Meet Access, a centralized portal for employees to transparently discover, request, and manage their access for all internal systems needed to do their jobs. If you're interested in the project, come chat with us!
The access service exists to help answer the following questions for each persona:
- All Users
- What do I have access to?
- What does a teammate have access to that I don’t?
- What groups and roles are available?
- Can I get access?
- Team Leads
- How do I give access to a new team member easily?
- How do I give temporary access to an individual for a cross-functional effort?
- Which roles do I administer?
- How can I create, merge, or split a role based on a team re-org?
- Application Owners
- Who has access to my application?
- How do I setup access for a new application?
- How do I create a new access group for my application?
- How do I give a role access to one of my application's groups?
Access is a React and Typescript single-page application (SPA) with a Flask API that connects to the Okta API.
You'll need an Okta API Token from an Okta user with the Group Admin
and Application Admin
Okta administrator roles granted as well as all Group permissions (ie. Manage groups
checkbox checked)
in a custom Admin role. If you want to manage Groups which grant Okta Admin permissions, then the Okta API
Token will need to be created from an Okta user with the Super Admin
Okta administrator role.
Create a .env
file in the repo root with the following variables:
CURRENT_OKTA_USER_EMAIL=<YOUR_OKTA_USER_EMAIL>
OKTA_DOMAIN=<YOUR_OKTA_DOMAIN> # For example, "mydomain.oktapreview.com"
OKTA_API_TOKEN=<YOUR_SANDBOX_API_TOKEN>
DATABASE_URI="sqlite:///access.db"
CLIENT_ORIGIN_URL=http://localhost:3000
REACT_APP_API_SERVER_URL=http://localhost:6060
Next, run the following commands to set up your python virtual environment. Access can be run with Python 3.11 and above:
python3 -m venv venv
. venv/bin/activate
pip install -r requirements.txt
Afterwards, seed the db:
flask db upgrade
flask init <YOUR_OKTA_USER_EMAIL>
Finally, you can run the server:
flask run
Go to http://localhost:6060/api/users/ to view the API.
In a separate window, setup and run nodejs:
npm install
npm start
Go to http://localhost:3000/ to view the React SPA.
We use openapi-codegen to generate a Typescript React-Query v4 API Fetch Client based on our Swagger API schema available at http://localhost:6060/api/swagger.json. We've modified that generated Swagger schema in api/swagger.json, which is then used in openapi-codegen.config.ts by the following commands:
npm install @openapi-codegen/cli
npm install @openapi-codegen/typescript
npm install --only=dev
npx openapi-codegen gen api
We use tox to run our tests, which should be installed into the python venv from
our requirements.txt
.
Invoke the tests using tox -e test
.
Run tox -e ruff
and tox -e mypy
to run the linters.
Create a .env.production
file in the repo root with the following variables. Access supports running against PostgreSQL 14 and above.
OKTA_DOMAIN=<YOUR_OKTA_DOMAIN> # For example, "mydomain.okta.com"
OKTA_API_TOKEN=<YOUR_OKTA_API_TOKEN>
DATABASE_URI=<YOUR_DATABASE_URI> # For example, "postgresql+pg8000://postgres:postgres@localhost:5432/access"
CLIENT_ORIGIN_URL=http://localhost:3000
REACT_APP_API_SERVER_URL=""
FLASK_SENTRY_DSN=https://<key>@sentry.io/<project>
REACT_SENTRY_DSN=https://<key>@sentry.io/<project>
If you want to use the CloudSQL Python Connector, set the following variables in your .env.production
file:
CLOUDSQL_CONNECTION_NAME=<YOUR_CLOUDSQL_CONNECTION_NAME> # For example, "project:region:instance-name"
DATABASE_URI="postgresql+pg8000://"
DATABASE_USER=<YOUR_DATABASE_USER> # For a service account, this is the service account's email without the .gserviceaccount.com domain suffix.
DATABASE_NAME=<YOUR_DATABASE_NAME>
DATABASE_USES_PUBLIC_IP=[True|False]
Authentication is required when running Access in production. Currently, we support OpenID Connect (OIDC) (including Okta) and Cloudflare Access as methods to authenticate users to Access.
To use OpenID Connect (OIDC) authentication, such as with Okta:
Go to your Okta Admin dashboard -> Applications -> Create App Integration.
In the Create a new app integration, select:
- Sign-in method:
OIDC - OpenID Connect
- Application type:
Web Application
Then on the New Web App Integration page:
- App integration name:
Access
- Logo: (optional)
- Grant type:
- Client acting on behalf of user:
Authorization Code
- Client acting on behalf of user:
- Sign-in redirect URIs:
https://<YOUR_ACCESS_DEPLOYMENT_DOMAIN_NAME>/oidc/authorize
- Sign-out redirect URIs:
https://<YOUR_ACCESS_DEPLOYMENT_DOMAIN_NAME>/oidc/logout
Then click Save
and go to the General tab of the new app integration to find
the Client ID
and Client secret
. You'll need these for the next step.
Create a client_secrets.json
file containing your OIDC client secrets, that looks something like the following:
{
"secrets": {
"client_id":"<YOUR_OKTA_APPLICATION_CLIENT_ID>",
"client_secret":"<YOUR_OKTA_APPLICATION_CLIENT_SECRET>",
"issuer": "https://<YOUR_OKTA_INSTANCE>.okta.com/"
}
}
Then set the following variables in your .env.production
file:
# Generate a good secret key using `python -c 'import secrets; print(secrets.token_hex())'`
# this is used to encrypt Flask cookies
SECRET_KEY=<YOUR_SECRET_KEY>
# The path to your client_secrets.json file or if you prefer, inline the entire JSON string
OIDC_CLIENT_SECRETS=./client_secrets.json or '{"secrets":..'
To use Cloudflare Access authentication, set up a
Self-Hosted Cloudflare Access Application
using a Cloudflare Tunnel. Next, set the following variables in your .env.production
file:
# Your Cloudflare "Team domain" under Zero Trust -> Settings -> Custom Pages in the Cloudflare dashboard
# For example, "mydomain.cloudflareaccess.com"
CLOUDFLARE_TEAM_DOMAIN=<CLOUDFLARE_ACCESS_TEAM_DOMAIN>
# Your Cloudflare "Audience" tag under Zero Trust -> Access -> Applications -> <Your Application> -> Overview in the Cloudflare dashboard
# found under "Application Audience (AUD) Tag"
CLOUDFLARE_APPLICATION_AUDIENCE=<CLOUFLARE_ACCESS_AUDIENCE_TAG>
Build the Docker image:
docker build -t access .
Or build and run it using Docker Compose:
docker compose up --build
The command above will build and run the container.
Go to http://localhost:3000/ to view the application.
Before launching the container with Docker, make sure to configure .env.psql
and .env.production
:
The .env.psql
file is where you configure the PostgreSQL server credentials, which is also Dockerized.
POSTGRES_USER
: Specifies the username for the PostgreSQL server.POSTGRES_PASSWORD
: Specifies the password for the PostgreSQL server.
The .env.production
file is where you configure the application.
OKTA_DOMAIN
: Specifies the Okta domain to use.OKTA_API_TOKEN
: Specifies the Okta API Token to use.DATABASE_URI
: Specifies the Database connection URI. Example:postgresql+pg8000://<POSTGRES_USER>:<POSTGRES_PASSWORD>@postgres:5432/<DB_NAME>
.CLIENT_ORIGIN_URL
: Specifies the origin URL which is used by CORS.REACT_APP_API_SERVER_URL
: Specifies the API base URL which is used by the frontend. Set to an empty string "" to use the same URL as the frontend.FLASK_SENTRY_DSN
: See the Sentry documentation. [OPTIONAL] You can safely remove this from your env fileREACT_SENTRY_DSN
: See the Sentry documentation. [OPTIONAL] You can safely remove this from your env fileCLOUDFLARE_TEAM_DOMAIN
: Specifies the Team Domain used by Cloudflare Access.CLOUDFLARE_APPLICATION_AUDIENCE
: Specifies the Audience Tag used by Cloudflare Access.SECRET_KEY
: Specifies the secret key used to encrypt flask cookies. WARNING: Ensure this is something secure you can generate a good secret key usingpython -c 'import secrets; print(secrets.token_hex())'
.OIDC_CLIENT_SECRETS
: Specifies the path to your client_secrets.json file or if you prefer, inline the entire JSON string.
Check out .env.psql.example
or .env.production.example
for an example configuration file structure.
NOTE:
If you are using Cloudflare Access, ensure that you configure CLOUDFLARE_TEAM_DOMAIN
and CLOUDFLARE_APPLICATION_AUDIENCE
. SECRET_KEY
and OIDC_CLIENT_SECRETS
do not need to be set and can be removed from your env file.
Else, if you are using a generic OIDC identity provider (such as Okta), then you should configure SECRET_KEY
and OIDC_CLIENT_SECRETS
. CLOUDFLARE_TEAM_DOMAIN
and CLOUDFLARE_APPLICATION_AUDIENCE
do not need to be set and can be removed from your env file. Make sure to also mount your client-secrets.json
file to the container if you don't have it inline.
After docker compose up --build
, you can run the following commands to setup the database:
Create the database in the postgres container:
docker compose exec postgres createdb -U <POSTGRES_USER> <DB_NAME>
Run the initial migrations and seed the initial data from Okta:
docker compose exec discord-access /bin/bash
Then run the following commands inside the container:
flask db upgrade
flask init <YOUR_OKTA_USER_EMAIL>
Visit http://localhost:3000/ to view your running version of Access!
As Access is a web application packaged with Docker, it can easily be deployed to a Kubernetes cluster. We've included example Kubernetes yaml objects you can use to deploy Access in the examples/kubernetes directory.
These examples include a Deployment, Service, Namespace, and Service Account object for serving the stateless web application. Additionally there are examples for deploying the flask sync
and flask notify
commands as cronjobs to periodically synchronize users, groups, and their memberships and send expiring access notifications respectively.
Access uses the Python pluggy framework to allow for new functionality to be added to the system. Plugins are Python packages that are installed into the Access Docker container. For example, a notification plugin could add a new type of notification such as Email, SMS, or a Discord message for when new access requests are made and resolved.
Plugins in Access follow the conventions defined by the Python pluggy framework.
An example implementation of a notification plugin is included in examples/plugins/notifications, which can be extended to send messages using custom Python code. It implements the NotificationPluginSpec
found in notifications.py
There's also an example implementation of a conditional access plugin in examples/plugins/conditional_access, which can be extended to conditionally approve or deny requests. It implements the ConditionalAccessPluginSpec
found in requests.py.
Below is an example Dockerfile that would install the example notification plugin into the Access Docker container, which was built above using the top-level application Dockerfile. The plugin is installed into the /app/plugins
directory and then installed using pip.
FROM access:latest
WORKDIR /app/plugins
ADD ./examples/plugins/ ./
RUN pip install ./notifications
WORKDIR /app
Here are some of the features we're potentially planning to add to Access:
- A Group Lifecycle and User Lifecycle plugin framework
- Support for Google Groups and Github Teams via Group Lifecycle plugins
- Group (and Role) creation requests
- Role membership requests, so Role owners can request to add their Role to a Group
- OktaApp model with many-to-many relationship to App for automatically assigning AppGroups to Okta application tiles
- A webhook to synchronize group memberships and disabling users in real-time from Okta
Copyright (C) 2024 Discord Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
For code dependencies, libraries, and frameworks used by this project that are dual-licensed or allow the option under their terms to select either the Apache Version 2.0 License, MIT License, or BSD 3-Clause License, this project selects those licenses for use of those dependencies in that order of preference.