You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Documentation improvements for Public Preview (#1253)
## Why make this change?
Improve documentation
## What is this change?
Updating TOC and adding troubleshooting
## How was this tested?
N/A
## Sample Request(s)
N/A
Copy file name to clipboardexpand all lines: README.md
+16-9
Original file line number
Diff line number
Diff line change
@@ -9,24 +9,29 @@ Latest version of Data API builder is **0.5.34** [What's new?](./docs/whats-new
9
9
10
10
**Data API builder for Azure Databases provides modern REST and GraphQL endpoints to your Azure Databases.**
11
11
12
-
With Data API builder, database objects can be exposed via REST or GraphQL endpoints so that your data can be accessed using modern techniques on any platform, any language, and any device. With an integrated and flexible policy engine, granular security is assured; integrated with Azure SQL, SQL Server, PostgreSQL, MySQL and Cosmos DB, gives developers an efficiency boost like never seen before.
12
+
With data API builder, database objects can be exposed via REST or GraphQL endpoints so that your data can be accessed using modern techniques on any platform, any language, and any device. With an integrated and flexible policy engine, native support for common behavior like pagination, filtering, projection and sorting, the creation of CRUD backend services can be done in minutes instead of hours or days, giving developers an efficiency boost like never seen before.
13
13
14
-

14
+
Data API builder is Open Source and works on any platform. It can be executed on-premises, in a container or as a Managed Service in Azure, via the new [Database Connection](https://learn.microsoft.com/azure/static-web-apps/database-overview) feature available in Azure Static Web Apps.
15
+
16
+

15
17
16
18
## Features
17
19
18
20
- Allow collections, tables, views and stored procedures to be accessed via REST and GraphQL
19
-
- Support authentication via JWT and EasyAuth
21
+
- Support authentication via OAuth2/JWT
22
+
- Support for EasyAuth when running in Azure
20
23
- Role-based authorization using received claims
21
24
- Item-level security via policy expressions
22
25
- REST
23
26
- CRUD operations via POST, GET, PUT, PATCH, DELETE
24
-
-filtering, sorting and pagination
27
+
-Filtering, sorting and pagination
25
28
- GraphQL
26
-
-queries and mutations
27
-
-filtering, sorting and pagination
28
-
-relationship navigation
29
+
-Queries and mutations
30
+
-Filtering, sorting and pagination
31
+
-Relationship navigation
29
32
- Easy development via dedicated CLI
33
+
- Full integration with Static Web Apps via Database Connection feature when running in Azure
34
+
- Open Source
30
35
31
36
## Getting Started
32
37
@@ -36,9 +41,11 @@ To get started quickly with Data API builder for Azure Databases, you can use th
36
41
37
42
Documentation is available in the [`docs`](./docs) folder.
38
43
39
-
## Limitations
44
+
## Samples
45
+
46
+
Several samples are available already. In the `./samples` folder, you'll find the code needed to follow the [Getting Started](./docs/getting-started/getting-started.md) tutorial.
40
47
41
-
- JWT only supports Azure AD
48
+
More samples, including end-to-end samples using the most common frontend framework, are available in the [https://github.com/Azure-Samples/data-api-builder] repository.
Copy file name to clipboardexpand all lines: docs/authentication-azure-ad.md
+7-7
Original file line number
Diff line number
Diff line change
@@ -85,19 +85,19 @@ Where the`APP_ID` is the "Application (client) ID" and the `TENANT_ID` is the "D
85
85
86
86
Make sure you are logged in to AZ CLI with the account that you want to use to authenticate against Data API builder.
87
87
88
-
```sh
88
+
```shell
89
89
az login
90
90
```
91
91
92
92
and select the subscription where you have [configured the Data API builder App Registration](#configure-server-app-registration).
93
93
94
-
```sh
94
+
```shell
95
95
az account set --subscription <subscription name or id>
96
96
```
97
97
98
98
then run the following command to try to authenticate against the newly created scope:
99
99
100
-
```sh
100
+
```shell
101
101
az account get-access-token --scope api://<Application ID>/Endpoint.Access
102
102
```
103
103
@@ -107,7 +107,7 @@ It should return an error like the following:
107
107
AADSTS65001: The user or administrator has not consented to use the application with ID '<AZ CLI Application ID GUID>' named 'Microsoft Azure CLI'. Send an interactive authorization request for this user and resource.
108
108
```
109
109
110
-
The \<AZ CLI Application ID GUID\>, which represents AZ CLI, must be allowed to authenticate against the Data API builder Azure AD Application. To do that, search for the "Data API builder" application in the Azure Portal or go to the Azure Active Directory portal blade and select **App Registrations**. Select the "Data API builder" application and then:
110
+
The '\<AZ CLI Application ID GUID\>', which represents AZ CLI, must be allowed to authenticate against the Data API builder Azure AD Application. To do that, search for the "Data API builder" application in the Azure Portal or go to the Azure Active Directory portal blade and select **App Registrations**. Select the "Data API builder" application and then:
111
111
112
112
1. Navigate to **Expose an API** from your App Registration overview page.
113
113
1. Under *Authorized client applications*, select **Add a client application**
@@ -176,14 +176,14 @@ To test out that authentication is working fine, you can update your configurati
176
176
177
177
You can use any HTTP client now to send an authenticated request. Firstly get the token:
178
178
179
-
```sh
179
+
```shell
180
180
az account get-access-token --scope api://<Application ID>/Endpoint.Access --query "accessToken" -o tsv
181
181
```
182
182
183
183
then you can use the obtained access token to issue a successful authenticated request to a protected endpoint:
Copy file name to clipboardexpand all lines: docs/authentication.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ The supported providers are the following:
43
43
44
44
## Roles Selection
45
45
46
-
Once a request has been authenticated via any of the available options, the roles defined in the token will be used to help determine how permission rules will be evaluated to [authorize](./authorization.md) the request. Any authenticated request will be automatically assigned to the `authenticated` system role, unless a user role is requested to be used, as described in the [Authorization](./authorization.md.md) document.
46
+
Once a request has been authenticated via any of the available options, the roles defined in the token will be used to help determine how permission rules will be evaluated to [authorize](./authorization.md) the request. Any authenticated request will be automatically assigned to the `authenticated` system role, unless a user role is requested to be used, as described in the [Authorization](./authorization.md) document.
Copy file name to clipboardexpand all lines: docs/authorization.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ There are two system roles:
15
15
16
16
### User Roles
17
17
18
-
An authenticated request comes with a set of role claims that describe the requestor's role membership. When using EasyAuth authentication, the received token can be something like the following:
18
+
An authenticated request comes with a set of role claims that describe the requestor's role membership. When using EasyAuth authentication (the default when using `StaticWebApps` as authentication mode), the received token can be something like the following:
19
19
20
20
```json
21
21
{
@@ -33,7 +33,7 @@ An authenticated request comes with a set of role claims that describe the reque
33
33
the roles will be used to match any defined role in the configuration file. For example, a request coming in with the aforementioned sample token will be matched with the `author` permissions if the sample `book` entity is configured like the following:
34
34
35
35
```json
36
-
"book": {
36
+
"Book": {
37
37
"source": "books",
38
38
"permissions": [
39
39
{
@@ -80,11 +80,11 @@ A request can only be evaluated in the context of a single role. So, if the acce
80
80
81
81
the desired role must be specified in the `X-MS-API-ROLE` HTTP Header.
82
82
83
-
If `X-MS-API-ROLE` is not specified for an authenticated request, the request is assumed to be evaluated in the context of the `authenticated` system role.
83
+
> ATTENTION! If `X-MS-API-ROLE` is not specified for an authenticated request, the request is assumed to be evaluated in the context of the `authenticated` system role.
84
84
85
85
## Permissions
86
86
87
-
Permissions and their components, `roles`, `actions`, `fields` and `policies`, are explained in the [configuration file](./configuration-file.md#permissions) documentation.
87
+
Permissions and their components, `roles`, `actions`, `fields` and `policies`, are explained in the [configuration file](./configuration-file.md#permissions) documentation.
88
88
89
89
There can be multiple roles defined in an entity's permissions configuration. However, a request is only evaluated in the context of a single role. The role evaluated for a request is either a system role automatically assigned by the Data API builder engine or a role manually specified in the `X-MS-API-ROLE` HTTP header.
90
90
@@ -141,7 +141,7 @@ For more details, see the [configuration file](./configuration-file.md#actions)
141
141
142
142
### Item level security
143
143
144
-
Database policy expressions enable results to be restricted even further. Database policies translate OData expressions to query predicates executed against the database. Database policy expressions are supported for the read, update, and delete actions. See the [configuration file](./configuration-file.md#policies) documentation for a detailed explanation of database policies.
144
+
Database policy expressions enable results to be restricted even further. Database policies translate expressions to query predicates executed against the database. Database policy expressions are supported for the read, update, and delete actions. See the [configuration file](./configuration-file.md#policies) documentation for a detailed explanation of database policies.
Copy file name to clipboardexpand all lines: docs/azure-sql-session-context-rls.md
+23-28
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,22 @@
1
-
# Runtime to Database Authorization
1
+
# SESSION_CONTEXT and Row Level Security
2
2
3
-
-[MsSql](#mssql)
3
+
## SESSION_CONTEXT
4
4
5
-
## MsSql
5
+
For Azure SQL and SQL Server, Data API builder can take advantage of `SESSION_CONTEXT` to send user specified metadata to the underlying database. Such metadata is available to Data API builder by virtue of the claims present in the access token. The data sent to the database can then be used to configure an additional level of security (e.g. by configuring Security policies) to further prevent access to data in operations like SELECT, UPDATE, DELETE. The `SESSION_CONTEXT` data is available to the database for the duration of the database connection until that connection is closed. The same data can be used inside a stored procedure as well.
6
6
7
-
### SESSION_CONTEXT
7
+
##How to read and write to `SESSION_CONTEXT`
8
8
9
-
For MsSql, Data API builder uses SESSION_CONTEXT to send user specified metadata to the underlying database. Such metadata is available to Data API builder by virtue of the claims present in the access token.
10
-
The data sent to the database can then be used to configure an additional level of security (e.g. by configuring Security policies) to further prevent access
11
-
to data in operations like SELECT, UPDATE, DELETE. The SESSION_CONTEXT data is available to the database for the duration of the database connection until that connection is closed. The same data can be used inside a stored procedure as well.
9
+
Learn more about setting `SESSION_CONTEXT` data from the `sp_set_session_context`[Microsoft Learn article](https://learn.microsoft.com/sql/relational-databases/system-stored-procedures/sp-set-session-context-transact-sql).
12
10
13
-
####How to read and write to SESSION_CONTEXT
11
+
## How to enable `SESSION_CONTEXT` in Data API builder
14
12
15
-
Learn more about setting SESSION_CONTEXT data from the `sp_set_session_context`[Microsoft Learn article](https://learn.microsoft.com/sql/relational-databases/system-stored-procedures/sp-set-session-context-transact-sql).
13
+
In the config file, the `data-source` section sub-key `options` holds database specific configuration properties. To enable `SESSION_CONTEXT`, the user needs to set the property `set-session-context` to `true`. This can be done while generating the config file via CLI at the first time or can be done later as well by setting the property manually in the config file.
16
14
17
-
#### How to enable SESSION_CONTEXT in Data API builder
15
+
##CLI command to set the `SESSION_CONTEXT`
18
16
19
-
In the config file, the `data-source` section sub-key `options` holds database specific configuration properties. To enable SESSION_CONTEXT, the user needs to set the property `set-session-context`to `true` for MsSql. This can be done while generating the config file via CLI at the first time or can be done later as well by setting the property manually in the config file.
17
+
Use the command `dab init` to generate the config file. The `--set-session-context`flag can be used to set the `SESSION_CONTEXT`property to `true`. The command looks like:
20
18
21
-
##### CLI command to set the SESSION_CONTEXT
22
-
23
-
```bash
19
+
```shell
24
20
dab init -c config.json --database-type mssql --connection-string some-connection-string --set-session-context true
25
21
```
26
22
@@ -36,9 +32,9 @@ This will generate the data-source section in config file as follows:
36
32
}
37
33
```
38
34
39
-
####How and what data is sent via SESSION_CONTEXT (Example)
35
+
## How and what data is sent via SESSION_CONTEXT
40
36
41
-
All the claims present in the EasyAuth/JWT token are sent via the SESSION_CONTEXT to the underlying database. A sample decoded EasyAuth token looks like:
37
+
All the claims present in the EasyAuth/JWT token are sent via the `SESSION_CONTEXT` to the underlying database. A sample decoded EasyAuth token looks like:
42
38
43
39
```json
44
40
{
@@ -94,7 +90,7 @@ All the claims present in the EasyAuth/JWT token are sent via the SESSION_CONTEX
94
90
}
95
91
```
96
92
97
-
All the claims present in the the token are translated into key-value pairs passed via SESSION_CONTEXT query formulated like below:
93
+
All the claims present in the the token are translated into key-value pairs passed via `SESSION_CONTEXT` query formulated like below:
####Example: How to use SESSION_CONTEXT to configure additional level of security (Row Level Security)
109
+
## Example: How to use `SESSION_CONTEXT` to leverage Row Level Security (RLS)
114
110
115
-
For more details about Row Level Security (RLS), please refer this [Microsoft Learn article](https://learn.microsoft.com/sql/relational-databases/security/row-level-security), but, basically RLS enables us to use group membership or execution context to control access to rows in a database table.
111
+
For more details about Row Level Security (RLS), please refer this [Microsoft Learn article](https://learn.microsoft.com/sql/relational-databases/security/row-level-security).
116
112
117
113
In this demonstration, we will first be creating a database table `revenues`. We will then configure a [Security Policy](https://learn.microsoft.com/sql/t-sql/statements/create-security-policy-transact-sql) which would add a FILTER PREDICATE
118
-
to this `revenues` table. The [FILTER PREDICATE](https://learn.microsoft.com/sql/relational-databases/security/row-level-security#Description) is nothing but a table-valued function which will filter the rows accessible to operations SELECT, UPDATE, DELETE
119
-
based on the criteria that is configured for the function.
114
+
to this `revenues` table. The [FILTER PREDICATE](https://learn.microsoft.com/sql/relational-databases/security/row-level-security#Description) is nothing but a table-valued function which will filter the rows accessible to operations SELECT, UPDATE, DELETE based on the criteria that is configured for the function.
120
115
At the end of the demonstration, we will see that only those rows are returned to the user which match the criteria of the filter predicate imposed by the security policy.
121
116
122
-
#####Laying down the ground work for SESSION_CONTEXT- SQL Queries
117
+
### Laying down the ground work for `SESSION_CONTEXT`- SQL Queries
123
118
124
119
We can execute the below SQL queries in the same order via SSMS or any other SQL client to lay the groundwork for SESSION_CONTEXT.
######Creating function to be used as FILTER PREDICATE
140
+
#### Creating function to be used as FILTER PREDICATE
146
141
147
-
Create a function to be used as a filter predicate by the security policy to restrict access to rows in the table for SELECT, UPDATE, DELETE operations. We use the variable @username to store the value of the column revenues.username and then filter the rows accessible to the user using the filter predicate with condition: @username = SESSION_CONTEXT(N'name').
142
+
Create a function to be used as a filter predicate by the security policy to restrict access to rows in the table for SELECT, UPDATE, DELETE operations. We use the variable @username to store the value of the column revenues.username and then filter the rows accessible to the user using the filter predicate with condition:` @username = SESSION_CONTEXT(N'name')`.
@@ -154,7 +149,7 @@ AS RETURN SELECT 1 AS fn_securitypredicate_result
154
149
WHERE @username = CAST(SESSION_CONTEXT(N'name') ASvarchar(max));
155
150
```
156
151
157
-
######Creating SECURITY POLICY to add to the revenues table
152
+
#### Creating SECURITY POLICY to add to the revenues table
158
153
159
154
Adding a security policy which would restrict access to the rows in revenues table for SELECT, UPDATE, DELETE operations using the filter predicate dbo.revenuesPredicate.
0 commit comments