Skip to main content

Roles and access management for django apps

Project description

Django Identity and Access Management

Roles and access management for django apps

Quick Setup

pip install django-iam

Make sure you have a custom user model setup and in settings.py you have

AUTH_USER_MODEL = 'users.User'  # Point to your custom user model

Add iam to your INSTALLED_APPS

# settings.py
INSTALLED_APPS = [
    'django.contrib.admin',
    ...,  # django apps
    'iam',
    ...,  # Your apps
]

AUTHENTICATION_BACKENDS = [
    ...,
    'rules.permissions.ObjectPermissionBackend',
    'django.contrib.auth.backends.ModelBackend',
    ...
]

Create a profile for the role, e.g.

# app/models.py
from django.db import models
from iam.factories import AbstractProfileFactory
from iam.contrib.utils import get_profile_cls_verbose_name_plural


class SomeRoleProfile(
    AbstractProfileFactory.as_abstract_model(related_name='blog_author_profile'),
    models.Model
):
    # user = models.OneToOneField(settings.AUTH_USER_MODEL, on_delete=models.PROTECT)  # comes from AbstractProfileFactory

    class Meta:
        # Adds a little 👤 emoji to the name in admin, to make it clear this is a profile model
        verbose_name_plural = get_profile_cls_verbose_name_plural('BlogAdminProfile')

In your app, create a rules.py:

# app/rules.py
import rules
from iam.utils import lazy_get_predicate

# refer to https://github.com/dfunckt/django-rules#permissions-in-the-admin for why this is here
rules.add_perm('some_app', rules.is_staff)

is_some_role = lazy_get_predicate('some_app.SomeRole')

In your model that you are planning to set access to:

# app/models.py
from rules.contrib.models import RulesModel
from some_app.rules import is_some_role


class SomeModel(
    RulesModel
):
    name = models.CharField(max_length=100)

    class Meta:
        rules_permissions = {
            'add': is_some_role,
            'view': is_some_role,
            'change': is_some_role,
            'delete': is_some_role,
        }

As the last step, enable your user model to work with IAM and roles by having it inherit IAMUserMixin:

# users/models.py
from iam.mixins import IAMUserMixin


class User(
    IAMUserMixin,
    ...,
    AbstractUser
):
    ...

Now only users that have a SomeRoleProfile profile can access SomeModel.

For more examples, check out example/blog.

Rationale

This package aims to improve upon the built-in Django authorization and permissions system, by making the system fully programmatic and not rely on database objects like the built-in Group and Permission models. We believe access governance in applications and projects should be evident form the code, and should not rely on database states and migrations. An instance of an app deployed on a server should not have a different access governance structure than another instance somewhere else (which can be the case using the Django built-in authorization system).

The excellent library django-rules drastically improves upon the Django permission system by enabling developers to create rule based systems similar to decision trees, without the need for the database to be involved. It also allows devs to create object level permissions, something which the built-in permission system doesn't allow.

django-iam builds on django-rules by introducing the concept of Roles and Profiles. In IAM each user is assigned one or many roles, which determine their access to certain objects or paths in the application. Each Role has an associated Profile which is a database model/object with a 1-1 relationship to the User model. A user has a Role if their User account has the associated profile in an active state. Please check the Quick Setup section for an example on how to set IAM up in your Django project.

Main tools

registry

AbstractProfileFactory (iam.factories.AbstractProfileFactory)

lazy_get_predicate

Deactivating profiles

predicates

HasOwnerFactory

Override permissions

Optional tools and utilities (iam.contrib)

ProfileAdmin

AutoOwnerAdminMixin

Admin roles

AbstractIAMUser

IAMUserAdmin

get_profile_class_verbose_name_plural

Development and Testing

IDE Setup

Add the example directory to the PYTHONPATH in your IDE to avoid seeing import warnings in the tests modules. If you are using PyCharm, this is already set up.

Running the Tests

Install requirements

pip install -r requirements.txt

For local environment

pytest

For all supported environments

tox

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django-iam-0.2.0rc7.tar.gz (10.5 kB view details)

Uploaded Source

Built Distribution

django_iam-0.2.0rc7-py3-none-any.whl (14.3 kB view details)

Uploaded Python 3

File details

Details for the file django-iam-0.2.0rc7.tar.gz.

File metadata

  • Download URL: django-iam-0.2.0rc7.tar.gz
  • Upload date:
  • Size: 10.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.10.1 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.9

File hashes

Hashes for django-iam-0.2.0rc7.tar.gz
Algorithm Hash digest
SHA256 5830ba95337bf30bf79fa848bef57f870d86343abe228d5a915e6819bb762ce9
MD5 f5a24c46766a263f5288bcce27f92eea
BLAKE2b-256 651ec7627ab4d5d3ea4c093385cb7f3d5c828a18b490f0dc26628f29b9f12132

See more details on using hashes here.

File details

Details for the file django_iam-0.2.0rc7-py3-none-any.whl.

File metadata

  • Download URL: django_iam-0.2.0rc7-py3-none-any.whl
  • Upload date:
  • Size: 14.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.10.1 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.9

File hashes

Hashes for django_iam-0.2.0rc7-py3-none-any.whl
Algorithm Hash digest
SHA256 10a28c85a5548a1bec0c644d33d0c07af685ad1a7cd1d22edfd8b3c466885646
MD5 06ce25b283bb6d5446790b05d9167cc4
BLAKE2b-256 00818f747a57de4fa8a3774136e29b7bd8991d7eccef07951366d14504a4d283

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page