Meet Access, a centralized portal for employees to transparently discover, request, and manage their access for all internal systems needed to do their jobs.
The access service exists to help answer the following questions for each persona:
- All Users
- What do I have access to?
- What does a teammate have access to that I don’t?
- What groups and roles are available?
- Can I get access?
- Team Leads
- How do I give access to a new team member easily?
- How do I give temporary access to an individual for a cross-functional effort?
- Which roles do I administer?
- How can I create, merge, or split a role based on a team re-org?
- Application Owners
- Who has access to my application?
- How do I setup access for a new application?
- Which do I create a new access group for my application?
- How do I give access to a role to one of my application's groups?
Access is a React+Typescript single-page application (SPA) with a Flask API that connects to the Okta API
You'll need an Okta API Token from an Okta user with the Group Admin
and Application Admin
Okta administrator roles granted as well as all Group permissions (ie. Manage groups
checkbox checked)
in a custom Admin role. If you want to manage Groups which grant Okta Admin permissions, then the Okta API
Token will need to be created from an Okta user with the Super Admin
Okta administrator role.
Create a .env
file in the repo root with the following variables
CURRENT_OKTA_USER_EMAIL=<YOUR_OKTA_USER_EMAIL>
OKTA_DOMAIN=<YOUR_OKTA_DOMAIN> # For example, "mydomain.oktapreview.com"
OKTA_API_TOKEN=<YOUR_SANDBOX_API_TOKEN>
DATABASE_URI="sqlite:///access.db"
CLIENT_ORIGIN_URL=http://localhost:3000
REACT_APP_API_SERVER_URL=http://localhost:6060
Then run the following commands to set up your python virtual environment:
python3.11 -m venv venv
. venv/bin/activate
pip install -r requirements.txt
Afterwards, seed the db:
flask db upgrade
flask init <YOUR_OKTA_USER_EMAIL>
Finally, you can run the server:
flask run
Go to http://localhost:6060/api/users/ to view the API
In a separate window setup and run node
npm install
npm start
Go to http://localhost:3000/ to view the React SPA
We use openapi-codegen to generate a Typescript React-Query v4 API Fetch Client based on our Swagger API schema available at http://localhost:6060/api/swagger.json. We've modified that generated Swagger schema in api/swagger.json which is then used in openapi-codegen.config.ts by the following commands.
npm install @openapi-codegen/cli
npm install @openapi-codegen/typescript
npm install --only=dev
npx openapi-codegen gen api
We use tox to run our tests, which should be installed into the python venv from
our requirements.txt
Invoke the tests using tox -e test
and tox -e lint
to run the linter
Create a .env-production
file in the repo root with the following variables
OKTA_DOMAIN=<YOUR_OKTA_DOMAIN> # For example, "mydomain.okta.com"
OKTA_API_TOKEN=<YOUR_OKTA_API_TOKEN>
DATABASE_URI=<YOUR_DATABASE_URI> # For example, "postgresql+pg8000://wumpus:hunter2@localhost:5432/access"
CLIENT_ORIGIN_URL=http://localhost:3000
REACT_APP_API_SERVER_URL=http://localhost:3000
FLASK_SENTRY_DSN=https://<key>@sentry.io/<project>
REACT_SENTRY_DSN=https://<key>@sentry.io/<project>
If you want to use the CloudSQL Python Connector, set the following variables in your .env-production
file
CLOUDSQL_CONNECTION_NAME=<YOUR_CLOUDSQL_CONNECTION_NAME> # For example, "project:region:instance-name"
DATABASE_URI="postgresql+pg8000://"
DATABASE_USER=<YOUR_DATABASE_USER> # For a service account, this is the service account's email without the .gserviceaccount.com domain suffix.
DATABASE_NAME=<YOUR_DATABASE_NAME>
DATABASE_USES_PUBLIC_IP=[True|False]
Authentication is required when running Access in production. Currently, we support OpenID Connect (OIDC) (including Okta) and Cloudflare Access as methods to authenticate users to Access.
To use OpenID Connect (OIDC) authentication, such as with Okta:
Go to your Okta Admin dashboard -> Applications -> Create App Integration
In the Create a new app integration, select
- Sign-in method:
OIDC - OpenID Connect
- Application type:
Web Application
Then on the New Web App Integration page:
- App integration name:
Access
- Logo: (optional)
- Grant type:
- Client acting on behalf of user:
Authorization Code
- Client acting on behalf of user:
- Sign-in redirect URIs:
https://<YOUR_ACCESS_DEPLOYMENT_DOMAIN_NAME>/oidc/authorize
- Sign-out redirect URIs:
https://<YOUR_ACCESS_DEPLOYMENT_DOMAIN_NAME>/oidc/logout
Then click Save
and go to the General tab of the new app integration to find
the Client ID
and Client secret
, you'll need these for the next step.
Create a client_secrets.json
file containing your OIDC client secrets, that looks something like the following
{
"secrets": {
"client_id":"<YOUR_OKTA_APPLICATION_CLIENT_ID>",
"client_secret":"<YOUR_OKTA_APPLICATION_CLIENT_SECRET>",
"issuer": "https://<YOUR_OKTA_INSTANCE>.okta.com/"
}
}
Then set the following variables in your .env-production
file
# Generate a good secret key using `python -c 'import secrets; print(secrets.token_hex())'`
# this is used to encrypt Flask cookies
SECRET_KEY=<YOUR_SECRET_KEY>
# The path to your client_secrets.json file or if you prefer, inline the entire JSON string
OIDC_CLIENT_SECRETS=./client_secrets.json or '{"secrets":..'
To use Cloudflare Access authentication, set up a
Self-Hosted Cloudflare Access Application
using a Cloudflare Tunnel. Then set the following variables in your .env-production
file
# Your Cloudflare "Team domain" under Zero Trust -> Settings -> Custom Pages in the Cloudflare dashboard
# For example, "mydomain.cloudflareaccess.com"
CLOUDFLARE_TEAM_DOMAIN=<CLOUDFLARE_ACCESS_TEAM_DOMAIN>
# Your Cloudflare "Audience" tag under Zero Trust -> Access -> Applications -> <Your Application> -> Overview in the Cloudflare dashboard
# found under "Application Audience (AUD) Tag"
CLOUDFLARE_APPLICATION_AUDIENCE=<CLOUFLARE_ACCESS_AUDIENCE_TAG>
Build the Docker image
docker build -t access .
Run it using your .env-production
variables
docker run --rm --env-file .env-production -p 3000:3000 access
Go to http://localhost:3000/ to view it
As Access is a web application packaged with Docker, it can easily be deployed to a Kubernetes cluster. We've included example Kubernetes yaml objects you can use to deploy Access in the examples/kubernetes directory.
These examples include a Deployment, Service, Namespace, Service Account object for serving the stateless web application. Additionally there are examples for deploying the flask sync
and flask notify
commands as cronjobs to periodically synchronize users, groups, and their memberships and send expiring access notifications respectively.
Access uses the Python pluggy framework to allow for new functionality to be added to the system. Plugins are Python packages that are installed into the Access Docker container. For example, a notification plugin could add a new type of notification such as Email, SMS, or a Discord message for when new access requests are made and resolved.
An example implementation of a notification plugin is included in examples/plugins/notifications which can be extended to send messages using custom Python code. It implements the NotificationPluginSpec
found in notifications.py following the conventions defined by the Python pluggy framework.
Below is an example Dockerfile that would install that example notification plugin into the Access Docker container which was built above using the top-level application Dockerfile. The plugin is installed into the /app/plugins
directory and then installed using pip.
FROM access:latest
WORKDIR /app/plugins
ADD ./examples/plugins/ ./
RUN pip install ./notifications
WORKDIR /app
Here are some of the features we're potentially planning to add to Access:
- A Group Lifecycle and User Lifecycle plugin framework
- Support for Google Groups and Github Teams via Group Lifecycle plugins
- Group (and Role) creation requests
- Role membership requests, so Role owners can request to add their Role to a Group
- OktaApp model with many-to-many relationship to App for automatically assigning AppGroups to Okta application tiles
- A webhook to synchronize group memberships and disabling users in real-time from Okta
Copyright (C) 2024 Discord Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
For code dependencies, libraries, and frameworks used by this project that are dual-licensed or allow the option under their terms to select either the Apache Version 2.0 License, MIT License, or BSD 3-Clause License, this project selects those licenses for use of those dependencies in that order of preference.