description | sidebar_label | sidebar_position | keywords | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Learn how to make admin-level and unauthenticated requests to a Hasura DDN instance with a webhook. |
Admin and Unauthenticated Requests |
3 |
|
Hasura DDN projects enable an admin
role by default which has access to all Models and Types in your supergraph.
To make an admin-level request, after updating up your AuthConfig, shape your webhook's response as follows:
HTTP/1.1 200 OK
Content-Type: application/json
{
"X-Hasura-Role": "admin",
}
Any request that triggers this response from your webhook will be treated as an admin
request.
:::info Your JWT claims should be unique for each role
When designing or implementing an auth server, it is crucial to generate JWTs with different claims for each user role so that each token enables the appropriate data access permissions for that user.
:::
To make an unauthenticated request (i.e., one that is publicly accessible without any authentication), you'll need to do a few things.
In your authentication server, you can provide a response that identifies the user's role as public
. This can be any
role name you wish, so long as it's not a role (such as admin
) that already exists.
HTTP/1.1 200 OK
Content-Type: application/json
{
"X-Hasura-Role": "public",
}
For whatever models you'd like to publicly expose, add a
ModelPermissions
rule for the
public role.
kind: ModelPermissions
version: v1
definition:
modelName: Events
permissions:
- role: admin
select:
filter: null
#highlight-start
- role: public
select:
filter: null
#highlight-end
Then, determine which types you'd like to publicly expose by updating TypePermissions. Hasura DDN gives you the ability to granularly determine which fields from each Model are available to each role.
kind: TypePermissions
version: v1
definition:
typeName: Events
permissions:
- role: admin
output:
allowedFields:
- id
- owner_id
- created_at
- updated_at
- is_live
- title
- date
- description
#highlight-start
- role: public
output:
allowedFields:
- id
- is_live
- title
- date
- description
#highlight-end
Once you've updated your metadata files, you can rebuild your supergraph and test it locally.
ddn supergraph build local
Now you can make an unauthenticated request to your API. The request response body will include
{"x-hasura-role": "public"}
and as such the engine will limit access to the fields that are returned to the ones
specified in the TypePermissions
for that role.