Database

Custom Claims & Role-based Access Control (RBAC)


Custom Claims are special attributes attached to a user that you can use to control access to portions of your application. For example:

1
{
2
"user_role": "admin",
3
"plan": "TRIAL",
4
"user_level": 100,
5
"group_name": "Super Guild!",
6
"joined_on": "2022-05-20T14:28:18.217Z",
7
"group_manager": false,
8
"items": ["toothpick", "string", "ring"]
9
}

To implement Role-Based Access Control (RBAC) with custom claims, use a Custom Access Token Auth Hook. This hook runs before a token is issued. You can use it to add additional claims to the user's JWT.

This guide uses the Slack Clone example to demonstrate how to add a user_role claim and use it in your Row Level Security (RLS) policies.

Create a table to track user roles and permissions

In this example, you will implement two user roles with specific permissions:

  • moderator: A moderator can delete all messages but not channels.
  • admin: An admin can delete all messages and channels.
1
-- Custom types
2
create type public.app_permission as enum ('channels.delete', 'messages.delete');
3
create type public.app_role as enum ('admin', 'moderator');
4
5
-- USER ROLES
6
create table public.user_roles (
7
id bigint generated by default as identity primary key,
8
user_id uuid references auth.users on delete cascade not null,
9
role app_role not null,
10
unique (user_id, role)
11
);
12
comment on table public.user_roles is 'Application roles for each user.';
13
14
-- ROLE PERMISSIONS
15
create table public.role_permissions (
16
id bigint generated by default as identity primary key,
17
role app_role not null,
18
permission app_permission not null,
19
unique (role, permission)
20
);
21
comment on table public.role_permissions is 'Application permissions for each role.';

You can now manage your roles and permissions in SQL. For example, to add the mentioned roles and permissions from above, run:

1
insert into public.role_permissions (role, permission)
2
values
3
('admin', 'channels.delete'),
4
('admin', 'messages.delete'),
5
('moderator', 'messages.delete');

Create Auth Hook to apply user role

The Custom Access Token Auth Hook runs before a token is issued. You can use it to edit the JWT.

1
-- Create the auth hook function
2
create or replace function public.custom_access_token_hook(event jsonb)
3
returns jsonb
4
language plpgsql
5
stable
6
as $$
7
declare
8
claims jsonb;
9
user_role public.app_role;
10
begin
11
-- Fetch the user role in the user_roles table
12
select role into user_role from public.user_roles where user_id = (event->>'user_id')::uuid;
13
14
claims := event->'claims';
15
16
if user_role is not null then
17
-- Set the claim
18
claims := jsonb_set(claims, '{user_role}', to_jsonb(user_role));
19
else
20
claims := jsonb_set(claims, '{user_role}', 'null');
21
end if;
22
23
-- Update the 'claims' object in the original event
24
event := jsonb_set(event, '{claims}', claims);
25
26
-- Return the modified or original event
27
return event;
28
end;
29
$$;
30
31
grant usage on schema public to supabase_auth_admin;
32
33
grant execute
34
on function public.custom_access_token_hook
35
to supabase_auth_admin;
36
37
revoke execute
38
on function public.custom_access_token_hook
39
from authenticated, anon, public;
40
41
grant all
42
on table public.user_roles
43
to supabase_auth_admin;
44
45
revoke all
46
on table public.user_roles
47
from authenticated, anon, public;
48
49
create policy "Allow auth admin to read user roles" ON public.user_roles
50
as permissive for select
51
to supabase_auth_admin
52
using (true)

Enable the hook

In the dashboard, navigate to Authentication > Hooks (Beta) and select the appropriate Postgres function from the dropdown menu.

When developing locally, follow the local development instructions.

Accessing custom claims in RLS policies

To utilize Role-Based Access Control (RBAC) in Row Level Security (RLS) policies, create an authorize method that reads the user's role from their JWT and checks the role's permissions:

1
create or replace function public.authorize(
2
requested_permission app_permission
3
)
4
returns boolean as $$
5
declare
6
bind_permissions int;
7
user_role public.app_role;
8
begin
9
-- Fetch user role once and store it to reduce number of calls
10
select (auth.jwt() ->> 'user_role')::public.app_role into user_role;
11
12
select count(*)
13
into bind_permissions
14
from public.role_permissions
15
where role_permissions.permission = requested_permission
16
and role_permissions.role = user_role;
17
18
return bind_permissions > 0;
19
end;
20
$$ language plpgsql stable security definer set search_path = '';

You can then use the authorize method within your RLS policies. For example, to enable the desired delete access, you would add the following policies:

1
create policy "Allow authorized delete access" on public.channels for delete to authenticated using ( (SELECT authorize('channels.delete')) );
2
create policy "Allow authorized delete access" on public.messages for delete to authenticated using ( (SELECT authorize('messages.delete')) );

Accessing custom claims in your application

The auth hook will only modify the access token JWT but not the auth response. Therefore, to access the custom claims in your application, e.g. your browser client, or server-side middleware, you will need to decode the access_token JWT on the auth session.

In a JavaScript client application you can for example use the jwt-decode package:

1
import { jwtDecode } from 'jwt-decode'
2
3
const { subscription: authListener } = supabase.auth.onAuthStateChange(async (event, session) => {
4
if (session) {
5
const jwt = jwtDecode(session.access_token)
6
const userRole = jwt.user_role
7
}
8
})

For server-side logic you can use packages like express-jwt, koa-jwt, PyJWT, dart_jsonwebtoken, Microsoft.AspNetCore.Authentication.JwtBearer, etc.

Conclusion

You now have a robust system in place to manage user roles and permissions within your database that automatically propagates to Supabase Auth.

More resources