-tenant) and Example4 (hierarchical multi-tenant). Only Example uses the full suite of the multi-tenant Roles feature.
There are two example implementations of the Roles admin. The first isn't a multi-tenant application, while the second is using AuthP's multi-tenant feature:
- Example1's Pages/AuthRoles Razor Pages, which isn't a multi-tenant application. NOTE: You do not need to log in to access the admin services.
- Example3's RolesController and its views, which is a multi-tenant application. NOTE: You must log in as 'AppAdmin@g1.com' to access all the admin features, and as 'admin@4uInc.com' to see what an tenant admin can do.
All the methods come from an instance of the IAuthRolesAdminService provided by DI.
The QueryRoleToPermissions method returns an IQueryable<RoleWithPermissionNamesDto>, which you can use for showing the Roles, with the names of the Permission in that Role. Because is an IQueryable you can filter, page, etc. if you need to.
If your application isn't a multi-tenant application, or you don't want to use the you can call the QueryRoleToPermissions method without a parameter - see this example from Example1's ListRoles Page.
AuthRolesList = await
_authRolesAdmin.QueryRoleToPermissions().ToListAsync();And the output would look like this (Note the black "Permission1 , Permission2" is a tool tip shown by hovering / clicking the '#Permissions' column for a Role you want to see.

If you want to display in any multi-tenant application you MUST provide the UserId of the logged in user. That's because the Roles can differ between tenants. The QueryRoleToPermissions uses the UserId to work out a) if the user is an app user (no tenant), in which case you can see all the Roles, or b) if the user is a tenant user it will only show the Roles available in the user's tenant. The code below was taken from Example3's RolesController and it provides the UserId of the logged in user.
var userId = User.GetUserIdFromUser();
var permissionDisplay = await
_authRolesAdmin.QueryRoleToPermissions(userId)
.OrderBy(x => x.RoleType)
.ToListAsync();The the screenshot below is from Example3's Roles\Index page. The big change is the addition of a RoleType column to the display

Things to point out in this screenshot:
- If you are the app admin a Create new Role` button is shown (tenant admin user's aren't allowed to create a Role.
- There are a 'Edit' and 'Delete' link on the right of each Role if you are the app admin. Again tenant admin user's aren't allowed to Edit or Delete Roles.
- If you hover / click the '#Permissions' column for a Role it will show you a tool tip with a list of the Permissions in the Role.
Add and update are very similar so they are described together. The two methods are:
UpdateRoleToPermissionsAsync(string roleName, IEnumerable<string> permissionNames, string description = null)CreateRoleToPermissionsAsync(string roleName, IEnumerable<string> permissionNames, string description = null)
NOTE: Tenant admin user aren't allowed to create or update a Role.
The screenshot below is an example taken from Example4's Roles\Edit page (Example1's version is the same).

Things to point out in this screenshot:
- You can edit the Role's Description.
- If your application is using the multi-tenant
RoleTypefeature then a RoleType dropdown will be shown on an create or update. - You add/remove the Permissions in the Role by toggling the Select / Selected by clicking on the button to the right of the Permission information.
- The "Add Role" works the same way as the Edit, but you need to provide a RoleName and call the
CreateRoleToPermissionsAsyncmethod instead ofUpdateRoleToPermissionsAsync
NOTE: The selecting / deselecting of each Permission is done by a JavaScript method called TogglePermissionSelect. This method is in the wwwroot/js/site.js file in both Example1 and Example4.
Deleting a Role can effect a user so there are two methods:
-
QueryUsersUsingThisRole(string roleName): this returns aIQueryable<AuthUser>result, which you can use to find wantAuthUsersare using a Role before you decide to delete it. -
DeleteRoleAsync(string roleName, bool removeFromUsers): This deletes the Role with the givenroleName. It contains a check if anyAuthUsersare using that 'RoleName` and:- If the
removeFromUsersis true, then deletes the links from the deleted Role and to anAuthUser. - If the
removeFromUsersis true, then it returns an error.
- If the
In Example1's Pages/AuthRoles implementation there is a simple "are you sure you want to delete this" page. But the Example4's RolesController I uses the QueryUsersUsingThisRole method to provide information to the admin user who wants to delete a Role. The screenshot below is an example taken from Example4's Roles\Delete page.

As you can see this lists all the users that Role and asks for a confirmation before it will delete the Role. But if the Role isn't used by any AuthUsers you can just click the Delete button.
Sometimes it useful to list the Permissions in your application, and the GetPermissionDisplay(bool excludeFilteredPermissions, string groupName = null) will return the PermissionDisplay. The two parameters are:
-
excludeFilteredPermissions: If true it will exclude any permissions where the[Display]attribute has itsAutoGenerateFilteris set to true. This can be used to not show some of the more powerful Permissions to a normal admin person shouldn't add to a user - see Filtering out advanced Permissions for a more detailed explanation. -
groupName: If itsnull, then you see all the Permissions, but if you provide a string value the method will only show the Permissions with thatGroupName.
The screenshot below is an example taken from Example4's Roles\ListPermissions page.

- Intro to multi-tenants (ASP.NET video)
- Articles in date order:
- 0. Improved Roles/Permissions
- 1. Setting up the database
- 2. Admin: adding users and tenants
- 3. Versioning your app
- 4. Hierarchical multi-tenant
- 5. Advanced technique with claims
- 6. Sharding multi-tenant setup
- 7. Three ways to add new users
- 8. The design of the sharding data
- 9. Down for maintenance article
- 10: Three ways to refresh claims
- 11. Features of Multilingual service
- 12. Custom databases - Part1
- Videos (old)
- Authentication explained
- Permissions explained
- Roles explained
- AuthUser explained
- Multi tenant explained
- Sharding explained
- How AuthP handles sharding
- How AuthP handles errors
- Languages & cultures explained
- JWT Token refresh explained
- Setup Permissions
- Setup Authentication
- Startup code
- Setup the custom database feature
- JWT Token configuration
- Multi tenant configuration
- Using Permissions
- Using JWT Tokens
- Creating a multi-tenant app
- Supporting multiple languages
- Unit Test your AuthP app