Xtensive.Orm.Security
6.0.13
See the version list below for details.
dotnet add package Xtensive.Orm.Security --version 6.0.13
NuGet\Install-Package Xtensive.Orm.Security -Version 6.0.13
<PackageReference Include="Xtensive.Orm.Security" Version="6.0.13" />
paket add Xtensive.Orm.Security --version 6.0.13
#r "nuget: Xtensive.Orm.Security, 6.0.13"
// Install Xtensive.Orm.Security as a Cake Addin #addin nuget:?package=Xtensive.Orm.Security&version=6.0.13 // Install Xtensive.Orm.Security as a Cake Tool #tool nuget:?package=Xtensive.Orm.Security&version=6.0.13
Xtensive.Orm.Security
Summary
The extension provides full-fledged security layer (authentication services, principals, roles, secured queries) There are 2 main parts that can also be used separately: authentication services and role-based access to domain entities
Prerequisites
DataObjects.Net 6.0.x or later (http://dataobjects.net)
How to use
Include types from Xtensive.Orm.Security assembly into the domain:
<Xtensive.Orm>
<domains>
<domain ... >
<types>
<add assembly="your assembly"/>
<add assembly="Xtensive.Orm.Security"/>
</types>
</domain>
</domains>
</Xtensive.Orm>
If you are planning to use one of authentication services add
<section name="Xtensive.Orm.Security" type="Xtensive.Orm.Security.Configuration.ConfigurationSection, Xtensive.Orm.Security" />
and set up the desired hashing service:
<Xtensive.Orm.Security>
<hashingService name="plain"/>
</Xtensive.Orm.Security>
Examples
Example #1. Definition of a class that inherits GenericPrincipal class that will describe your users, e.g.:
[HierarchyRoot]
public class User : GenericPrincipal
{
[Field, Key]
public int Id { get; private set; }
[Field]
public string LastName { get; set; }
[Field]
public string FirstName { get; set; }
...
public User(Session session)
: base(session)
{
}
}
Example #2. Having the User class defined above, it can be used for user creation and authentication.
// Creating a user
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
var user = new User(session);
user.Name = "admin";
user.SetPassword("password");
transaction.Complete();
}
}
// Authenticating a user
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
var user = session.Authenticate("admin", "password");
transaction.Complete();
}
}
Example #3. Definition of a hierarchy of roles for users. A role is a set of permissions for a job fuction within a company, e.g.:
EmployeeRole
|
|- StockManagerRole
|
|- SalesRepresentativeRole
|
|- SalesManagerRole
|
|- SalesPresidentRole
The role tree above can be represented like following:
// This is base role for all employees
[HierarchyRoot(InheritanceSchema = InheritanceSchema.SingleTable)]
public abstract class EmployeeRole : Role
{
[Field, Key]
public int Id { get; set; }
protected override void RegisterPermissions()
{
// All employees can read products
RegisterPermission(new Permission<Product>());
// All employees can read other employees
RegisterPermission(new Permission<Employee>());
}
protected EmployeeRole(Session session)
: base(session) {}
}
public class StockManagerRole : EmployeeRole
{
protected override void RegisterPermissions()
{
// Stock manager inherits Employee permissions
base.RegisterPermissions();
// Stock manager can read and write products
RegisterPermission(new Permission<Product>(canWrite:true));
}
public StockManagerRole(Session session)
: base(session) {}
}
public class SalesRepresentativeRole : EmployeeRole
{
protected override void RegisterPermissions()
{
// Sales manager inherits Employee permissions
base.RegisterPermissions();
// All sales representative can read customer
RegisterPermission(new Permission<Customer>());
// All sales representative can read orders
RegisterPermission(new Permission<Order>());
}
protected EmployeeRole(Session session)
: base(session) {}
}
public class SalesManagerRole : SalesRepresentativeRole
{
protected override void RegisterPermissions()
{
// Sales manager inherits SalesRepresentativeRole permissions
base.RegisterPermissions();
// Sales managers can read and write orders
RegisterPermission(new Permission<Order>(canWrite:true));
}
protected SalesManagerRole(Session session)
: base(session) {}
}
public class SalesPresidentRole : SalesRepresentativeRole
{
protected override void RegisterPermissions()
{
// Sales manager inherits SalesRepresentativeRole permissions
base.RegisterPermissions();
// Sales president can read and write customers
RegisterPermission(new Permission<Customer>(canWrite:true));
// Sales president can read and write orders
RegisterPermission(new Permission<Order>(canWrite:true));
}
protected SalesManagerRole(Session session)
: base(session) {}
}
The roles should be intitalized on first domain build for being able to use them further, e.g:
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
new SalesRepresentativeRole(session);
new SalesManagerRole(session);
new SalesPresidentRole(session);
new StockManagerRole(session);
transaction.Complete();
}
}
Example #4. Assigning one of roles to a user.
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
var stockManagerRole = session.Query.All<StockManagerRole>().Single();
var user = new User(session);
user.Name = "peter";
user.SetPassword("password");
user.Roles.Add(stockManagerRole);
transaction.Complete();
}
}
Example #5. Checking whether a user has the required role
user.IsInRole("StockManagerRole");
// or
user.Roles.Contains(stockManagerRole);
Example #6. Session impersonation
using (var imContext = session.Impersonate(user)) {
// inside the region the session is impersonated with the specified
// principal and set of their roles and permissions
// Checking whether the user has a permission for reading Customer entities
imContext.Permissions.Contains<Permission<Customer>>(p => p.CanRead);
// Checking whether the user has a permission for writing to Customer entities
imContext.Permissions.Contains<Permission<Customer>>(p => p.CanWrite);
// another way
var p = imContext.Permissions.Get<Permission<Customer>>();
if (p != null && p.CanRead)
// allow doing some stuff
}
To end the impersonation call ImpersonationContext.Undo() or Dispose() method. Impersonation contexts can be nested, e.g.:
using (var userContext = session.Impersonate(user)) {
// do some user-related stuff
using (var adminContext = session.Impersonate(admin)) {
// do some admin stuff
}
// we are still in user impersonation context
}
// no context here
Example #7. Secure (restrictive) queries. A role may set up a condition that will be automatically added to any query and limits the query results, e.g.:
public class AutomobileManagerRole : EmployeeRole
{
private static IQueryable<Customer> GetCustomers(ImpersonationContext context, QueryEndpoint query)
{
return query.All<Customer>()
.Where(customer => customer.IsAutomobileIndustry);
}
protected override void RegisterPermissions()
{
base.RegisterPermissions();
// This permission tells that a principal can read/write customers
// but only those that are returned by the specified condition
RegisterPermission(new CustomerPermission(true, GetCustomers));
}
public AutomobileManagerRole(Session session)
: base(session) {}
}
Now all employees that have AutomobileManagerRole will read customers that have IsAutomobileIndustry property set to true, e.g.:
using (var session = Domain.OpenSession()) {
using (var transaction = session.OpenTransaction()) {
var automobileManagerRole = session.Query.All<AutomobileManagerRole>().Single();
var user = new User(session);
user.Name = "peter";
user.SetPassword("password");
user.Roles.Add(automobileManagerRole);
using (var context = session.Impersonate(user)) {
var customers = Query.All<Customer>();
// Inside the impersonation context the above-mentioned query condition
// will be added automatically so user will get only automobile customers
}
transaction.Complete();
}
}
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 was computed. |
.NET Framework | net461 was computed. net462 was computed. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.0
- System.Configuration.ConfigurationManager (>= 4.7.0)
- Xtensive.Orm (>= 6.0.13)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
7.2.0-Beta-1 | 129 | 12/28/2023 |
7.1.2 | 170 | 10/18/2024 |
7.1.1 | 295 | 11/14/2023 |
7.1.0 | 280 | 4/12/2023 |
7.1.0-RC | 186 | 3/9/2023 |
7.1.0-Beta-2 | 239 | 12/19/2022 |
7.1.0-Beta-1 | 197 | 7/4/2022 |
7.0.5 | 98 | 6/3/2024 |
7.0.4 | 115 | 11/12/2023 |
7.0.3 | 556 | 3/21/2022 |
7.0.2 | 513 | 2/8/2022 |
7.0.1 | 406 | 10/29/2021 |
7.0.0 | 429 | 6/2/2021 |
6.0.13 | 132 | 4/4/2024 |
6.0.12 | 127 | 11/10/2023 |
6.0.11 | 470 | 1/12/2023 |
6.0.10 | 525 | 4/29/2022 |
6.0.9 | 559 | 2/2/2022 |
6.0.8 | 471 | 10/28/2021 |
6.0.7 | 433 | 8/27/2021 |
6.0.6 | 447 | 5/24/2021 |
6.0.5 | 529 | 3/9/2021 |
6.0.4 | 560 | 12/22/2020 |
6.0.3 | 551 | 9/29/2020 |
6.0.0 | 743 | 1/28/2020 |
5.1.0-Beta-1 | 1,141 | 1/30/2015 |
5.0.24 | 486 | 4/27/2021 |
5.0.23 | 487 | 2/4/2021 |
5.0.22 | 606 | 11/18/2020 |
5.0.21 | 566 | 11/6/2020 |
5.0.20 | 711 | 12/25/2019 |
5.0.19 | 717 | 5/30/2019 |
5.0.19-Beta-2 | 465 | 4/16/2019 |
5.0.19-Beta-1 | 603 | 12/29/2018 |
5.0.18 | 1,027 | 9/28/2018 |
5.0.18-Beta-3 | 697 | 7/2/2018 |
5.0.18-Beta-2 | 762 | 6/6/2018 |
5.0.18-Beta-1 | 787 | 4/24/2018 |
5.0.17 | 1,481 | 2/27/2018 |
5.0.17-Beta-3 | 857 | 2/12/2018 |
5.0.17-Beta-2 | 909 | 1/12/2018 |
5.0.17-Beta-1 | 868 | 12/28/2017 |
5.0.16 | 1,205 | 12/1/2017 |
5.0.16-Beta-1 | 798 | 9/27/2017 |
5.0.15 | 1,217 | 8/1/2017 |
5.0.14 | 1,128 | 6/19/2017 |
5.0.13 | 1,212 | 3/22/2017 |
5.0.12 | 1,162 | 2/14/2017 |
5.0.11 | 1,057 | 1/25/2017 |
5.0.11-RC2 | 821 | 12/16/2016 |
5.0.11-RC | 1,115 | 9/20/2016 |
5.0.10 | 1,116 | 8/5/2016 |
5.0.10-RC | 814 | 6/30/2016 |
5.0.9 | 1,418 | 3/3/2016 |
5.0.8 | 1,187 | 2/15/2016 |
5.0.7 | 1,149 | 1/27/2016 |
5.0.7-RC2 | 858 | 12/8/2015 |
5.0.7-RC | 921 | 9/10/2015 |
5.0.6 | 1,240 | 7/3/2015 |
5.0.5 | 1,388 | 4/23/2015 |
5.0.4 | 1,197 | 3/19/2015 |
5.0.4-RC | 1,089 | 2/25/2015 |
5.0.3 | 1,563 | 10/31/2014 |
5.0.2 | 1,273 | 9/11/2014 |
5.0.0 | 1,267 | 8/15/2014 |
5.0.0-RC2 | 921 | 8/1/2014 |
5.0.0-RC | 893 | 7/21/2014 |
5.0.0-Beta-3 | 919 | 5/28/2014 |
5.0.0-Beta-2 | 1,005 | 2/28/2014 |
5.0.0-Beta-1 | 1,036 | 11/14/2013 |
4.6.9 | 1,114 | 7/3/2015 |
4.6.8 | 1,147 | 8/1/2014 |
4.6.7 | 1,296 | 6/23/2014 |
4.6.6 | 1,399 | 4/9/2014 |
4.6.5 | 1,222 | 1/7/2014 |
4.6.4 | 1,476 | 9/30/2013 |
4.6.3 | 3,925 | 2/4/2013 |
4.6.2 | 1,702 | 11/28/2012 |
4.6.0 | 1,488 | 10/11/2012 |
4.6.0-RC | 1,139 | 10/4/2012 |
4.5.8 | 1,261 | 9/30/2013 |
4.5.7 | 1,259 | 2/4/2013 |
4.5.6 | 1,489 | 11/28/2012 |
4.5.5 | 1,408 | 10/11/2012 |
4.5.5-RC | 1,104 | 10/4/2012 |
4.5.3 | 1,394 | 8/6/2012 |
4.5.2 | 1,431 | 5/10/2012 |
4.5.0 | 1,600 | 3/13/2012 |