Xtensive.Orm.Security
7.1.2
See the version list below for details.
dotnet add package Xtensive.Orm.Security --version 7.1.2
NuGet\Install-Package Xtensive.Orm.Security -Version 7.1.2
<PackageReference Include="Xtensive.Orm.Security" Version="7.1.2" />
paket add Xtensive.Orm.Security --version 7.1.2
#r "nuget: Xtensive.Orm.Security, 7.1.2"
// Install Xtensive.Orm.Security as a Cake Addin #addin nuget:?package=Xtensive.Orm.Security&version=7.1.2 // Install Xtensive.Orm.Security as a Cake Tool #tool nuget:?package=Xtensive.Orm.Security&version=7.1.2
Xtensive.Orm.Security
Summary
The extension provides full-fledged security layer (authentication services, principals, roles, secured queries) There are 2 main parts that can also be used separately: authentication services and role-based access to domain entities
Prerequisites
DataObjects.Net 7.1.x or later (http://dataobjects.net)
How to use
Include types from Xtensive.Orm.Security assembly into the domain:
<Xtensive.Orm>
<domains>
<domain ... >
<types>
<add assembly="your assembly"/>
<add assembly="Xtensive.Orm.Security"/>
</types>
</domain>
</domains>
</Xtensive.Orm>
If you are planning to use one of authentication services add
<section name="Xtensive.Orm.Security" type="Xtensive.Orm.Security.Configuration.ConfigurationSection, Xtensive.Orm.Security" />
and set up the desired hashing service:
<Xtensive.Orm.Security>
<hashingService name="plain"/>
</Xtensive.Orm.Security>
Other examples of how to configure the extension are in section below
Examples
Example #1. Definition of a class that inherits GenericPrincipal class that will describe your users, e.g.:
[HierarchyRoot]
public class User : GenericPrincipal
{
[Field, Key]
public int Id { get; private set; }
[Field]
public string LastName { get; set; }
[Field]
public string FirstName { get; set; }
...
public User(Session session)
: base(session)
{
}
}
Example #2. Having the User class defined above, it can be used for user creation and authentication.
// Creating a user
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
var user = new User(session);
user.Name = "admin";
user.SetPassword("password");
transaction.Complete();
}
}
// Authenticating a user
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
var user = session.Authenticate("admin", "password");
transaction.Complete();
}
}
Example #3. Definition of a hierarchy of roles for users. A role is a set of permissions for a job fuction within a company, e.g.:
EmployeeRole
|
|- StockManagerRole
|
|- SalesRepresentativeRole
|
|- SalesManagerRole
|
|- SalesPresidentRole
The role tree above can be represented like following:
// This is base role for all employees
[HierarchyRoot(InheritanceSchema = InheritanceSchema.SingleTable)]
public abstract class EmployeeRole : Role
{
[Field, Key]
public int Id { get; set; }
protected override void RegisterPermissions()
{
// All employees can read products
RegisterPermission(new Permission<Product>());
// All employees can read other employees
RegisterPermission(new Permission<Employee>());
}
protected EmployeeRole(Session session)
: base(session) {}
}
public class StockManagerRole : EmployeeRole
{
protected override void RegisterPermissions()
{
// Stock manager inherits Employee permissions
base.RegisterPermissions();
// Stock manager can read and write products
RegisterPermission(new Permission<Product>(canWrite:true));
}
public StockManagerRole(Session session)
: base(session) {}
}
public class SalesRepresentativeRole : EmployeeRole
{
protected override void RegisterPermissions()
{
// Sales manager inherits Employee permissions
base.RegisterPermissions();
// All sales representative can read customer
RegisterPermission(new Permission<Customer>());
// All sales representative can read orders
RegisterPermission(new Permission<Order>());
}
protected EmployeeRole(Session session)
: base(session) {}
}
public class SalesManagerRole : SalesRepresentativeRole
{
protected override void RegisterPermissions()
{
// Sales manager inherits SalesRepresentativeRole permissions
base.RegisterPermissions();
// Sales managers can read and write orders
RegisterPermission(new Permission<Order>(canWrite:true));
}
protected SalesManagerRole(Session session)
: base(session) {}
}
public class SalesPresidentRole : SalesRepresentativeRole
{
protected override void RegisterPermissions()
{
// Sales manager inherits SalesRepresentativeRole permissions
base.RegisterPermissions();
// Sales president can read and write customers
RegisterPermission(new Permission<Customer>(canWrite:true));
// Sales president can read and write orders
RegisterPermission(new Permission<Order>(canWrite:true));
}
protected SalesManagerRole(Session session)
: base(session) {}
}
The roles should be intitalized on first domain build for being able to use them further, e.g:
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
new SalesRepresentativeRole(session);
new SalesManagerRole(session);
new SalesPresidentRole(session);
new StockManagerRole(session);
transaction.Complete();
}
}
Example #4. Assigning one of roles to a user.
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
var stockManagerRole = session.Query.All<StockManagerRole>().Single();
var user = new User(session);
user.Name = "peter";
user.SetPassword("password");
user.Roles.Add(stockManagerRole);
transaction.Complete();
}
}
Example #5. Checking whether a user has the required role
user.IsInRole("StockManagerRole");
// or
user.Roles.Contains(stockManagerRole);
Example #6. Session impersonation
using (var imContext = session.Impersonate(user)) {
// inside the region the session is impersonated with the specified
// principal and set of their roles and permissions
// Checking whether the user has a permission for reading Customer entities
imContext.Permissions.Contains<Permission<Customer>>(p => p.CanRead);
// Checking whether the user has a permission for writing to Customer entities
imContext.Permissions.Contains<Permission<Customer>>(p => p.CanWrite);
// another way
var p = imContext.Permissions.Get<Permission<Customer>>();
if (p != null && p.CanRead)
// allow doing some stuff
}
To end the impersonation call ImpersonationContext.Undo() or Dispose() method. Impersonation contexts can be nested, e.g.:
using (var userContext = session.Impersonate(user)) {
// do some user-related stuff
using (var adminContext = session.Impersonate(admin)) {
// do some admin stuff
}
// we are still in user impersonation context
}
// no context here
Example #7. Secure (restrictive) queries. A role may set up a condition that will be automatically added to any query and limits the query results, e.g.:
public class AutomobileManagerRole : EmployeeRole
{
private static IQueryable<Customer> GetCustomers(ImpersonationContext context, QueryEndpoint query)
{
return query.All<Customer>()
.Where(customer => customer.IsAutomobileIndustry);
}
protected override void RegisterPermissions()
{
base.RegisterPermissions();
// This permission tells that a principal can read/write customers
// but only those that are returned by the specified condition
RegisterPermission(new CustomerPermission(true, GetCustomers));
}
public AutomobileManagerRole(Session session)
: base(session) {}
}
Now all employees that have AutomobileManagerRole will read customers that have IsAutomobileIndustry property set to true, e.g.:
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
var automobileManagerRole = session.Query.All<AutomobileManagerRole>().Single();
var user = new User(session);
user.Name = "peter";
user.SetPassword("password");
user.Roles.Add(automobileManagerRole);
using (var context = session.Impersonate(user)) {
var customers = Query.All<Customer>();
// Inside the impersonation context the above-mentioned query condition
// will be added automatically so user will get only automobile customers
}
transaction.Complete();
}
}
Examples of how to configure extension
Additionally to "How to use" section it provides extra examples of how to configure and/or read extension configuration.
The example in "How to use" section uses old fasioned API of configuration files, yet usable in many applications. But there are some cases which may require usage of different API or work-around certain cases with existing one.
Example #1 Reading old-style configuration of an assembly in NET 5 and newer.
Due to new architecture without AppDomain (which among the other things was in charge of gathering configuration files of loaded assemblies
as it would be one configuration file) System.Configuration.ConfigurationManager
now reads only configuration file of actual executable, loaded
assemblies' configuration files stay unreachable by default, though there is need to read some data from them.
A great example is test projects which are usually get loaded by test runner executable, and the only configuration accessible in this case
is test runner one.
Extra step is required to read configuration files in such cases. Thankfully, ConfigurationManager
has methods to get access to assemblies' configurations.
To get access to an assembly configuration file it should be opened explicitly by
var configuration = ConfigurationManager.OpenExeConfiguration(typeof(SomeTypeInConfigOwnerAssembly).Assembly.Location);
The instance returned from OpenExeConfiguration
provides access to sections of the assembly configuration. DataObjects.Net configurations
(DomainConfiguration
, SecurityConfiguration
, etc.) have Load()
methods that can recieve this instance.
SecurityConfiguration
can be read like so
var configuration = ConfigurationManager.OpenExeConfiguration(typeof(SomeTypeInConfigOwnerAssembly).Assembly.Location);
var securityConfig = SecurityConfiguration.Load(configuration);
// loaded configuration should be manually placed to
domainConfiguration.ExtensionConfigurations.Set(securityConfig);
The domainConfiguration.ExtensionConfigurations
is a new unified place from which the extension will try to get its configuration
instead of calling default parameterless Load()
method, which has not a lot of sense now, though the method is kept as a second source
for backwards compatibility.
For more convenience, DomainConfiguration
extensions are provided, which make code more neater.
For instance,
var configuration = ConfigurationManager.OpenExeConfiguration(typeof(SomeTypeInConfigOwnerAssembly).Assembly.Location);
var domainConfiguration = DomainConfiguration.Load(configuration);
// the extension hides getting configuration with SecurityConfiguration.Load(configuration)
// and also putting it to ExtensionConfigurations collection.
domainConfiguration.ConfigureSecurityExtension(configuration);
Remember the requirement to register Xtensive.Orm.Security
to domain? The extension tries to register this assembly to DomainConfiguration.Types
collection
so even if you miss registration but called extension method required types of Security extension will be registered in Domain types.
Custom section names are also supported if for some reason default section name is not used.
Example #2 Reading old-style configuration of an assembly in a project that uses appsettings.json file.
If for some reason there is need to keep the old-style configuration then there is a work-around as well.
Static configuration manager provides method OpenMappedExeConfiguration()
which allows to get access to
any *.config file as System.Configuration.Configuration
instance. For example,
ExeConfigurationFileMap configFileMap = new ExeConfigurationFileMap();
configFileMap.ExeConfigFilename = "Orm.config"; //or other file name, the file should exist bin folder
var configuration = System.Configuration.ConfigurationManager.OpenMappedExeConfiguration(configFileMap, ConfigurationUserLevel.None);
After that, as in previous example, the instance can be passed to Load
method of SecurityConfiguration
to read extension configuration
and later put it to DomainConfiguration.ExtensionConfigurations
var securityConfiguration = SecurityConfiguration.Load(configuration);
domainConfiguration.ExtensionConfigurations.Set(securityConfiguration);
Extension usage will look like
domainConfiguration.ConfigureSecurityExtension(configuration);
Example #3 Configure using Microsoft.Extensions.Configuration API.
This API allows to have configurations in various forms including JSON and XML formats. Loading of such files may differ depending on .NET version, check Microsoft manuals for instructions.
Allowed JSON and XML configuration definition look like below
<configuration>
<Xtensive.Orm.Security>
<HashingService>sha512</HashingService>
<AuthenticationService>CustomAuthenticationService</AuthenticationService>
</Xtensive.Orm.Security>
</configuration>
{
"Xtensive.Orm.Security": {
"HashingService" : "sha512",
"AuthenticationService" : "CustomAuthenticationService"
}
}
The API has certain issues with XML elements with attributes so it is recommended to use more up-to-date attributeless nodes. For JSON it is pretty clear, almost averyone knows its format.
SecurityConfiguration.Load
method can accept different types of abstractions from the API, including
Microsoft.Extensions.Configuration.IConfiguration
;Microsoft.Extensions.Configuration.IConfigurationRoot
;Microsoft.Extensions.Configuration.IConfigurationSection
.
Loading of configuration may look like
var app = builder.Build();
//...
// tries to load from default section "Xtensive.Orm.Security"
var securityConfig = SecurityConfiguration.Load(app.Configuration);
domainConfiguration.ExtensionConfigurations.Set(securityConfig);
or, with use of extension, like
var app = builder.Build();
//...
// Tries to load from default section "Xtensive.Orm.Security"
// and put it into domainConfiguration.ExtensionConfigurations.
// Additionally, registers types of "Xtensive.Orm.Security" assembly.
domainConfiguration.ConfigureSecurityExtension(app.Configuration);
Example #4 Configure using Microsoft.Extensions.Configuration API from section with non-default name.
For configurations like
<configuration>
<Orm.Security>
<HashingService>sha512</HashingService>
<AuthenticationService>CustomAuthenticationService</AuthenticationService>
</Orm.Security>
</configuration>
{
"Orm.Security": {
"HashingService" : "sha512",
"AuthenticationService" : "CustomAuthenticationService"
}
}
Loading of configuration may look like
```csharp
var app = builder.Build();
//...
var securityConfig = SecurityConfiguration.Load(app.Configuration, "Orm.Security");
domainConfiguration.ExtensionConfigurations.Set(securityConfig);
or, with use of extension, like
var app = builder.Build();
//...
domainConfiguration.ConfigureSecurityExtension(app.Configuration, "Orm.Security");
Example #5 Configure using Microsoft.Extensions.Configuration API from sub-section deeper in section tree.
If for some reason extension configuration should be moved deeper in section tree like something below
<configuration>
<Orm.Extensions>
<Xtensive.Orm.Security>
<HashingService>sha512</HashingService>
<AuthenticationService>CustomAuthenticationService</AuthenticationService>
</Xtensive.Orm.Security>
</Orm.Extensions>
</configuration>
or in JSON
{
"Orm.Extensions": {
"Xtensive.Orm.Security": {
"HashingService" : "sha512",
"AuthenticationService" : "CustomAuthenticationService"
}
}
}
Then section must be provided manually, code may look like
var app = builder.Build();
//...
var configurationRoot = app.Configuration;
var extensionsGroupSection = configurationRoot.GetSection("Orm.Extensions");
var securitySection = extensionsGroupSection.GetSection("Xtensive.Orm.Security");
var securityConfig = SecurityConfiguration.Load(securitySection);
domainConfiguration.ExtensionConfigurations.Set(securityConfig);
or, with use of extension method, like
var app = builder.Build();
//...
var configurationRoot = app.Configuration;
var extensionsGroupSection = configurationRoot.GetSection("Orm.Extensions");
var securitySection = extensionsGroupSection.GetSection("Xtensive.Orm.Security");
domainConfiguration.ConfigureSecurityExtension(securitySection);
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 is compatible. net5.0-windows was computed. net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net5.0
- Microsoft.Extensions.Configuration.Abstractions (>= 6.0.0)
- Microsoft.Extensions.Configuration.Binder (>= 6.0.0)
- System.Configuration.ConfigurationManager (>= 5.0.0)
- Xtensive.Orm (>= 7.1.2)
-
net6.0
- Microsoft.Extensions.Configuration.Abstractions (>= 6.0.0)
- Microsoft.Extensions.Configuration.Binder (>= 6.0.0)
- System.Configuration.ConfigurationManager (>= 6.0.1)
- Xtensive.Orm (>= 7.1.2)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
7.2.0-Beta-1 | 130 | 12/28/2023 |
7.1.2 | 208 | 10/18/2024 |
7.1.1 | 300 | 11/14/2023 |
7.1.0 | 281 | 4/12/2023 |
7.1.0-RC | 187 | 3/9/2023 |
7.1.0-Beta-2 | 240 | 12/19/2022 |
7.1.0-Beta-1 | 198 | 7/4/2022 |
7.0.5 | 99 | 6/3/2024 |
7.0.4 | 116 | 11/12/2023 |
7.0.3 | 557 | 3/21/2022 |
7.0.2 | 514 | 2/8/2022 |
7.0.1 | 407 | 10/29/2021 |
7.0.0 | 430 | 6/2/2021 |
6.0.13 | 133 | 4/4/2024 |
6.0.12 | 128 | 11/10/2023 |
6.0.11 | 483 | 1/12/2023 |
6.0.10 | 526 | 4/29/2022 |
6.0.9 | 560 | 2/2/2022 |
6.0.8 | 472 | 10/28/2021 |
6.0.7 | 434 | 8/27/2021 |
6.0.6 | 448 | 5/24/2021 |
6.0.5 | 532 | 3/9/2021 |
6.0.4 | 561 | 12/22/2020 |
6.0.3 | 554 | 9/29/2020 |
6.0.0 | 746 | 1/28/2020 |
5.1.0-Beta-1 | 1,142 | 1/30/2015 |
5.0.24 | 493 | 4/27/2021 |
5.0.23 | 488 | 2/4/2021 |
5.0.22 | 607 | 11/18/2020 |
5.0.21 | 567 | 11/6/2020 |
5.0.20 | 712 | 12/25/2019 |
5.0.19 | 718 | 5/30/2019 |
5.0.19-Beta-2 | 466 | 4/16/2019 |
5.0.19-Beta-1 | 604 | 12/29/2018 |
5.0.18 | 1,029 | 9/28/2018 |
5.0.18-Beta-3 | 698 | 7/2/2018 |
5.0.18-Beta-2 | 763 | 6/6/2018 |
5.0.18-Beta-1 | 788 | 4/24/2018 |
5.0.17 | 1,482 | 2/27/2018 |
5.0.17-Beta-3 | 858 | 2/12/2018 |
5.0.17-Beta-2 | 910 | 1/12/2018 |
5.0.17-Beta-1 | 869 | 12/28/2017 |
5.0.16 | 1,206 | 12/1/2017 |
5.0.16-Beta-1 | 799 | 9/27/2017 |
5.0.15 | 1,218 | 8/1/2017 |
5.0.14 | 1,129 | 6/19/2017 |
5.0.13 | 1,213 | 3/22/2017 |
5.0.12 | 1,163 | 2/14/2017 |
5.0.11 | 1,058 | 1/25/2017 |
5.0.11-RC2 | 822 | 12/16/2016 |
5.0.11-RC | 1,116 | 9/20/2016 |
5.0.10 | 1,117 | 8/5/2016 |
5.0.10-RC | 815 | 6/30/2016 |
5.0.9 | 1,419 | 3/3/2016 |
5.0.8 | 1,190 | 2/15/2016 |
5.0.7 | 1,150 | 1/27/2016 |
5.0.7-RC2 | 859 | 12/8/2015 |
5.0.7-RC | 922 | 9/10/2015 |
5.0.6 | 1,241 | 7/3/2015 |
5.0.5 | 1,389 | 4/23/2015 |
5.0.4 | 1,198 | 3/19/2015 |
5.0.4-RC | 1,090 | 2/25/2015 |
5.0.3 | 1,564 | 10/31/2014 |
5.0.2 | 1,274 | 9/11/2014 |
5.0.0 | 1,268 | 8/15/2014 |
5.0.0-RC2 | 922 | 8/1/2014 |
5.0.0-RC | 894 | 7/21/2014 |
5.0.0-Beta-3 | 920 | 5/28/2014 |
5.0.0-Beta-2 | 1,006 | 2/28/2014 |
5.0.0-Beta-1 | 1,037 | 11/14/2013 |
4.6.9 | 1,115 | 7/3/2015 |
4.6.8 | 1,148 | 8/1/2014 |
4.6.7 | 1,297 | 6/23/2014 |
4.6.6 | 1,400 | 4/9/2014 |
4.6.5 | 1,223 | 1/7/2014 |
4.6.4 | 1,477 | 9/30/2013 |
4.6.3 | 3,926 | 2/4/2013 |
4.6.2 | 1,703 | 11/28/2012 |
4.6.0 | 1,489 | 10/11/2012 |
4.6.0-RC | 1,140 | 10/4/2012 |
4.5.8 | 1,262 | 9/30/2013 |
4.5.7 | 1,260 | 2/4/2013 |
4.5.6 | 1,490 | 11/28/2012 |
4.5.5 | 1,409 | 10/11/2012 |
4.5.5-RC | 1,105 | 10/4/2012 |
4.5.3 | 1,395 | 8/6/2012 |
4.5.2 | 1,432 | 5/10/2012 |
4.5.0 | 1,601 | 3/13/2012 |