Roles and access management for django apps
Project description
Django Identity and Access Management
Roles and access management for django apps
Quick Setup
pip install django-iam
Make sure you have a custom user model setup and in settings.py
you have
AUTH_USER_MODEL = 'users.User' # Point to your custom user model
Add iam
to your INSTALLED_APPS
# settings.py
INSTALLED_APPS = [
'django.contrib.admin',
..., # django apps
'iam',
..., # Your apps
]
AUTHENTICATION_BACKENDS = [
...,
'rules.permissions.ObjectPermissionBackend',
'django.contrib.auth.backends.ModelBackend',
...
]
Create a profile for the role, e.g.
# app/models.py
from django.db import models
from iam.factories import AbstractProfileFactory
from iam.contrib.utils import get_profile_cls_verbose_name_plural
class SomeRoleProfile(
AbstractProfileFactory.as_abstract_model(related_name='blog_author_profile'),
models.Model
):
# user = models.OneToOneField(settings.AUTH_USER_MODEL, on_delete=models.PROTECT) # comes from AbstractProfileFactory
class Meta:
# Adds a little 👤 emoji to the name in admin, to make it clear this is a profile model
verbose_name_plural = get_profile_cls_verbose_name_plural('BlogAdminProfile')
In your app, create a rules.py
:
# app/rules.py
import rules
from iam.utils import lazy_get_predicate
# refer to https://github.com/dfunckt/django-rules#permissions-in-the-admin for why this is here
rules.add_perm('some_app', rules.is_staff)
is_some_role = lazy_get_predicate('some_app.SomeRole')
In your model that you are planning to set access to:
# app/models.py
from rules.contrib.models import RulesModel
from some_app.rules import is_some_role
class SomeModel(
RulesModel
):
name = models.CharField(max_length=100)
class Meta:
rules_permissions = {
'add': is_some_role,
'view': is_some_role,
'change': is_some_role,
'delete': is_some_role,
}
As the last step, enable your user model to work with IAM and roles by having it inherit IAMUserMixin
:
# users/models.py
from iam.mixins import IAMUserMixin
class User(
IAMUserMixin,
...,
AbstractUser
):
...
Now only users that have a SomeRoleProfile
profile can access SomeModel
.
For more examples, check out example/blog
.
Rationale
This package aims to improve upon the built-in Django authorization and permissions system, by making the system fully
programmatic and not rely on database objects like the built-in Group
and Permission
models. We believe access
governance in applications and projects should be evident form the code, and should not rely on database states and
migrations. An instance of an app deployed on a server should not have a different access governance structure than
another instance somewhere else (which can be the case using the Django built-in authorization system).
The excellent library django-rules
drastically improves upon the Django
permission system by enabling developers to create rule based systems similar to decision trees, without the need for
the database to be involved. It also allows devs to create object level permissions, something which the built-in
permission system doesn't allow.
django-iam
builds on django-rules
by introducing the concept of Roles and Profiles. In IAM each user is assigned one
or many roles, which determine their access to certain objects or paths in the application. Each Role has an associated
Profile
which is a database model/object with a 1-1 relationship to the User
model. A user has a Role if their User
account has the associated profile in an active state. Please check the Quick Setup section for an
example on how to set IAM up in your Django project.
Main tools
registry
AbstractProfileFactory (iam.factories.AbstractProfileFactory
)
lazy_get_predicate
Deactivating profiles
predicates
HasOwnerFactory
Override permissions
Optional tools and utilities (iam.contrib
)
ProfileAdmin
AutoOwnerAdminMixin
Admin roles
AbstractIAMUser
IAMUserAdmin
get_profile_class_verbose_name_plural
Development and Testing
IDE Setup
Add the example
directory to the PYTHONPATH
in your IDE to avoid seeing import warnings in the tests
modules. If
you are using PyCharm, this is already set up.
Running the Tests
Install requirements
pip install -r requirements.txt
For local environment
pytest
For all supported environments
tox
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file django-iam-0.2.0rc7.tar.gz
.
File metadata
- Download URL: django-iam-0.2.0rc7.tar.gz
- Upload date:
- Size: 10.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.7.1 importlib_metadata/4.10.1 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 5830ba95337bf30bf79fa848bef57f870d86343abe228d5a915e6819bb762ce9 |
|
MD5 | f5a24c46766a263f5288bcce27f92eea |
|
BLAKE2b-256 | 651ec7627ab4d5d3ea4c093385cb7f3d5c828a18b490f0dc26628f29b9f12132 |
File details
Details for the file django_iam-0.2.0rc7-py3-none-any.whl
.
File metadata
- Download URL: django_iam-0.2.0rc7-py3-none-any.whl
- Upload date:
- Size: 14.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.7.1 importlib_metadata/4.10.1 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 10a28c85a5548a1bec0c644d33d0c07af685ad1a7cd1d22edfd8b3c466885646 |
|
MD5 | 06ce25b283bb6d5446790b05d9167cc4 |
|
BLAKE2b-256 | 00818f747a57de4fa8a3774136e29b7bd8991d7eccef07951366d14504a4d283 |