Check Access Control
In Permify, you can perform two different types access checks,
- resource based authorization checks, structured in the following form:
Can user U perform action Y in resource Z ?
- subject based authorization checks, structured in the following form:
Which resources can user U edit ?
In this section we’ll look at the resource based check request of Permify.
You can find subject based access checks in Entity (Data) Filtering section.
Content
- Example Check Requests
- How Access Decisions Evaluated?
- Latency & Performance
- Parameters & Properties
Example Check requests
Resource Based Check (Relationships)
Attribute Based (ABAC) Check With Context Data
How Access Decisions Evaluated?
Access decisions are evaluated by stored relational tuples and your authorization model, Permify Schema.
In high level, access of an subject related with the relationships or attributes created between the subject and the resource. You can define this data in Permify Schema then create and store them as relational tuples and attributes, which is basically forms your authorization data.
Permify Engine to compute access decision in 2 steps,
- Looking up authorization model for finding the given action’s ( edit, push, delete etc.) relations.
- Walk over a graph of each relation to find whether given subject ( user or user set ) is related with the action.
Let’s turn back to above authorization question ( “Can the user 3 edit document 12 ?” ) to better understand how decision evaluation works.
When Permify Engine receives this question it directly looks up to authorization model to find document edit
action. Let’s say we have a model as follows
Which has a directed graph as follows:
As we can see above: only users with an admin role in an organization, which document:12
belongs, and owners of the document:12
can edit. Permify runs two concurrent queries for parent.admin and owner:
Q1: Get the owners of the document:12
.
Q2: Get admins of the organization where document:12
belongs to.
Since edit action consist or between owner and parent.admin, if Permify Engine found user:3 in results of one of these queries then it terminates the other ongoing queries and returns authorized true to the client.
Rather than or, if we had an and relation then Permify Engine waits the results of these queries to returning a decision.
Latency & Performance
With the right architecture we expect 7-12 ms latency. Depending on your load, cache usage and architecture you can get up to 30ms.
Permify implements several cache mechanisms in order to achieve low latency in scaled distributed systems. See more on the section Cache Mechanisims
Parameters & Properties
Path Parameters
Identifier of the tenant, if you are not using multi-tenancy (have only one tenant) use pre-inserted tenant <code>t1</code> for this field. Required, and must match the pattern \“[a-zA-Z0-9-,]+\“, max 64 bytes.
Body
PermissionCheckRequest is the request message for the Check method in the Permission service.
Response
PermissionCheckResponse is the response message for the Check method in the Permission service.