See the presentation deck here
See the PR for additional info + preview updated docs
NOTE: See the end of this document for notes on usage with Azure AD (for non-B2C tenants)
- Azure account with subscription
- Azure functions core tools installed (VSCode with Azure Functions extension recommended)
- Heroku account
- Clone this repo!
$ git clone https://github.com/allpwrfulroot/hasura-with-azure.git
- Create your Heroku app
$ heroku create <my-app-name> --stack=container
$ heroku addons:create heroku-postgresql:hobby-dev -a <my-app-name>
- Add Heroku as git remote
$ git remote add heroku https://git.heroku.com/<my-app-name>.git
$ git push heroku master
- Add the "users" table to your new Hasura project with fields id, azure_id, and role.
-
Make a few fake users and check that your users query works as expected
-
Add "user" permissions, limiting access to non-admin queries to only those authenticated users who have session variable
x-hasura-user-id
that matches the user's id
- Go to your new Heroku project and set the environment variable
HASURA_GRAPHQL_ADMIN_SECRET
(under Settings -> Config Vars). You'll then have to use this admin secret to regain access to the Console
- Create a directory for your new Azure functions project and initialize it. You'll be taken through a couple of setup questions: in this demo, we've selected "node" and "JavaScript"
$ mkdir <functions-directory-name>
$ cd <functions-directory-name>
$ func init .
- Create your first function! Again, you'll be asked a couple of questions: here we selected "HTTP trigger" and named our function "getHasuraInfo". Check to see that it all works locally, but then you can stop the server.
$ func new
$ npm install
$ func start
-
For the moment, we'll keep things very simple. Just hard-code your custom claims into the response body; we'll add the business logic later. Check again that it still works locally.
-
Deploy! (This article is helpful for setting up VSCode and deploying via the VSCode Azure Functions extension.) Get the function endpoint with code included
- Set up an Azure AD B2C tenant according to the docs
-
At the 'Grant admin consent for (your tenant name)' step, you can grant by clicking the ". . ." button next to "Add a permission"
-
When setting up your app, add
https://jwt.ms
as a Web Redirect URI. This is a useful tool for checking Azure JWT's
- Set up the B2C tenant for custom claims according to the docs
- This demo skips the Facebook social login
- This step is just setup of the custom claims flow; we will add the actual custom fields in the next step
- Navigate back to Identity Experience Framework dashboard
- Scroll down to see the list of custom policies, select "B2C_1A_signup_signin"
- Select
https://jwt.ms
as the reply url - Run! Sign up and see that a new user is created and a valid JWT provided
- Follow the instructions from this tutorial to modify your custom policies with custom claims
- See the demo custom policy files in this repo
- Use the static-response version of your Azure function for now
-
Test with "B2C_1A_signup_signin" again to verify that you're getting a valid JWT with the expected (static, fake) claims
-
Update and re-deploy your Azure function with the actual business logic to provide the desired claims response. See 'getHasuraInfo.js' in this repo for an example that checks for an existing Hasura user with that Azure ID, creates a new one if Azure ID not found, and returns the role + user ID to be provided in the final claim.
- Set up environment variables locally in
local.settings.json
under "values". Add the environment variables for prod via the Azure Portal: go to your Functions App, navigate to 'Configuration' (under 'Settings'), and add your environment variables as new application settings. Don't forget to save! - Check again that everything still starts locally as a sanity check before re-deploying the function
- Test again with "B2C_1A_signup_signin" again to verify that you're getting a valid JWT with the expected claims and that a user is created in Hasura
- Add the HASURA_GRAPHQL_JWT_SECRET environment variable to your Heroku app (under Settings -> Config Vars). The example from this repo:
{"jwk_url":"https://<mytenant>.b2clogin.com/<mytenant>.onmicrosoft.com/discovery/v2.0/keys?p=b2c_1a_signup_signin","claims_map":{"x-hasura-allowed-roles":["user","admin"],"x-hasura-default-role":{"path":"$.extension_hasura_role"},"x-hasura-user-id":{"path":"$.extension_hasura_id"}}}
-
Log in with "B2C_1A_signup_signin" again and check that the JWT now includes your custom claims. Copy the token
-
Use the token via an Authorization header in the graphiql playground in the Hasura console. Check that you can query for users and get back only the one whose user ID matches the one in the token!
With Azure AD, you'll probably have a tenant with set users and groups (no arbitrary sign-ups). With this context, it'll probably make the most sense to
- Export the existing users from your Azure AD tenant
- Bulk import the user data into a
users
table in Hasura with the Azure AD objectId (idToken claim:oid
) as the user id. Roles could be created from group id's or separately.
Here is an example of JWT token claims (with group id's included):
And here's an example of the JWT secret with the claims_map added:
{
"jwk_url": "https://login.windows.net/common/discovery/keys",
"claims_map": {
"x-hasura-allowed-roles": { "path": "$.groups" },
"x-hasura-default-role": { "path": "$.groups[0]" },
"x-hasura-user-id": { "path": "$.oid" }
}
}
This maps the token's oid
(Azure AD user id) and groups
as Hasura user id's and roles, respectively. With this, you could do interesting permissions configurations such as per-group (now 'role') access controls.
How to automatically update new/updated user info to your Postgres database, and how to architect key Hasura session variables like roles, group or team ID's, etc. is up to you!