Technology

Quickly add permission checks to your ASP.NET apps

In this blog post, we will add permission checks to an ASP.NET backend written in C#.
8 minutes

You can add permission checks to any kind of backend and frontend application with just a few lines of code using the Space Blocks Permissions SDK. In this blog post, we will add permission checks to an ASP.NET backend written in C#.

👉 For this example, you can find the entire Source Code on GitHub .

Create a simple demo app

To demonstrate, that there is no second floor or magic behind the scenes, we will start with a fresh new ASP.NET Web API project. With the following command, we can quickly create a new project.

dotnet new webapi -n SimplePermissions --use-controllers

The default template creates a single HTTP endpoint at the /WeatherForecast route, which generates a random weather forecast each time it gets fetched. Let’s quickly adjust the code, so that a city and a fictional user can be passed to the endpoint.

Hint: In a real-world application, the User ID would not be passed via query parameters but would come out of an JWT for example. For this demo scenario, we oversimplified simulating different users, by passing their IDs directly.

For this, we adjust the Get method in the WeatherForecastController.cs by adding a few parameters and changing it to the ActionResult return type.

[HttpGet(Name = "GetWeatherForecast")]
public async Task<ActionResult<IEnumerable<WeatherForecast>?>> Get([FromQuery] string city, [FromQuery] string user)
{
    var forecast = Enumerable.Range(1, 5).Select(index => new WeatherForecast
    {
        Date = DateOnly.FromDateTime(DateTime.Now.AddDays(index)),
        TemperatureC = Random.Shared.Next(-20, 55),
        Summary = Summaries[Random.Shared.Next(Summaries.Length)],
        City = city
    })
    .ToArray();

    return Ok(forecast);
}

Define Permissions

Space Blocks Permissions supports very complex and hierarchical permission structures, but for our sample application, we will try to keep the permissions structure as simple as possible. We start by creating a new project in the Space Blocks Developer Portal . Then we navigate to Permissions in the sidebar and create a configuration.

Our sample use-case consists of just one single type of resources: Cities. To define this Resource Type, we can drag a line from Tenant to a free space on the canvas and call our new Resource Type City. After saving, we can add Permissions to the Resource Type. Let’s start with just two permissions, one to see the current weather forecast called Get-Current-Forecast and one to see a city’s future forecast called Get-Future-Forecast .

Define Roles

Space Blocks Permissions are based on roles. This means, that a user never gets a permission assigned directly, but always as a role. So instead of having the Get-Future-Forecast permission on a city, as user rather has the Current Forecast Viewer or Future Forecast Viewer role assigned.

Before we can assign these roles, we need to create them in the Developer Portal by clicking on Roles in the sidebar. Here we can define a role called Current Forecast Viewer , for which we only select the Get-Future-Forecast permission in the UI. Afterward, we also add a role called Future Forecast Viewer , for which we select all permissions.

Creating a client

Before we can communicate with the Space Blocks Permissions API, we need to create an OAuth Client for it. Click the Create button in the client section of your Project Overview , give the client a name and select the following configuration:

  • Environment: default
  • Audiences: Permissions
  • Scopes: permissions:management:read , permissions:management:write

Additionally to the client, you will also need some basic information like API Key and URL to communicate with the Space Blocks API. You can find this information in the Developer Guide section of your project.

Seeding the scenario

Now we can theoretically start communicating with the Space Blocks API for Permissions checks. But at the moment, this would not be much fun, as there are no cities or role assignments registered. To have some demo data to play around with, we have created a seeding script , that you can use to bring some live into our demo. It creates

  • One Tenant called Default
  • Two cities Cansas and Seattle
  • Role assignment of the Future Forecast Viewer for Linda on the city of Cansas
  • Role assignment of the Future Forecast Viewer for Linda on the city of Seattle
  • Role assignment of the Current Forecast Viewer for Alice on the city of Seattle

This will result in Linda being allowed to see the current and future forecast for both cities, Cansas and Seattle and Alice being allowed to only see the current forecast and only of Seattle.

Hint: In a real-world application, the seeding would not be done via scripting but would also be part of your application logic. Whenever a new city gets created or whenever a new role assignment is being made, you would call our API via the Space Blocks SDK.

Let’s run the seeding script , with the following commands.

bash <(curl -s https://raw.githubusercontent.com/wemogy/spaceblocks-sample-aspnet/main/seeding.sh)

It will ask you for the Permissions URL and API Key, which you can find in the Developer Guide section of your project, and the Client ID and Client Secret from the Client you created earlier.

Add Permission Checks

Now, it’s finally time to get back to our ASP.NET backend code, to add the permission check logic to our code. As a first step, we get started by adding the SpaceBlocks.Permissions.Server NuGet package to get the SDK into our project.

dotnet add package SpaceBlocks.Permissions.Server

Now, we need to initialize the PermissionsClient from the SDK. This can be done in the constructor of the WeatherForecastController . Don’t forget to replace the API Key, Client Credentials and Permissions URL placeholders with your own values.

private readonly ILogger<WeatherForecastController> _logger;
private readonly PermissionsClient _client;

public WeatherForecastController(ILogger<WeatherForecastController> logger)
{
    _logger = logger;
    var auth = new AuthenticationOptions(
		"<API_KEY>",
        "<YOUR_CLIENT_ID>",
        "<YOUR_CLIENT_SECRET>",
        "permissions:management:read permissions:management:write");

    _client = new PermissionsClient(new Uri("<YOUR_PERMISSIONS_URL>"), "<API_KEY>", auth);
}

Lastly, we go back to the Get method from the beginning and add the code for the permission checks to it.

[HttpGet(Name = "GetWeatherForecast")]
public async Task<ActionResult<IEnumerable<WeatherForecast>?>> Get([FromQuery] string city, [FromQuery] string user)
{
    // Check, which permissions the user has for the city
    var permissions = await _client.PermissionApi.ListPermissionsAsync(
        tenantId: "default",
        resourceTypeId: "city",
        resourceId: city,
        subjectId: user);

    // Get permissions for the user
    var canGetCurrentForecast = permissions["city"].Contains("get-current-forecast");
    var canGetFutureForecast = permissions["city"].Contains("get-future-forecast");
    if (!canGetCurrentForecast && !canGetFutureForecast)
    {
        return Unauthorized("You don't have permissions to access this resource.");
    }

    // Depending on the permissions, return the forecast for 1 or 5 days
    var forecastDays = canGetFutureForecast ? 5 : 1;

    // Generate the forecast
    var forecast = Enumerable.Range(1, forecastDays).Select(index => new WeatherForecast
    {
        Date = DateOnly.FromDateTime(DateTime.Now.AddDays(index)),
        TemperatureC = Random.Shared.Next(-20, 55),
        Summary = Summaries[Random.Shared.Next(Summaries.Length)]
    })
    .ToArray();

    return Ok(forecast);
}

What we did here is first listing all permissions the given user has on the given city with the ListPermissionsAsync method from the SDK. Then we check, of the permissions at the city level contains the get-current-forecast or get-future-forecast Permission IDs and set the canGetCurrentForecast and canGetFutureForecast variables accordingly. If none of them are set, we return a 401 Unauthorized response. To define the value of the forecastDays variable, we check if the current user has the canGetFutureForecast permission. If so, we show the forecast for the next 5 days, otherwise, we just show it for 1 day.

Let’s give it a try!

To try it out, we need to start the application by starting a Debug Session in Visual Studio Code or by just running the command from below.

dotnet run

This should bring up the Swagger page for the Web API project on http://localhost:5143/swagger , with which we can try, if the permission checks worked as intended.

Remember, we are expecting the following results:

  • User: Linda , City: Cansas → 5 day forecast
  • User: Linda , City: Seattle → 5 day forecast
  • User: Alice , City: Cansas → 401 Unauthorized
  • User: Alice , City: Seattle → 1 day forecast
  • User: Unknown , City: Unknown → 401 Unauthorized
👉 Remember, you can find the entire Source Code on GitHub .