DEV Community

Cover image for Role-Based Access Control in Django
Steve Yonkeu
Steve Yonkeu

Posted on

3 1 1 1 1

Role-Based Access Control in Django

Security is a very important aspect in web development, sometimes so much underrated. While naming folders mostly on your project tree we can easily find auth, ask yourself if that is authentication or authorization? Well, this post about both authentication and authorization, but however emphasis will be brought more to authorization.

Authentication v/s Authorization

Authentication verifies who you are; authorization determines what you can access.

Small stories extract showing some people who access what they were not to:

  • 2013 (Edward Snowden and the NSA incidence): Edward Snowden, a contractor for National Security Agency (NSA) by then, exploited his privileged access to leak classified documents revealing global surveillance programs to The Washington Post and The Guardian. The alleged stories about NSA spying on world leaders, foreign governments and the U.S. citizens, as well as its attempts to undermine internet security, became facts and putting the agency at the center of the worst scandal they could ever imagine.

  • 2017 (Vanderbilt University Medical Center Breach): Two employees at Vanderbilt University Medical Center inappropriately accessed the medical records of 3,000 patients over 19 months. Their roles did not require such extensive access, indicating a failure to enforce the principle of least privilege.

  • 2018 (SingHealth Data Breach): In Singapore, the personal particulars of 1.5 million patients were stolen from SingHealth's database. Attackers gained privileged access by compromising a front-end workstation and obtaining login credentials, exploiting weak access controls.

  • 2024 (Sellafield Cybersecurity Failings): Sellafield, a nuclear site in Cumbria, UK, was fined nearly £400,000 after pleading guilty to cyber security failures over a four-year period.

  • 2025 (Ambulance Victoria Data Breach): A former employee of Ambulance Victoria unlawfully transferred files containing personal details of approximately 3,000 staff members. The breach was attributed to the employee's failure to adhere to the organization's code of conduct, which prohibits the removal of data for non-work-related purposes.

And so on and so forth!

Different Authorization Methods

In Django, managing user permissions is crucial for building secure applications.

1 . Basic Authentication: This is using simple session authentication stories some credentials in the cookies.

from django.contrib.auth.decorators import login_required

@login_required
def restricted_view(request):
    return render(request, 'restricted.html')
Enter fullscreen mode Exit fullscreen mode

What's the bottleneck? if we have an admin and a normal user how do we differentiate?

2 . Hardcoded Flag-Based Permissions: We can say this is an extension of the later. Above basic authentication here we have a few roles on the system where we use boolean to say if it is or is not x-role. This can be ideal when dealing with solutions where we have 3 to 5 roles. Limitations comes in with complex permissions.

from django.shortcuts import redirect
from django.contrib.auth.models import User
from django.db import models

class Profile(models.Model):
    user = models.OneToOneField(User, on_delete=models.CASCADE)
    is_manager = models.BooleanField(default=False)

def manager_view(request):
    if not request.user.profile.is_manager:
        return redirect('permission_denied')
    return render(request, 'manager_dashboard.html')
Enter fullscreen mode Exit fullscreen mode

3 . Generic Flag-Based Permissions: Each model created in Django by default has a few permissions as metadata and this can be edited or customized in the Meta class of the model.

class Document(models.Model):
    title = models.CharField(max_length=200)

    class Meta:
        permissions = [
            ("view_document", "Can view documents"),
            ("edit_document", "Can edit documents"),
        ]
Enter fullscreen mode Exit fullscreen mode

To check or verify the permission, we can check like we see below:

from django.contrib.auth.decorators import permission_required

@permission_required('documents.view_document', login_url='login')
def document_list(request):
    documents = Document.objects.all()
    return render(request, 'documents/list.html', {'documents': documents})
Enter fullscreen mode Exit fullscreen mode

We can check on the templates too:

{% if perms.documents.view_document %}
  <div class="document-list">
    {% for doc in documents %}
      <p>{{ doc.title }}</p>
    {% endfor %}
  </div>
{% endif %}
Enter fullscreen mode Exit fullscreen mode

The limitations here comes when we might need to split the users in groups of user and assigning some permission access to some resources.

4 . Role-Based Access Control (RBAC): Django is a powerful method for managing user permissions by assigning roles to users. Instead of managing permissions individually, RBAC groups them into roles like "Admin," "Editor," and "Viewer." Each role is associated with specific permissions, simplifying the management process. In Django, you can implement RBAC using the built-in Group model and Permission system. By creating groups with predefined permissions and assigning users to these groups, you can easily control access to different parts of your application. This approach enhances security, scalability, and maintainability, making it ideal for complex applications with multiple user roles.

Let's CRAFT?

from django.db import models
from django.contrib.auth.models import Group, Permission
from django.contrib.auth.mixins import UserPassesTestMixin
from django.views.generic import ListView

class Role(models.Model):
    name = models.CharField(max_length=50)
    group = models.OneToOneField(Group, on_delete=models.CASCADE)

    def __str__(self):
        return self.name

class DocumentListView(UserPassesTestMixin, ListView):
    model = Document
    template_name = 'documents/list.html'

    def test_func(self):
        return self.request.user.has_perm('documents.view_document')
Enter fullscreen mode Exit fullscreen mode

We can also go into a middleware.

# middleware.py
from django.utils.deprecation import MiddlewareMixin

class RBACMiddleware(MiddlewareMixin):
    def process_view(self, request, view_func, view_args, view_kwargs):
        # Custom permission checks here
        if request.path.startswith('/admin') and not request.user.is_staff:
            return HttpResponseForbidden("Access denied")

#settings.py
MIDDLEWARE = [
    # ...
    'hello_app.middleware.RBACMiddleware',
]
Enter fullscreen mode Exit fullscreen mode

We can still improve that, Don't miss out the next blog posts. Don't miss out anything. Follow me and subscribe not to miss out.

BuyMeABeer

Conclusion

Role-Based Access Control (RBAC) is a widely-used method for managing user permissions in Django, but it has several limitations. RBAC struggles with fine-grained permissions, requiring excessive roles for granular access control. Role explosion occurs when roles and permissions become overly complex, leading to management challenges. RBAC lacks context awareness, treating all users within a role uniformly, which can be problematic in dynamic environments. Hierarchical role management is limited, making it difficult to implement complex inheritance structures. User experience can suffer due to unclear role definitions, and misconfigurations pose security risks. Additionally, RBAC may face scalability issues in large systems with thousands of users and roles. Despite these limitations, RBAC remains a robust solution for applications with well-defined roles and permissions. For more complex scenarios, combining RBAC with other access control methods like Attribute-Based Access Control (ABAC) or Policy-Based Access Control (PBAC) can enhance flexibility and security.

Heroku

Built for developers, by developers.

Whether you're building a simple prototype or a business-critical product, Heroku's fully-managed platform gives you the simplest path to delivering apps quickly — using the tools and languages you already love!

Learn More

Top comments (2)

Collapse
 
davis_jerry_b1348676cf6ba profile image
DAVIS JERRY

Amazing craft🙏❤️

Collapse
 
yokwejuste profile image
Steve Yonkeu

I'm glad we are crafting together

Playwright CLI Flags Tutorial

5 Playwright CLI Flags That Will Transform Your Testing Workflow

  • 0:56 --last-failed
  • 2:34 --only-changed
  • 4:27 --repeat-each
  • 5:15 --forbid-only
  • 5:51 --ui --headed --workers 1

Learn how these powerful command-line options can save you time, strengthen your test suite, and streamline your Playwright testing experience. Click on any timestamp above to jump directly to that section in the tutorial!

Watch Full Video 📹️

👋 Kindness is contagious

DEV shines when you're signed in, unlocking a customized experience with features like dark mode!

Okay