Skip to content

Latest commit

 

History

History
920 lines (763 loc) · 36.5 KB

File metadata and controls

920 lines (763 loc) · 36.5 KB
title description sidebar_position slug
Slack
Modeling authorization for Slack
4
/modeling/advanced/slack

import { AuthzModelSnippetViewer, CardBox, CheckRequestViewer, DocumentationNotice, IntroductionSection, Playground, ProductConcept, ProductName, ProductNameFormat, WriteRequestViewer, } from '@components/Docs';

Modeling Authorization for Slack with

This tutorial explains how to model permissions for a communication platform like Slack using .

  • How to indicate relationships between a group of and an .
    Used here to indicate that all members of a slack workspace can write in a certain channel.
    See Modeling User Groups for more.
  • How to Model concentric relationship to have a certain on an object imply another relation on the same object.
    Used here to indicate that legacy admins have all the permissions of the more granular channels admin.
    See Modeling Concentric Relationships for more.
  • How to use the union operator condition to indicate that a user might have a certain relation with an object if they match any of the criteria indicated.

Before You Start

In order to understand this guide correctly you must be familiar with some concepts and know how to develop the things that we will list below.

Concepts

It would be helpful to have an understanding of some concepts of before you start.

Direct Access

You need to know how to create an authorization model and create a relationship tuple to grant a user access to an object. Learn more →

Modeling Concentric Relationships

You need to know how to update the authorization model to allow having nested relations such as all writers are readers. Learn more →

Concepts & Modeling Language

What you will be modeling

Slack is a messaging app for businesses that connects people to the information they need. By bringing people together to work as one unified team, Slack transforms the way organizations communicate. (Source: What is Slack?)

In this tutorial, you will build a subset of the Slack permission model (detailed below) in , using some scenarios to validate the model.

As reference, you can refer to Slack's publicly available docs:

Note: For brevity, this tutorial will not model all of Slack's permissions. Instead, it will focus on modeling the scenarios outlined below.

Requirements

This tutorial will focus on the following sections (this is a partial list of Slack's roles):

Workspace Roles:

  • Guest: This type of user is limited in their ability to use Slack, and is only permitted to see one or multiple delegated channels.
  • Member: This is the base type of user that does not have any particular administrative abilities, but has basic access to the organization's Slack workspaces. When an administrative change needs to be made, these users need the support of admins and owners to make the changes.
  • Legacy Admin: This type of user is the basic administrator of any organization, and can make a wide variety of administrative changes across Slack, such as renaming channels, archiving channels, setting up preferences and policies, inviting new users, and installing applications. Users with this role perform the majority of administrative tasks across a team.

System Roles:

  • Channels Admin: This type of user has the permission to archive channels, rename channels, create private channels, and convert public channels into private channels.

Channel Settings:

  • Visibility:
    • Public: Visible to all members and open to join
    • Private: Visible to admins and invited members
  • Posting Permissions:
    • Open: Anyone can post
    • Limited: Only allowed members can post

Defined Scenarios

Use the following scenarios to be able to validate whether the model of the requirements is correct.

There will be the following users:

  • Amy
  • Bob
  • Catherine
  • David
  • Emily

These users will interact in the following scenarios:

  • You will assume there is a Slack workspace called Sandcastle
  • Amy is a legacy admin of the Sandcastle workspace
  • Bob is a member of the Sandcastle workspace with a channels admin role (Read more about system roles at Slack here)
  • Catherine and Emily are normal members of the Sandcastle workspace, they can view all public channels, as well as channels they have been invited to
  • David is a guest user with only view and write access to #proj-marketing-campaign, one of the public channels in the Sandcastle workspace
  • Bob and Emily are in a private channel #marketing-internal in the Sandcastle workspace which only they can view and post to
  • All members of the Sandcastle workspace can view the general channel, but only Amy and Emily can post to it

Image showing requirements

:::caution

In production, it is highly recommended to use unique, immutable identifiers. Names are used in this article to make it easier to read and follow.

:::

Modeling Workspaces & Channels

The goal by the end of this post is to ask : Does person X have permission to perform action Y on channel Z? In response, you want to either get a confirmation that person X can indeed do that, or a rejection that they cannot. E.g. does David have access to view #general?

The is based on Zanzibar, a Relation Based Access Control system. This means it relies on and to perform authorization .

Setting aside the permissions, you will start with the roles and learn how to express the requirements in terms of relations you can feed into .

The requirements stated:

  • Amy is a legacy admin of the Sandcastle workspace
  • Bob is a channels admin of the Sandcastle workspace
  • Catherine and Emily are a normal members of the Sandcastle workspace
  • David is a guest user

Here is how you would express than in 's : You have a called "workspace", and users can be related to it as a legacy_admin, channels_admin, member and guest

<AuthzModelSnippetViewer configuration={{ schema_version: '1.1', type_definitions: [ { type: 'user', }, { type: 'workspace', // objects of type workspace relations: { // have users related to them as... legacy_admin: { // Legacy Admins this: {}, }, channels_admin: { // Channels Admin this: {}, }, member: { // Member this: {}, }, guest: { // Guest this: {}, }, }, metadata: { relations: { legacy_admin: { directly_related_user_types: [{ type: 'user' }] }, channels_admin: { directly_related_user_types: [{ type: 'user' }] }, member: { directly_related_user_types: [{ type: 'user' }] }, guest: { directly_related_user_types: [{ type: 'user' }] }, }, }, }] }} />

:::info

Objects of type workspace have users related to them as:

  • Legacy Admin (legacy_admin)
  • Channels Admin (channels_admin)
  • Member (member)
  • Guest (guest)

Direct relationship type restrictions indicate that a user can have a with an object of the type the relation specifies.

:::

01. Individual Permissions

To keep things simple and focus on rather than Slack complexity, we will model only four roles (legacy_admin, channels_admin, member, guest).

At the end of this section we want to have the following permissions represented

User Relation Object
amy legacy_admin workspace:sandcastle
bob channels_admin workspace:sandcastle
catherine member workspace:sandcastle
david guest workspace:sandcastle
emily member workspace:sandcastle

To represent permissions in we use . For workspace permissions we need to create the following :

<AuthzModelSnippetViewer configuration={{ schema_version: '1.1', type_definitions: [ { type: 'user', }, { type: 'workspace', relations: { legacy_admin: { this: {}, }, channels_admin: { this: {}, }, member: { this: {}, }, guest: { this: {}, }, }, metadata: { relations: { legacy_admin: { directly_related_user_types: [{ type: 'user' }] }, channels_admin: { directly_related_user_types: [{ type: 'user' }] }, member: { directly_related_user_types: [{ type: 'user' }] }, guest: { directly_related_user_types: [{ type: 'user' }] }, }, }, }, ], }} />

The service determines if a has access to an by if the user has a relation to that object. Let us examine one of those relations in detail:

<AuthzModelSnippetViewer configuration={{ schema_version: '1.1', type: 'workspace', // objects of type workspace relations: { // have users related to them as... member: { // "member": if those users belong to: this: {}, // the userset of all users related to the document as "member" }, }, metadata: { relations: { member: { directly_related_user_types: [{ type: 'user' }] }, }, }, }} skipVersion={true} />

:::info

The snippet above indicates that objects of type workspace have users related to them as "member" if those users belong to the userset of all users related to the workspace as "member".

This means that a user can be as a member to an object of type "workspace"

:::

If we want to say amy is a legacy_admin of workspace:sandcastle we create this relationship tuple

<WriteRequestViewer relationshipTuples={[ { _description: 'Amy is a Legacy Admin in the Sandcastle workspace', user: 'user:amy', relation: 'legacy_admin', object: 'workspace:sandcastle', }, ]} />

We can now ask "is amy a legacy_admin of workspace:sandcastle?"

<CheckRequestViewer user={'user:amy'} relation={'legacy_admin'} object={'workspace:sandcastle'} allowed={true} />

We can also say that catherine is a member of workspace:sandcastle:

<WriteRequestViewer relationshipTuples={[ { _description: 'Catherine is a Member in the Sandcastle workspace', user: 'user:catherine', relation: 'member', object: 'workspace:sandcastle', }, ]} />

And verify by

<CheckRequestViewer user={'user:catherine'} relation={'member'} object={'workspace:sandcastle'} allowed={true} />

Catherine, on the other hand, is not a legacy_admin of workspace:sandcastle.

<CheckRequestViewer user={'user:catherine'} relation={'legacy_admin'} object={'workspace:sandcastle'} allowed={false} />

Repeat this process for the other relationships

[
  {
    // Bob is a Channels Admin in the Sandcastle workspace
    user: 'user:bob',
    relation: 'channels_admin',
    object: 'workspace:sandcastle',
  },
  {
    // David is a guest in the Sandcastle workspace
    user: 'user:david',
    relation: 'guest',
    object: 'workspace:sandcastle',
  },
  {
    // Emily is a Member in the Sandcastle workspace
    user: 'user:emily',
    relation: 'member',
    object: 'workspace:sandcastle',
  },
]

<WriteRequestViewer relationshipTuples={[ { _description: 'Bob is a Channels Admin in the Sandcastle workspace', user: 'user:bob', relation: 'channels_admin', object: 'workspace:sandcastle', }, { _description: 'David is a guest in the Sandcastle workspace', user: 'user:david', relation: 'guest', object: 'workspace:sandcastle', }, { _description: 'Emily is a Member in the Sandcastle workspace', user: 'user:emily', relation: 'member', object: 'workspace:sandcastle', }, ]} />

Verification

To verify, we can issue to verify it is working as expected.

<CheckRequestViewer user={'user:amy'} relation={'legacy_admin'} object={'workspace:sandcastle'} allowed={true} />

Let's try to verify the followings:

User Object Relation Query Relation?
amy workspace:sandcastle legacy_admin is amy related to workspace:sandcastle as legacy_admin? Yes
david workspace:sandcastle legacy_admin is david related to workspace:sandcastle as legacy_admin? No
amy workspace:sandcastle guest is amy related to workspace:sandcastle as guest? No
david workspace:sandcastle guest is david related to workspace:sandcastle as guest? Yes
amy workspace:sandcastle member is amy related to workspace:sandcastle as member? No
david workspace:sandcastle member is david related to workspace:sandcastle as member? No

02. Updating The workspace Authorization Model With Implied Relations

Some of the queries that you ran earlier, while returning the correct response, do not match reality. One of which is:

<CheckRequestViewer user={'user:amy'} relation={'member'} object={'workspace:sandcastle'} allowed={false} />

As you saw before, running this query will return amy is not a member of workspace:sandcastle, which is correct based on the data you have given so far. But in reality, Amy, who is a legacy_admin already has an channels_admin and member relations. In fact anyone (other than a guest) is a member of the workspace.

To change this behavior, we will update our system with a concentric relationship model.

With the following updated , you are informing that any user who is related to a workspace as legacy_admin, is also related as a channels_admin and a member .

<AuthzModelSnippetViewer configuration={{ schema_version: '1.1', type_definitions: [ { type: 'user', }, { type: 'workspace', relations: { legacy_admin: { this: {}, }, channels_admin: { // users related to workspace as channels_admin are union: { // the union (any of): child: [ { this: {}, // the set of users with a direct channels_admin relation }, { computedUserset: { // the set of users related to the workspace as legacy_admin relation: 'legacy_admin', }, }, ], }, }, member: { // users related to workspace as member are union: { // the union (any of): child: [ { this: {}, // the set of users with a direct member relation }, { computedUserset: { // the set of users related to the workspace as channels_admin relation: 'channels_admin', }, }, { computedUserset: { // the set of users related to the workspace as legacy_admin relation: 'legacy_admin', }, }, ], }, }, guest: { this: {}, }, }, metadata: { relations: { legacy_admin: { directly_related_user_types: [{ type: 'user' }] }, channels_admin: { directly_related_user_types: [{ type: 'user' }] }, member: { directly_related_user_types: [{ type: 'user' }] }, guest: { directly_related_user_types: [{ type: 'user' }] }, }, }, }, ], }} />

We can then verify amy is a member of workspace:sandcastle.

<CheckRequestViewer user={'user:amy'} relation={'member'} object={'workspace:sandcastle'} allowed={true} />

We can check for other users and relationships.

User Object Relation Query Relation?
amy workspace:sandcastle legacy_admin is amy related to workspace:sandcastle as legacy_admin? Yes
david workspace:sandcastle legacy_admin is david related to workspace:sandcastle as legacy_admin? No
amy workspace:sandcastle guest is amy related to workspace:sandcastle as guest? No
david workspace:sandcastle guest is david related to workspace:sandcastle as guest? Yes
amy workspace:sandcastle member is amy related to workspace:sandcastle as member? Yes
david workspace:sandcastle member is david related to workspace:sandcastle as member? No

03. Updating The Authorization Model To Include Channels

So far, you have modeled the users' to the workspace itself. In this task you will expand the model to include the relations concerning the channels.

By the end of it, you will run some queries to check whether a user can view or write to a certain channel. Queries such as:

  • is david related to channel:general as viewer? (expected answer: No relation, as David is a guest user with only a relation to #proj-marketing-campaign)
  • is david related to channel:proj_marketing_campaign as viewer? (expected answer: There is a relation, as there is a relation between David and #proj-marketing-campaign as a writer)
  • is bob related to channel:general as viewer? (expected answer: There is a relation, as Bob is a member of the Sandcastle workspace, and all members of the workspace have a viewer relation to #general)

The requirements are:

  • Amy, Bob, Catherine and Emily, are normal members of the Sandcastle workspace, they can view all public channels, in this case: #general and #proj-marketing-campaign
  • David, a guest user, has only view and write access to the #proj-marketing-campaign channel
  • Bob and Emily are the only ones with either view or write access to the #marketing-internal channel
  • Amy and Emily are the only ones with write access to the #general channel

The possible relations to channels are:

  • Workspace includes the channel, consider the relation that of a parent workspace
  • A user can be a viewer and/or writer on a channel

The authorization model already has a section describing the workspace, what remains is describing the channel. That can be done by adding the following section to the configuration above:

<AuthzModelSnippetViewer configuration={{ schema_version: '1.1', type: 'channel', // A channel can have the following relations: relations: { parent_workspace: { // workspaces related to it as parent_workspace this: {}, }, writer: { // users related to it as writer this: {}, }, viewer: { // users related to it as viewer this: {}, }, }, metadata: { relations: { parent_workspace: { directly_related_user_types: [{ type: 'workspace' }] }, writer: { directly_related_user_types: [ { type: 'user' }, { type: 'workspace', relation: 'legacy_admin' }, { type: 'workspace', relation: 'channels_admin' }, { type: 'workspace', relation: 'member' }, { type: 'workspace', relation: 'guest' }, ], }, viewer: { directly_related_user_types: [ { type: 'user' }, { type: 'workspace', relation: 'legacy_admin' }, { type: 'workspace', relation: 'channels_admin' }, { type: 'workspace', relation: 'member' }, { type: 'workspace', relation: 'guest' }, ], }, }, }, }} skipVersion={true} />

:::info

The configuration snippet above describes a channel that can have the following relations:

  • workspaces related to it as parent_workspace
  • users related to it as writer
  • users related to it as viewer

:::

Implied Relation

There is an that anyone who can write to a channel can also read from it, so the authorization model can be modified to be:

<AuthzModelSnippetViewer configuration={{ schema_version: '1.1', type: 'channel', relations: { parent_workspace: { this: {}, }, writer: { this: {}, }, viewer: { // viewer is the union of the set of users with a direct viewer relation, and the set of users with writer relations union: { child: [ { // a user can be assigned a direct viewer relation, i.e., not implied through another relation this: {}, }, { // a user that is a writer is also implicitly a viewer computedUserset: { relation: 'writer', }, }, ], }, }, }, metadata: { relations: { parent_workspace: { directly_related_user_types: [{ type: 'workspace' }] }, writer: { directly_related_user_types: [ { type: 'user' }, { type: 'workspace', relation: 'legacy_admin' }, { type: 'workspace', relation: 'channels_admin' }, { type: 'workspace', relation: 'member' }, { type: 'workspace', relation: 'guest' }, ], }, viewer: { directly_related_user_types: [ { type: 'user' }, { type: 'workspace', relation: 'legacy_admin' }, { type: 'workspace', relation: 'channels_admin' }, { type: 'workspace', relation: 'member' }, { type: 'workspace', relation: 'guest' }, ], }, }, }, }} skipVersion={true} />

:::info

Note that the channel type definition has been updated to indicate that viewer is the union of:

  • the set of users with a viewer relation to this object
  • the set of users with writer relations to this object

:::

As a result, the authorization model is:

<AuthzModelSnippetViewer configuration={{ schema_version: '1.1', type_definitions: [ { type: 'user', }, { type: 'workspace', relations: { legacy_admin: { this: {}, }, channels_admin: { union: { child: [ { this: {}, }, { computedUserset: { relation: 'legacy_admin', }, }, ], }, }, member: { union: { child: [ { this: {}, }, { computedUserset: { relation: 'channels_admin', }, }, { computedUserset: { relation: 'legacy_admin', }, }, ], }, }, guest: { this: {}, }, }, metadata: { relations: { legacy_admin: { directly_related_user_types: [{ type: 'user' }] }, channels_admin: { directly_related_user_types: [{ type: 'user' }] }, member: { directly_related_user_types: [{ type: 'user' }] }, guest: { directly_related_user_types: [{ type: 'user' }] }, }, }, }, { type: 'channel', relations: { parent_workspace: { this: {}, }, writer: { this: {}, }, viewer: { union: { child: [ { this: {}, }, { computedUserset: { relation: 'writer', }, }, ], }, }, }, metadata: { relations: { parent_workspace: { directly_related_user_types: [{ type: 'workspace' }] }, writer: { directly_related_user_types: [ { type: 'user' }, { type: 'workspace', relation: 'legacy_admin' }, { type: 'workspace', relation: 'channels_admin' }, { type: 'workspace', relation: 'member' }, { type: 'workspace', relation: 'guest' }, ], }, viewer: { directly_related_user_types: [ { type: 'user' }, { type: 'workspace', relation: 'legacy_admin' }, { type: 'workspace', relation: 'channels_admin' }, { type: 'workspace', relation: 'member' }, { type: 'workspace', relation: 'guest' }, ], }, }, }, }, ], }} />

Updating Relationship Tuples

What remains is to add the to indicate the relation between the users, workspace and the channels.

The Sandcastle workspace is a parent workspace of the #general, #marketing-internal and #proj-marketing-campaign channels.

<WriteRequestViewer relationshipTuples={[ { user: 'workspace:sandcastle', relation: 'parent_workspace', object: 'channel:general', }, { user: 'workspace:sandcastle', relation: 'parent_workspace', object: 'channel:marketing_internal', }, { user: 'workspace:sandcastle', relation: 'parent_workspace', object: 'channel:proj_marketing_campaign', }, ]} />

#general Channel

The #general channel is a public channel visible to all the members of the workspace. In , you represent this relation in the form of the following relationship tuple:

<WriteRequestViewer relationshipTuples={[ { _description: 'The set of users related to workspace:sandcastle as member are also related to channel:general as viewer', user: 'workspace:sandcastle#member', relation: 'viewer', object: 'channel:general', }, ]} />

:::info This indicates The set of users related to workspace:sandcastle as member are also related to channel:general as viewer :::

And to indicate that Amy and Emily can write to it:

<WriteRequestViewer relationshipTuples={[ { _description: 'Due to the configuration update you added earlier, writer relation is enough to imply a viewer relation', user: 'user:amy', relation: 'writer', object: 'channel:general', }, { user: 'user:emily', relation: 'writer', object: 'channel:general', }, ]} />

#marketing-internal Channel

The #marketing-internal is visible to only Bob and Emily. They can view and write in it.

<WriteRequestViewer relationshipTuples={[ { user: 'user:bob', relation: 'writer', object: 'channel:marketing_internal', }, { user: 'user:emily', relation: 'writer', object: 'channel:marketing_internal', }, ]} />

#proj-marketing-campaign Channel

The #proj-marketing-campaign is public to all members of the Sandcastle workspace. They can view and write in it.

<WriteRequestViewer relationshipTuples={[ { user: 'workspace:sandcastle#member', relation: 'writer', object: 'channel:proj_marketing_campaign', }, ]} />

David is a guest user who can also view and write to #proj-marketing-campaign

<WriteRequestViewer relationshipTuples={[ { user: 'user:david', relation: 'writer', object: 'channel:proj_marketing_campaign', }, ]} />

Verification

Now that you have added the necessary relationship tuples, you will check to make sure that your configuration is valid.

First, we want to ensure david is not related to channel:general as viewer.

<CheckRequestViewer user={'user:david'} relation={'viewer'} object={'channel:general'} allowed={false} />

David should be related to channel:proj_marketing_campaign as viewer.

<CheckRequestViewer user={'user:david'} relation={'viewer'} object={'channel:proj_marketing_campaign'} allowed={true} />

Repeat this for the following relations

User Object Relation Query Relation?
amy workspace:sandcastle legacy_admin is amy related to workspace:sandcastle as legacy_admin? Yes
amy workspace:sandcastle member is amy related to workspace:sandcastle as member? Yes
amy workspace:sandcastle channels_admin is amy related to workspace:sandcastle as channels_admin? Yes
amy channel:general writer is amy related to channel:general as writer? Yes
amy channel:general viewer is amy related to channel:general as viewer? Yes
amy channel:marketing_internal writer is amy related to channel:marketing_internal as writer? No
amy channel:marketing_internal viewer is amy related to channel:marketing_internal as viewer? No
emily channel:marketing_internal writer is emily related to channel:marketing_internal as writer? Yes
emily channel:marketing_internal viewer is emily related to channel:marketing_internal as viewer? Yes
david workspace:sandcastle guest is david related to workspace:sandcastle as guest? Yes
david workspace:sandcastle member is david related to workspace:sandcastle as member? No
david channel:general viewer is david related to channel:general as viewer? No
david channel:marketing_internal viewer is david related to channel:marketing_internal as viewer? No
david channel:proj_marketing_campaign viewer is david related to channel:proj_marketing_campaign as viewer? Yes

Summary

  • Have a basic understanding of and .
  • Understand how to model authorization for a communication platform like Slack using .

In this tutorial, you:

  • were introduced to and .
  • learned how to build and test an authorization model for a communication platforms like Slack.

Upcoming tutorials will dive deeper into , introducing concepts that will improve on the model you built today, and tackling different permission systems, with other relations and requirements that need to be met.

If you are interested in learning more about Authorization and Role Management at Slack, check out the Okta Fine Grained Authorization (FGA) team's chat with the Slack engineering team.

<iframe style={{ marginTop: 36, borderRadius: 8 }} width="100%" height="500" src={`https://www.youtube-nocookie.com/embed/-iVBsagaK5Y`} frameBorder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowFullScreen />

Exercises For You

  • Try adding more relationship tuples to represent other users and channels being added. Then run queries to make sure that the authorization model remains valid.
  • Update the configuration to model more Slack permissions (workspace owners, Slack orgs), then add the relationship tuples necessary and run some queries to validate your configuration.