Authorization Patterns
Convex Auth’s authorization model is:
- app-defined roles in
createAuth({ authorization: { roles } }) - per-group membership assignment via
roleIds - grant-based enforcement via
auth.member.require(...)orauth.member.inspect(...)
Define roles
Use defineRoles(...) so your role ids and grants stay typed everywhere else in
your app.
import { defineRoles } from "@robelest/convex-auth/authorization";
import { createAuth } from "@robelest/convex-auth/component";
export const roles = defineRoles({
orgAdmin: {
label: "Organization Admin",
grants: [
"members.create",
"members.update",
"members.delete",
"sso.connection.manage",
"scim.manage",
],
},
support: {
label: "Support",
grants: ["members.read", "tickets.manage"],
},
member: {
label: "Member",
grants: [],
},
});
export const auth = createAuth(components.auth, {
providers: [
/* ... */
],
authorization: {
roles,
},
}); Role names are completely app-defined. What matters is the grants attached to them.
Assign roles with memberships
Memberships store roleIds.
await auth.member.create(ctx, {
userId,
groupId: orgId,
roleIds: [roles.orgAdmin.id],
}); Update them the same way:
await auth.member.update(ctx, memberId, {
roleIds: [roles.support.id],
}); Invites can also pre-assign role ids:
await auth.invite.create(ctx, {
groupId: orgId,
email: "alice@example.com",
roleIds: [roles.member.id],
}); Use userId for authorization
- Use
userIdfor authorization checks (stable identity) - Use email only for lookup/bootstrap UX (human input)
- Persist admin grants by
userIdin your app table
Why email is not on getUserIdentity()
ctx.auth.getUserIdentity() returns Convex identity claims from the JWT. The
token subject is userId|sessionId, and email is stored on the user document.
This is intentional:
- Email can change
- Some providers don’t guarantee email
- Sessions should remain valid even if profile fields change
In app code, resolve authentication once with auth.ctx() and then use ctx.auth.userId / ctx.auth.user in handlers.
Authorization pattern
These examples assume your handlers use auth-aware builders that inject ctx.auth once in convex/functions.ts:
import { customMutation, customQuery } from "convex-helpers/server/customFunctions";
import { mutation, query } from "./_generated/server";
import { auth } from "./auth";
export const authQuery = customQuery(query, auth.ctx());
export const authMutation = customMutation(mutation, auth.ctx()); import { authQuery } from "./functions";
import { auth } from "./auth";
export const canAccessAdminTools = authQuery({
args: {},
handler: async (ctx) => {
const result = await auth.member.inspect(ctx, {
userId: ctx.auth.userId,
groupId: "group_id_here",
});
return result.grants.includes("admin.tools.read");
},
}); Prefer checking grants instead of checking role names directly.
// Use this when the handler should fail instead of returning a boolean.
await auth.member.require(ctx, {
userId: ctx.auth.userId,
groupId: orgId,
grants: ["sso.connection.manage"],
}); Membership traversal
If your groups are nested, auth.member.inspect(...) can still resolve
inherited membership, but access decisions should usually be expressed in
grants.
const result = await auth.member.inspect(ctx, {
userId: ctx.auth.userId,
groupId: teamId,
});
if (result.grants.includes("members.read")) {
// authorized
} Performance: derive permissions from resolved grants
When you already have a user’s resolved grants (e.g. from member.inspect), you
can derive permissions locally instead of making separate authorization calls:
const { grants } = await auth.member.inspect(ctx, {
userId: ctx.auth.userId,
groupId,
});
// Derive permissions from already-resolved grants (no extra DB reads)
const permissions = {
canCreate: grants.includes("items.create"),
canEdit: grants.includes("items.edit"),
canDelete: grants.includes("items.delete"),
}; This avoids redundant round trips when you need to check multiple grants for the same user and group.
Group Connection mounted RPC
When mounting group SSO RPC, keep the authorization callback and initial admin role assignment together:
export const groupApi = group(auth, {
admin: {
authorized,
roles: [roles.orgAdmin],
},
}); admin.authorizeddecides whether the caller may perform the requested admin operation.admin.rolesare assigned to the creator whencreateConnectionauto-creates a new group.
Account/User relationship
Accounts are many-to-one with users:
- One
Usercan have many linkedAccountrecords (GitHub + Google + password) - Each
Accountbelongs to exactly oneUser
This is why authorization should be keyed on userId, not provider account IDs.
Common patterns
- Need a signed-in user? Use
auth.ctx()so handlers receivectx.auth.userIdandctx.auth.user - Need a boolean access check? Use
auth.member.inspect(...) - Need to enforce permissions? Use
auth.member.require(...) - Need optional auth? Use
auth.ctx({ optional: true })
Recommended pattern
- define roles globally in config
- assign
roleIdsper membership - check grants in server functions
- treat role ids as labels and grants as the actual authorization contract
See also: