So far I have mostly focused on authentication in Web API. At the end of the day you go through all those hoops just to be able to authorize the user after you know who he is.
I am currently toying around with some ideas how to improve authorization, but first things first – let’s have a look what’s built-in.
The most basic authorization check you might want to do is to make sure that a user is at least authenticated. This is achieved by adding an [Authorize] attribute on top of a controller or an action method. There is also the [AllowAnonymous] attribute with which you can exclude certain action methods from the authentication requirement.
If all you care about is that the user is successfully authenticated (or technically speaking his IsAuthenticated property is set to true), decorate the controller with [Authorize] and exclude (if needed) individual action methods with [AllowAnonymous]. This is much better than it used to be before MVC 4 (which was the other way round).
Keep in mind, that being authenticated might not be enough, especially when you are moving to a third party authentication model. This means that someone else does the authentication (maybe your business partner’s IdP or Google et al) and that this third party was able to authenticate the user. This does not necessarily mean that the user is also authorized to use your application (unless you want to create a free service for all Google users ;)). This is were authorization come into play.
Role-based Access Control
ASP.NET Web API is designed to run on both .NET 4.0 and 4.5 – since the least common authorization denominator between the two is roles-based access control, this is what we get out of the box.
There are two ways to do role checks, one is calling Thread.CurrentPrincipal.IsInRole(“foo”) from within your code. Or you decorate controllers and actions with [Authorize(Roles = “foo”)]. Both approaches check if the user is in a role called foo.
Custom Authorization Attribute
If you want more than simple IsAuthenticated or IsInRole checks, you can write your own authorization attribute and implement whatever logic you want. You just need to derive from AuthorizeAttribute and implement the IsAuthorized method.
public class PremiumUsersOnlyAttribute : AuthorizeAttribute
protected override bool IsAuthorized(HttpActionContext context)
IPrincipal client = Thread.CurrentPrincipal;
// custom authorization logic
protected override void HandleUnauthorizedRequest(
// custom response (default is 401)
You would then decorate your controllers/actions with this new attribute.
Note: This code does not work with the RC bits. It will work with RTM (and does already work with the Codeplex bits).
That’s everything there is out of the box in Web API. In the following posts I will explore some fundamental approaches to authorization and how they can be implemented using the Web API extensibility.