An example application of integrating Cerbos with an Express server using Auth0 for authentication.
- Node.js
- Docker for running the Cerbos Policy Decision Point (PDP)
- An Auth0 account if you want to use your own
- Start up the Cerbos PDP instance docker container. This will be called by the express app to check authorization.
cd cerbos
./start.sh
- Install node dependencies
npm install
- Start the express server
node index.js
By default any roles set up in the Auth0 console are not passed through in the authentication token. To enable this, add the following rule to the Auth Pipeline in your Auth0 account.
function (user, context, callback) {
const namespace = 'https://cerbos.cloud';
const assignedRoles = (context.authorization || {}).roles;
let idTokenClaims = context.idToken || {};
let accessTokenClaims = context.accessToken || {};
idTokenClaims[`${namespace}/roles`] = assignedRoles;
accessTokenClaims[`${namespace}/roles`] = assignedRoles;
context.idToken = idTokenClaims;
context.accessToken = accessTokenClaims;
callback(null, user, context);
}
This example has a simple CRUD policy in place for a resource kind of contact
- like a CRM system would have. The policy file can be found in the cerbos/policies
folder here.
Should you wish to experiment with this policy, you can try it in the Cerbos Playground.
The policy expects one of two roles to be set on the principal - admin
and user
. These roles are authorized as follows:
Action | User | Admin |
---|---|---|
list | Y | Y |
read | Y | Y |
create | Y | Y |
update | If owner | Y |
delete | If owner | Y |