docs: clarify unauthenticated access configuration (close #2528) (#5217)

This commit is contained in:
Marion Schleifer 2020-06-29 14:50:06 +02:00 committed by GitHub
parent 93104e616f
commit 1ff660d7d6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 33 additions and 30 deletions

View File

@ -61,4 +61,4 @@ Here's how a GraphQL query is processed in JWT mode:
Using webhooks <webhook>
Using JWT <jwt>
Unauthenticated access <unauthenticated-access>
Unauthenticated / Public access <unauthenticated-access>

View File

@ -1,48 +1,51 @@
.. meta::
:description: Manage unauthenticated access in Hasura
:keywords: hasura, docs, authentication, auth, unauthenticated access
:description: Manage unauthenticated / public access in Hasura
:keywords: hasura, docs, authentication, auth, unauthenticated access, public access
.. _unauthenticated_access:
Unauthenticated access
======================
Unauthenticated / Public access
===============================
.. contents:: Table of contents
:backlinks: none
:depth: 1
:depth: 2
:local:
Use case
--------
Introduction
------------
It is a common requirement to have requests which are accessible to all users without the need for any authentication
(logging in). For example, to display a public feed of events.
You can configure Hasura GraphQL engine to allow access to unauthenticated users by defining a specific role
which will be set for all unauthenticated requests.
Once you have configured authentication, by default Hasura GraphQL engine will reject any unauthenticated request it
receives.
Configuring unauthenticated access
----------------------------------
You can configure Hasura GraphQL engine to allow access to unauthenticated users by defining a specific role
which will be set for all unauthenticated requests. Once an unauthenticated role is configured, unaunthenticated requests will
not be rejected and instead the request will be made with the configured role.
This role can then be used to define the permissions for unauthenticated users as described in :ref:`authorization`.
A guide on setting up unauthenticated user permissions can be found :ref:`here <anonymous_users_example>`.
Configuring unauthenticated / public access
-------------------------------------------
Depending on your auth setup an unauthenticated role can be configured as follows:
Webhooks
^^^^^^^^
For :ref:`webhook authentication <auth_webhooks>`, an unauthenticated request is any request for which the webhook returns a ``401 Unauthorized`` response.
For unauthenticated access, you can return a ``200`` status response with your defined unauthenticated role, e.g: ``{ "x-hasura-role": "<anonymous-role>" }``.
JWT
^^^
For :ref:`JWT authentication <auth_jwt>`, an unauthenticated request is any request which does not contain a JWT token.
You can use the env variable ``HASURA_GRAPHQL_UNAUTHORIZED_ROLE`` or ``--unauthorized-role`` flag to set a role
for unauthenticated (non-logged in) users. See :ref:`server_flag_reference` for more details
on setting this flag/env var.
This role can then be used to define the permissions for unauthenticated users as described in :ref:`authorization`.
A guide on setting up unauthenticated user permissions can be found :ref:`here <anonymous_users_example>`.
How it works
------------
Once you have configured authentication, by default Hasura GraphQL engine will reject any unauthenticated request it
receives.
Based on your authentication setup, an unauthenticated request is any request:
- for which the webhook returns a ``401 Unauthorized`` response in case of :ref:`webhook authentication <auth_webhooks>`.
- which does not contain a JWT token in case of :ref:`JWT authentication <auth_jwt>`.
Once an unauthenticated role is configured, unaunthenticated requests will not be rejected and instead the request will
be made with the configured role.