Authorization in Azure Functions is impaired by an issue with Azure Static Web Apps linked to Azure Functions. Azure AD app role claims are not supplied to Azure Functions. This post will demonstrate a workaround.
Updated 28th November 2022
After I posted this, Thomas Gauvin (Product manager for Static Web Apps) was kind enough to tweet this:
So by the sounds of it, this blog post will not be required in the longer term, as support should to be added directly. Tremendous news!
Where's my claims?
There is a limitation that affects authorization when you have a linked backend paired with an Azure Static Web App. Let's take the case of having an Azure Function App as the linked backend. Essentially the Azure Function app does not receive the claims that the Static Web App receives. There's an issue tracking this on GitHub, and it seems that this is a general problem with Static Web Apps, Azure AD and linked backends.
We have a Static Web App, with an associated C# Function App (using the Bring Your Own Functions AKA "linked backend" approach). Both the Static Web App and Function App are associated with the same Azure AD App Registration.
When we're authenticated with Azure AD and go to the auth endpoint in our Static Web App: /.auth/me
we see:
{
"clientPrincipal": {
"identityProvider": "aad",
"userId": "d9178465-3847-4d98-9d23-b8b9e403b323",
"userDetails": "johnny_reilly@hotmail.com",
"userRoles": ["authenticated", "anonymous"],
"claims": [
// ...
{
"typ": "http://schemas.microsoft.com/identity/claims/objectidentifier",
"val": "d9178465-3847-4d98-9d23-b8b9e403b323"
},
{
"typ": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"val": "johnny_reilly@hotmail.com"
},
{
"typ": "name",
"val": "John Reilly"
},
{
"typ": "roles",
"val": "OurApp.Read"
},
// ...
{
"typ": "ver",
"val": "2.0"
}
]
}
}
Note the claims in there. These include custom claims that we've configured against our Azure AD App Registration such as roles with OurApp.Read
.
So we can access claims successfully in the Static Web App (the front end). However, the associated Function App does not have access to the claims.
It's possible to see this by implementing a function in our Azure Function App which surfaces roles:
[FunctionName("GetRoles")]
public static async Task<IActionResult> Run(
[HttpTrigger(AuthorizationLevel.Anonymous, "get", "post", Route = "GetRoles")] HttpRequest req
)
{
var roles = req.HttpContext.User?.Claims.Select(c => new { c.Type, c.Value });
return new OkObjectResult(roles);
}
When this /api/GetRoles
endpoint is accessed we see this:
[
{
"Type": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
"Value": "d9178465-3847-4d98-9d23-b8b9e403b323"
},
{
"Type": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"Value": "johnny_reilly@hotmail.com"
},
{
"Type": "http://schemas.microsoft.com/ws/2008/06/identity/claims/role",
"Value": "authenticated"
},
{
"Type": "http://schemas.microsoft.com/ws/2008/06/identity/claims/role",
"Value": "anonymous"
}
]
At first look, this seems great; we have claims! But when we look again we realise that we have far less claims than we might have hoped for. Crucially, our custom claims / app roles like OurApp.Read
are missing.
Maybe they're hiding in x-ms-client-principal
?
If we look directly at the x-ms-client-principal
header, maybe we'll find what we need?
[FunctionName("GetRoles")]
public static async Task<IActionResult> GetRoles(
[HttpTrigger(AuthorizationLevel.Anonymous, "get", Route = "GetRoles")] HttpRequest req
)
{
var header = req.Headers["x-ms-client-principal"];
var data = header.FirstOrDefault();
if (data == null)
{
return new OkObjectResult("nothing");
}
var decoded = System.Convert.FromBase64String(data);
var json = System.Text.ASCIIEncoding.ASCII.GetString(decoded);
return new OkObjectResult(json);
}
Alas not. We have the user's email and some simple roles ("authenticated" and "anonymous"), but no sign of our custom claims / app roles:
{
"identityProvider": "aad",
"userId": "d9178465-3847-4d98-9d23-b8b9e403b323",
"userDetails": "johnny_reilly@hotmail.com",
"userRoles": ["authenticated", "anonymous"]
}
This is the problem: we want our Azure Function App to be able to make use of the same custom claims / app roles that we use for authorization in the Static Web App. How can we achieve this?
Microsoft Graph API
The answer lies with the Microsoft Graph API. We can interrogate it to get the app role assignments for the user. This will give us the same information that we have in the Static Web App. (Well to be strictly accurate, it will be a slightly different set of claims. But what matters is it will be the app role assignment claims that we want to use for authorization.)
We already have an Azure AD app registration. In order that we can interrogate the Microsoft Graph API, we'll need the following permissions:
- User.Read - to sign in
- User.Read.All - for acquiring the app role assignments against a user
- Application.Read.All - to get more information about the app role assignments - allowing us to translate the app role assignments into the claims that we want to use for authorization
Of the above permissions, it's likely that you'll already have delegated User.Read
in place; the other two you might need to add and ensure they're granted in Azure.
Interrogating the Microsoft Graph API
Now we have an Azure AD App Registration with sufficient permissions, we'll need a GraphClient
to interrogate the Microsoft Graph API. To get that we're going to build an AuthenticatedGraphClientFactory
:
using System.Net.Http;
using System.Net.Http.Headers;
using System.Threading.Tasks;
using Microsoft.Graph;
using Microsoft.Identity.Client;
namespace MyApp.Auth
{
public interface IAuthenticatedGraphClientFactory
{
(GraphServiceClient, string) GetAuthenticatedGraphClientAndClientId();
}
public class AuthenticatedGraphClientFactory : IAuthenticatedGraphClientFactory
{
private GraphServiceClient? _graphServiceClient;
private readonly string _clientId;
private readonly string _clientSecret;
private readonly string _tenantId;
public AuthenticatedGraphClientFactory(
string clientId,
string clientSecret,
string tenantId
)
{
_clientId = clientId;
_clientSecret = clientSecret;
_tenantId = tenantId;
}
public (GraphServiceClient, string) GetAuthenticatedGraphClientAndClientId()
{
var authenticationProvider = CreateAuthenticationProvider();
_graphServiceClient = new GraphServiceClient(authenticationProvider);
return (_graphServiceClient, _clientId);
}
private IAuthenticationProvider CreateAuthenticationProvider()
{
// this specific scope means that application will default to what is defined in the application registration rather than using dynamic scopes
string[] scopes = new string[]
{
"https://graph.microsoft.com/.default"
};
var confidentialClientApplication = ConfidentialClientApplicationBuilder.Create(_clientId)
.WithAuthority($"https://login.microsoftonline.com/{_tenantId}/v2.0")
.WithClientSecret(_clientSecret)
.Build();
return new MsalAuthenticationProvider(confidentialClientApplication, scopes); ;
}
}
public class MsalAuthenticationProvider : IAuthenticationProvider
{
private readonly IConfidentialClientApplication _clientApplication;
private readonly string[] _scopes;
public MsalAuthenticationProvider(IConfidentialClientApplication clientApplication, string[] scopes)
{
_clientApplication = clientApplication;
_scopes = scopes;
}
/// <summary>
/// Update HttpRequestMessage with credentials
/// </summary>
public async Task AuthenticateRequestAsync(HttpRequestMessage request)
{
var token = await GetTokenAsync();
request.Headers.Authorization = new AuthenticationHeaderValue("bearer", token);
}
/// <summary>
/// Acquire Token
/// </summary>
public async Task<string?> GetTokenAsync()
{
var authResult = await _clientApplication.AcquireTokenForClient(_scopes).ExecuteAsync();
return authResult.AccessToken;
}
}
}
When we execute GetAuthenticatedGraphClientAndClientId
we'll get back a GraphServiceClient
that we can use to interrogate the Microsoft Graph API. We'll also get back the client ID of the Graph API App. We'll need this later. Note that the AuthenticatedGraphClientFactory
requires the client ID, client secret and tenant ID of the Azure AD App Registration.
Now we have the ability to interrogate the Microsoft Graph API, we can write a PrincipalService.cs
class that will interrogate it and return the app role assignments for the user:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Security.Claims;
using System.Text;
using System.Text.Json;
using System.Threading.Tasks;
using Microsoft.AspNetCore.Http;
using Microsoft.Extensions.Logging;
using Microsoft.Graph;
namespace MyApp.Auth
{
public interface IPrincipalService
{
Task<ClaimsPrincipal> GetPrincipal(HttpRequest req);
}
public class PrincipalService : IPrincipalService
{
readonly ILogger<PrincipalService> _log;
readonly IAuthenticatedGraphClientFactory _graphClientFactory;
public PrincipalService(
IAuthenticatedGraphClientFactory graphClientFactory,
ILogger<PrincipalService> log
)
{
_graphClientFactory = graphClientFactory;
_log = log;
}
public async Task<ClaimsPrincipal> GetPrincipal(HttpRequest req)
{
try
{
MsClientPrincipal? principal = MakeMsClientPrincipal(req);
if (principal == null)
return new ClaimsPrincipal();
if (!principal.UserRoles?.Where(NotAnonymous).Any() ?? true)
return new ClaimsPrincipal();
ClaimsIdentity identity = await MakeClaimsIdentity(principal);
return new ClaimsPrincipal(identity);
}
catch (Exception e)
{
_log.LogError(e, "Error parsing claims principal");
return new ClaimsPrincipal();
}
}
MsClientPrincipal? MakeMsClientPrincipal(HttpRequest req)
{
MsClientPrincipal? principal = null;
if (req.Headers.TryGetValue("x-ms-client-principal", out var header))
{
var data = header.FirstOrDefault();
if (data != null)
{
var decoded = Convert.FromBase64String(data);
var json = Encoding.UTF8.GetString(decoded);
_log.LogInformation($"x-ms-client-principal: {json}");
principal = JsonSerializer.Deserialize<MsClientPrincipal>(json, new JsonSerializerOptions { PropertyNameCaseInsensitive = true });
}
}
return principal;
}
async Task<ClaimsIdentity> MakeClaimsIdentity(MsClientPrincipal principal)
{
var identity = new ClaimsIdentity(principal.IdentityProvider);
identity.AddClaim(new Claim(ClaimTypes.NameIdentifier, principal.UserId!));
identity.AddClaim(new Claim(ClaimTypes.Name, principal.UserDetails!));
if (principal.UserRoles != null)
identity.AddClaims(principal.UserRoles
.Where(NotAnonymous)
.Select(userRole => new Claim(ClaimTypes.Role, userRole)));
var username = principal.UserDetails;
if (username != null)
{
var userAppRoleAssignments = await GetUserAppRoleAssignments(username);
identity.AddClaims(userAppRoleAssignments
.Select(userAppRoleAssignments => new Claim(ClaimTypes.Role, userAppRoleAssignments)));
}
return identity;
}
static bool NotAnonymous(string r) =>
!string.Equals(r, "anonymous", StringComparison.CurrentCultureIgnoreCase);
async Task<string[]> GetUserAppRoleAssignments(string username)
{
try
{
var (graphClient, clientId) = _graphClientFactory.GetAuthenticatedGraphClientAndClientId();
_log.LogInformation("Getting AppRoleAssignments for {username}", username);
var userRoleAssignments = await graphClient.Users[username]
.AppRoleAssignments
.Request()
.GetAsync();
var roleIds = new List<string>();
var pageIterator = PageIterator<AppRoleAssignment>
.CreatePageIterator(
graphClient,
userRoleAssignments,
// Callback executed for each item in the collection
(appRoleAssignment) =>
{
if (appRoleAssignment.AppRoleId.HasValue && appRoleAssignment.AppRoleId.Value != Guid.Empty)
roleIds.Add(appRoleAssignment.AppRoleId.Value.ToString());
return true;
},
// Used to configure subsequent page requests
(baseRequest) =>
{
// Re-add the header to subsequent requests
baseRequest.Header("Prefer", "outlook.body-content-type=\"text\"");
return baseRequest;
});
await pageIterator.IterateAsync();
var applications = await graphClient.Applications
.Request()
.Filter($"appId eq '{clientId}'") // we're only interested in the app that we're running as
.GetAsync();
var appRoleAssignments = applications
.FirstOrDefault()
?.AppRoles
?.Where(appRole => appRole.Id.HasValue && roleIds.Contains(appRole.Id!.Value.ToString()))
.Select(appRole => appRole.Value)
.ToArray();
return appRoleAssignments ?? Array.Empty<string>();
}
catch (Exception e)
{
_log.LogError(e, "Error getting AppRoleAssignments");
return Array.Empty<string>();
}
}
class MsClientPrincipal
{
public string? IdentityProvider { get; set; }
public string? UserId { get; set; }
public string? UserDetails { get; set; }
public IEnumerable<string>? UserRoles { get; set; }
}
}
}
Quite a lot of code! Let's walk through what it does:
- It takes the
x-ms-client-principal
header and deserializes it into aMsClientPrincipal
object - this is the cut down version of theClaimsPrincipal
object that we saw earlier:
{
"identityProvider": "aad",
"userId": "d9178465-3847-4d98-9d23-b8b9e403b323",
"userDetails": "johnny_reilly@hotmail.com",
"userRoles": ["authenticated", "anonymous"]
}
It creates a new
ClaimsIdentity
using that information, but stripping out theanonymous
role as it's superfluous.Using the
userDetails
(email address) from theMsClientPrincipal
object, it gets the app role assignments for that user from the Graph API. (We neededUser.Read.All
to do this.)In a perfect world, we'd be able to use the
AppRoleAssignments
property on theUser
object to get the app role assignments for a user, but unfortunately that doesn't come with the human readable name you'd hope for; theMyApp.Read
. So we have to interrogate the Graph API once more and use theApplication
that represents our Azure AD App Registration (we acquire this by filtering for anappId
matching ourclientId
). Then we can get the human readable /MyApp.Read
role assignment.It adds the app role assignments as role claims to the
ClaimsIdentity
object.It returns the
ClaimsIdentity
object wrapped in aClaimsPrincipal
object.
Using the PrincipalService
In order that we can make use of our PrincipalService
we need to configure it and the AuthenticatedGraphClientFactory
in our Startup
class:
services.AddTransient<IAuthenticatedGraphClientFactory>(sp =>
new AuthenticatedGraphClientFactory(
// The parameters can be sourced from the Azure AD App Registration
clientId,
clientSecret,
tenantId
));
services.AddTransient<IPrincipalService, PrincipalService>();
With that in place, we can now use the IPrincipalService
in a function:
using System.Linq;
using System.Threading.Tasks;
using MyApp.Auth;
using Microsoft.AspNetCore.Http;
using Microsoft.AspNetCore.Mvc;
using Microsoft.Azure.WebJobs;
using Microsoft.Azure.WebJobs.Extensions.Http;
namespace MyApp.Functions
{
public class GetClaimsPrincipalFunction
{
private readonly IPrincipalService _principalService;
public GetClaimsPrincipalFunction(
IPrincipalService principalService
)
{
_principalService = principalService;
}
[FunctionName(nameof(GetPrincipal))]
public async Task<IActionResult> GetPrincipal(
[HttpTrigger(AuthorizationLevel.Anonymous, "get", Route = "get-principal")] HttpRequest request
)
{
var principal = await _principalService.GetPrincipal(request);
var identity = principal?.Identity;
var data = new
{
Name = identity?.Name ?? "",
AuthenticationType = identity?.AuthenticationType ?? "",
Claims = principal?.Claims.Select(c => new { c.Type, c.Value }),
};
return new OkObjectResult(data);
}
[FunctionName(nameof(AmIInRole))]
public async Task<IActionResult> AmIInRole(
[HttpTrigger(AuthorizationLevel.Anonymous, "get", Route = "am-i-in-role")] HttpRequest request
)
{
var role = request.Query["role"].FirstOrDefault();
if (string.IsNullOrEmpty(role))
return new BadRequestObjectResult("role query parameter is required");
var principal = await _principalService.GetPrincipal(request);
var isInRole = principal?.IsInRole(role) == true;
if (!isInRole)
return new ObjectResult($"Forbidden for {role}")
{
StatusCode = Status403Forbidden
};
return new OkObjectResult($"Welcome {principal?.Identity?.Name} - you have role {role}!");
}
}
}
The above class has 2 functions:
-
GetPrincipal
- returns theClaimsPrincipal
object as JSON -
AmIInRole
- takes arole
query parameter, tests if a user has that role and returns a 403 if they don't and a 200 with a welcome message if they do
GetPrincipal
- what claims do we have?
Let's try out the GetPrincipal
function, when I go to the /api/get-principal
endpoint I see this:
{
"name": "johnny_reilly@hotmail.com",
"authenticationType": "aad",
"claims": [
{
"type": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
"value": "d9178465-3847-4d98-9d23-b8b9e403b323"
},
{
"type": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"value": "johnny_reilly@hotmail.com"
},
{
"type": "http://schemas.microsoft.com/ws/2008/06/identity/claims/role",
"value": "authenticated"
},
{
"type": "http://schemas.microsoft.com/ws/2008/06/identity/claims/role",
"value": "OurApp.Read"
}
]
}
This isn't the same information as the Static Web Apps principal, but it's close enough for our purposes. Crucially, we can see the AppRoleAssignment OurApp.Read
that we assigned to our user in the Azure Portal. That is the key information that we need, and that we are missing by default.
Crucially this is enough information for us to be able to apply authorization to our functions.
AmIInRole
- test IsInRole
functionality
We can demonstrate applying authorization by using the AmIInRole
function. This internally uses the inbuilt IsInRole
functionality of the ClaimsPrincipal
object, and returns an appropriate API result accordingly.
If I go to the /api/am-i-in-role?role=OurApp.Read
endpoint I get a 200 status code and the message: Welcome johnny_reilly@hotmail.com - you have role OurApp.Read!
. This makes sense, my user account has the OurApp.Read
role.
Let's test that we also deny access appropriately. There is an OurApp.Write
role; my account does not have this. If I go to the /api/am-i-in-role?role=OurApp.Write
endpoint I get a 403 status code and the message: Forbidden for OurApp.Write
.
It works!
Conclusion
We've demonstrated a way to acquire a ClaimsPrincipal
object that contains the AppRoleAssignments for a user. This is enough information for us to be able to apply authorization to our functions.
It would be ideal if this wasn't required, and I'm hoping that the Static Web Apps team will be able to provide a solution for this in the future. Keep an eye on this GitHub issue. In the meantime, this is a workable solution.
Thanks to Warren Joubert for his help with this post.
Top comments (0)