Skip to main content

0022 - Authorization

ID:ADR-0022
Status:ACCEPTED
Published:2024-07-22

Context and Problem Statement

Authorization logic decides whether a user is permitted to carry out an action. Our current authorization logic is dispersed throughout different layers of our server codebase and follows different patterns, some of which are no longer suitable for our changing permissions structures.

We should decide on a single, consistent solution to how we manage authorization in our applications. This is primarily concerned with the main Bitwarden server and client code (including Password Manager, Admin Console and Provider Portal) but could be extended to other products.

Terminology

  • Authentication is the process of verifying a user's identity. ("Who are you?") It tells you who they are, but not what they can do.
  • Authorization is the process of determining who can access or modify a resource. ("Are you allowed to do this?") It may or may not require authentication.
  • Validation is the process of determining whether a request is valid according to business logic. ("Can this be done?") Unlike authorization, it usually does not depend on the user's identity (authentication) or permissions (authorization). For example, a vault item cannot be restored unless it has first been (soft) deleted.
  • Resources are data on the server that a user may try to access or modify - such as a vault item, organization, collection, or group.
  • User verification is a Bitwarden-specific UI flow aimed at re-establishing a user's identity before they perform a sensitive action. e.g. entering your password again before viewing an api key. This is an aspect of authentication, because it relates to verifying the user's identity.

Current patterns

To date, we have broadly used the following authorization patterns:

  • In the individual user context, we match the user ID in the JWT to the resource being accessed. This is usually a one-to-one match (e.g. the JWT user ID should match the cipher user ID) without additional requirements.
  • In organizational contexts, we use role-based authorization, where the user is assigned a role in an organization and permission is granted or denied based on that role. This closely tracks how access control is presented to the user. However, the expansion of collections has complicated this simple model, and it now looks more like attribute-based access control.

This logic is spread throughout controllers in the API layer, JWT claims accessed via CurrentContext, the core service layer, and database queries.

Requirements

Our authorization requirements have increased in complexity, particularly with the release of collection management enhancements. Today, the outcome of an authorization decision relevant to an organization resource could depend on the user's role, their collection relationships, organization settings, provider relationships, and other factors.

A solution to this problem should:

  • Separate authorization logic from other concerns.
  • Centralize authorization logic in a single location or pattern as much as possible.
  • Separate authorization logic from authorization checks/enforcement.
  • Be reusable between endpoints that access the same resource.
  • Support a range of authorization logic (e.g. based on role, resource, relationships, etc.).

Considered Options

ASP.NET Core resource-based authorization

Summary

Resource-based authorization makes authorization decisions based on the resource being accessed, the user accessing the resource, and the operations (actions) they wish to take on the resource.

To define authorization logic, developers implement one or more IAuthorizationHandler classes for the resource being accessed.

Authorization checks are handled by the default implementation of IAuthorizationService, which calls each authorization handler for the resource to find at least 1 that will authorize the action.

Advantages

  • Included in ASP.NET - standard C# code, no additional dependencies.
  • Already used by Secrets Manager and for some collection operations in Password Manager.
  • Handlers provide good encapsulation of authorization logic, separate to other concerns and the AuthorizationService implementation itself.
  • The fixed AuthorizationService interface enforces a consistent usage across our teams.
  • Teams can write and have code ownership over their own authorization handlers.
  • Flexibly supports additional sources of authorization (e.g. scoped user API keys) by defining additional handlers.

Disadvantages

  • The interface works well for specific resources, but less well for bulk read operations (e.g. reading all items the user has access to). Bulk read operations are likely to duplicate some of the authorization logic in another class or database query.
  • Server-side solution only - client code needs to maintain its own logic to enable/disable UI flows (although given the offline requirements of our clients, this is difficult to avoid).
  • We need to be mindful of database calls within authorization handlers, as they may be called in a loop for each resource being authorized.

Third-party solution

Including but not limited to:

Each has its own domain-specific language (DSL) used to define authorization rules as well as a storage layer to store access information about the users and objects in the application. The storage is generally a separate database to the Bitwarden database and must be kept up-to-date with users' roles and relationships in Bitwarden.

Advantages

  • The DSLs appear to be a flexible and robust way to define an authorization model.
  • Support for complex permission structures.
  • Reduces load on the Bitwarden database, designed for high performance.
  • Single source of truth, strongly separated from our application logic.

Disadvantages

  • Vendor lock-in for a core part of our architecture.
  • New concepts and a DSL unfamiliar to most developers - would probably require a single team to become experts in this and maintain it for all teams, which does not work well with our team structure.
  • Very costly to implement in terms of engineering resources, particularly for developers, BRE and SRE.
  • Risk of the authorization data store becoming out of step with the main Bitwarden database.
  • May be over-engineered for our current requirements and scale.

Custom solution

We could develop our own custom solution from scratch, however we have not identified any clear advantage over choosing an existing solution above.

Decision Outcome

Chosen option: ASP.NET Core resource-based authorization.

Positive Consequences

  • Lowest cost/effort implementation.
  • Fits team structure.
  • Existing code can be refactored incrementally.

Negative Consequences

  • Some duplication of read logic between discrete reads and bulk reads.

Plan