3/29/2025 at 3:09:41 PM
How do authentication and authorization work? Like Firebase?(I haven't used a system like that. I'm intrigued by the idea of a backend that's just a database but it weirds me out not to have to write a layer that says who can read what. Exposing the database that nakedly feels super dangerous.)
by jfengel
3/29/2025 at 5:10:17 PM
Similar to Firebase it's multi-strategy based. You can use a combo of email/password or OAuth/OIDC (internally using https://github.com/panva/oauth4webapi) – currently there are 2 pre-configured (Google, Github), but it's easy to extend, so requests are welcome.On the Authorization side, you can create roles and attach permissions to it. Those roles then get attached to users.
Claims are transported via JWT, you can configure its lifetime, secret and hashing. Currently it's stateless, meaning the token is not checked in a session store. But if there is demand, I'd prioritize adding this. I'm mainly exactly looking for feedback to prioritize next additions.
Hope this helps.
by dswbx
3/30/2025 at 5:28:18 AM
> (I haven't used a system like that. I'm intrigued by the idea of a backend that's just a database but it weirds me out not to have to write a layer that says who can read what. Exposing the database that nakedly feels super dangerous.)In my (closed) product that exposes the database to the frontend, the "exposure" part has, effectively, row-level access control.[1]
[1] Also role-based using groups. I additionally mark the read-only queries as read-only and these are executed on a read-only replica.
by lelanthran
3/29/2025 at 3:18:29 PM
Sources here if you ae curious: https://github.com/bknd-io/bknd/tree/main/app/src/authCore auth feature progress is tracked here: https://github.com/bknd-io/bknd/issues/6
by 3np
3/29/2025 at 3:19:47 PM
Broken (missing) auth is pretty common with Firebase/Supabase. It's a developer mistake that could happen in any kind of back-end, but I think that traditional back-end frameworks usually have better conventions that make the mistake less likely.by joshuanapoli
3/29/2025 at 4:29:05 PM
Yeah, I've never understood this. I can't think of any operation where I wouldn't want some backend logic in between. Firebase rules don't cut it.by Kiro
3/29/2025 at 5:11:34 PM
Since you can embed bknd into any stack, and you can hook into system events, there are plenty of options to customize authorization according to your needs.by dswbx
3/29/2025 at 4:40:37 PM
It does.. I know postgrest is like this thoughby CalRobert