In this tutorial, we will show you how to secure your Remix app routes with Cerbos. Cerbos is an open-source policy engine for authorizing access to resources. We gonna walk you through the steps of applying authorization in your Remix app with Cerbos. We will also show you how to use Cerbos to secure your routes and APIs. For more information checkout The Cerbos + Remix showcase on Github
Cerbos is an open-source policy engine for authorizing access to resources. It is designed to be used in microservices and serverless environments. Cerbos is a policy engine that can be used to enforce authorization policies in your application. It is designed to be used in microservices and serverless environments.
When you integrate Cerbos with your Remix app you will enjoy some important advantages in terms of access control, security and the user experience. Those advantages include:
Cerbos enables centralized policy management that allows you to manage access policies from a single central location. This provides various benefits including:
Fine-grained access control in Cerbos is expressed through:
By integrating Cerbos with your Remix application you will be able to build a more secure, user friendly, flexible and scalable application that will serve your ever-evolving needs. Although the precise benefits you enjoy will depend to some extent on the nature of your application, there is no doubt Cerbos will enable it to be more secure, more versatile and more cost-effective.
Authentication is the process of verifying who a user is. It is the process of identifying users if they signed in or not like Clerk , AWS Amplify Authentication and Auth0. However, Cerbos is to handle authorization. Authorization is the process of verifying what a user can access. It is the process of giving permissions to users to access resources. Authentication and authorization are two separate but equally important concepts when it comes to system security. Understanding the difference between them is essential for creating a secure system. Proper configuration of both authentication and authorization is necessary for a secure solution. here's an example that illustrates the difference between authorization and authentication:
Imagine you're at a party and you're trying to get into the VIP section. The bouncer at the door asks you to show your ID before he lets you in. In this scenario, the act of showing your ID is the authentication step, where you're proving your identity to the bouncer. Once the bouncer verifies your ID and confirms that you're on the guest list, he'll allow you to enter the VIP section. This is the authorization step, where the bouncer is granting you access to a restricted area based on your verified identity.
To summarize, authentication is the act of proving your identity, while authorization is the act of granting or denying access to a resource or area based on your authenticated identity. In this example, the bouncer used authentication to verify the guest's identity and authorization to grant them access to the VIP section.
Authorization is a very important part of any application. However, it is not an easy task to implement it. There are many challenges when it comes to authorization. Some of them are:
Routing in Remix is very unique and powerful. Not like most of the other frameworks where you have to define routes in a separate file for each page, Remix does that and more. Remix introduced the nested routes concept. You can split your route into multiple files each is responsible for a smaller section in the page. This makes it easy to manage your routes and also makes it easy to add routes to your application. Also if a route crashes, it will not crash the whole application. It will only crash that route. This makes it easy to develop large applications. This interactive example in the Remix home page explained it very well
In this section, we are going to introduce Cerbos to our Remix application and see how easily it can be used to add an Authorization layer to make our app more secure and flexible, you can connect to Cerbos server in two ways:
But, what is the difference between the two?
The GRPC client is faster and more efficient than the HTTP client. But, the GRPC client is only available in NodeJS. So, if you are using Remix with Deno, you can only use the HTTP client, however both clients are similar and you can use them in the same way.
It's prefered to use the GRPC client, you need to install
the @cerbos/grpc
package.
npm install @cerbos/grpc
Or if your server doesn't support GRPC, use the HTTP client. Install
the @cerbos/http
package.
npm install @cerbos/http
Then, you need to create a client instance. You can do that by importing the client from the package you installed.
import { GRPC } from "@cerbos/grpc";
const cerbos = new GRPC("localhost:3593", { tls: false });
the tls option is set to false because we are using a local server. If you are using a remote server, you need to set it to true.
TLS stands for Transport Layer Security It is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website.
Or if you are using the HTTP client, you need to import it like this: >
import { HTTP } from "@cerbos/http";
const cerbos = new HTTP("http://localhost:3593");
When Remix server receives a request, it prepares the page and then sends it to the client. But, what if you want to check if the user is authenticated and has the correct permission t before sending the page to the client? In Remix we can do so by implementing the loader function.
The first step required to achieve this goal is to create a guard that will throw a 403 Error is the user is unauthenticated.
import { json } from '@remix-run/node';
import { useLoaderData } from '@remix-run/react';
import { cerbos } from '../cerbos';
import { user } from 'MyMockedAuth';
export const loader = async () => {
if (!user) {
return json({ redirect: "/login" }, { status: 403 });
}
return json({ message: "Hello world!" });
};
At this stage, the route will be guarded and just shown to people are are authenticated. This is great for normal pages, but what if you have a specific page that may require further permission, like an Admin dashboard or ensuring sensitive document are just accessible by its author or a super admin. To do so, we are going to add cerbos to handle a layer of authorization:
import { json } from '@remix-run/node';
import { useLoaderData } from '@remix-run/react';
import { cerbos } from '../cerbos';
import { user } from 'MyMockedAuth';
export const loader = async () => {
if (!user) {
return json({ redirect: "/login" }, { status: 403 });
}
const isAuthorizated = await cerbos.isAllowed({
principal: {
id: user.email,
roles: [user.role],
attributes: { tier: user.tier },
},
resource: {
kind: "document",
id: "1",
attributes: { owner: "user@example.com" },
},
action: "view",
});
if (!isAuthorizated) {
return json({ redirect: "/login" }, { status: 403 });
}
return json({ message: "Hello world!" });
};
In the example above, we are using the isAllowed function to check if the user is authenticated or not. The isAllowed function takes an object as an argument. The object has the following properties:
If the user is authenticated, the isAllowed function will return true. If the user is not authenticated, the isAllowed function will return false.
Head over to this Remix Cerbos showcase for an in-depth look at how Cerbos can help you easily manage your application's access control policies!
Remix routing system isn't only capable of building pages, it can also build APIs to use for different apps like mobile apps. You can create an API by creating a route file and exporting a load
function from it. The load
function will be called when the API is called. You can use the json
function to return a JSON response.
For example, if you want to create an API that returns the user's name, you can do that like this:
import { json } from '@remix-run/node';
import { cerbos } from '../cerbos';
export const loader = async () => {
const isAuthorizated = await cerbos.isAllowed({
principal: {
id: "user@example.com",
roles: ["USER"],
attributes: { tier: "PREMIUM" },
},
resource: {
kind: "document",
id: "1",
attributes: { owner: "user@example.com" },
},
action: "view",
});
if (!isAuthorizated) {
return json({ message: "You are not authenticated" }, { status: 403 });
}
return json({ name: "John Doe" });
};
Because Cerbos is a policy engine and it runs on a separate server (mostly), it's hard to debug it. But in this section, we will show you ways to debug Cerbos.
The audit block configures the audit logging settings for the Cerbos instance and is defined in the audit
section of the configuration file. The audit block has the following property:
audit:
enabled: true
to learn more about the audit block, you can read the Cerbos Audit Block Documentation.
You can debug deployed instances by tracing the requests. Cerbos supports distributed tracing to provide insights into application performance and request lifecycle.
Tracing block configures the tracing settings for the Cerbos instance and is defined in the tracing section of the configuration file. The tracing
block has the following properties:
tracing:
serviceName: cerbos
sampleProbability: 0.5
exporter: jaeger
jaeger:
agentEndpoint: "localhost:6831"
Set sampleProbability
to a value between 0.0 and 1.0. Setting the probability to 1.0 makes Cerbos capture tracing information for all requests and setting it to 0.0 disables capturing any traces.
To learn more about the tracing block, you can read the Cerbos Tracing Block Documentation.
In this tutorial, we learned what is Cerbos and how Remix routes work. We also discussed how to use Cerbos with Remix to guard the app’s routes for both pages and APIs, and finally, we learned how to debug the Cerbos server in multiple ways.
Book a free Policy Workshop to discuss your requirements and get your first policy written by the Cerbos team