Realtime Authorization
You can control client access to Realtime Broadcast and Presence by adding Row Level Security policies to the realtime.messages
table. Each RLS policy can map to a specific action a client can take:
- Control which clients can broadcast to a Channel
- Control which clients can receive broadcasts from a Channel
- Control which clients can publish their presence to a Channel
- Control which clients can receive messages about the presence of other clients
Realtime Authorization is in Public Alpha. To use Authorization for your Realtime Channels, use supabase-js
version v2.44.0
or later.
How it works
Realtime uses the messages
table in your database's realtime
schema to generate access policies for your clients when they connect to a Channel topic.
By creating RLS polices on the realtime.messages
table you can control the access users have to a Channel topic, and features within a Channel topic.
The validation is done when the user connects. When their WebSocket connection is established and a Channel topic is joined, their permissions are calculated based on:
- The RLS policies on the
realtime.messages
table - The user information sent as part of their Auth JWT
- The request headers
- The Channel topic the user is trying to connect to
When Realtime generates a policy for a client it performs a query on the realtime.messages
table and then rolls it back. Realtime does not store any messages in your realtime.messages
table.
Using Realtime Authorization involves two steps:
- In your database, create RLS policies on the
realtime.messages
- In your client, instantiate the Realtime Channel with the
config
optionprivate: true
Increased RLS complexity can impact database performance and connection time, leading to higher connection latency and decreased join rates.
Helper functions
You can use the following helper functions when writing RLS policies:
realtime.topic
Returns the Channel topic the user is attempting to connect to.
1234567create policy "authenticated can read all messages on topic"on "realtime"."messages"for selectto authenticatedusing ( (select realtime.topic()) = 'room-1');
Examples
The following examples use this schema:
1234567891011121314151617181920212223create table public.rooms ( id bigint generated by default as identity primary key, topic text not null unique);alter table public.rooms enable row level security;create table public.profiles ( id uuid not null references auth.users on delete cascade, email text NOT NULL, primary key (id));alter table public.profiles enable row level security;create table public.rooms_users ( user_id uuid references auth.users (id), room_topic text references public.rooms (topic), created_at timestamptz default current_timestamp);alter table public.rooms_users enable row level security;
Broadcast
The extension
field on the realtime.messages
table records the message type. For Broadcast messages, the value of realtime.messages.extension
is broadcast
. You can check for this in your RLS policies.
Allow a user to join (and read) a Broadcast topic
To join a Broadcast Channel, a user must have at least one read or write permission on the Channel topic.
Here, we allow reads (select
s) for users who are linked to the requested topic within the relationship table public.room_users
:
12345678910111213141516create policy "authenticated can receive broadcast"on "realtime"."messages"for selectto authenticatedusing (exists ( select user_id from rooms_users where user_id = (select auth.uid()) and topic = (select realtime.topic()) and realtime.messages.extension in ('broadcast') ));
Then, to join a topic with RLS enabled, instantiate the Channel with the private
option set to true
.
12345678910111213const channel = supabase.channel('room-1', { config: { private: true },})channel .on('broadcast', { event: 'test' }, (payload) => console.log(payload)) .subscribe((status, err) => { if (status === 'SUBSCRIBED') { console.log('Connected!') } else { console.error(err) } })
Allow a user to send a Broadcast message
To authorize sending Broadcast messages, create a policy for insert
where the value of realtime.messages.extension
is broadcast
.
Here, we allow writes (sends) for users who are linked to the requested topic within the relationship table public.room_users
:
12345678910111213141516create policy "authenticated can send broadcast on topic"on "realtime"."messages"for insertto authenticatedwith check ( exists ( select user_id from rooms_users where user_id = (select auth.uid()) and topic = (select realtime.topic()) and realtime.messages.extension in ('broadcast') ));
Presence
The extension
field on the realtime.messages
table records the message type. For Presence messages, the value of realtime.messages.extension
is presence
. You can check for this in your RLS policies.
Allow users to listen to Presence messages on a Channel
Create a policy for select
on realtime.messages
where realtime.messages.extension
is presence
.
12345678910111213141516create policy "authenticated can listen to presence in topic"on "realtime"."messages"for selectto authenticatedusing ( exists ( select user_id from rooms_users where user_id = (select auth.uid()) and topic = (select realtime.topic()) and realtime.messages.extension in ('presence') ));
Allow users to send Presence messages on a channel
To update the Presence status for a user create a policy for insert
on realtime.messages
where the value of realtime.messages.extension
is presence
.
12345678910111213141516create policy "authenticated can track presence on topic"on "realtime"."messages"for insertto authenticatedwith check ( exists ( select user_id from rooms_users where user_id = (select auth.uid()) and name = (select realtime.topic()) and realtime.messages.extension in ('presence') ));
Presence and Broadcast
Authorize both Presence and Broadcast by including both extensions in the where
filter.
Broadcast and Presence read
Authorize Presence and Broadcast read in one RLS policy.
12345678910111213141516create policy "authenticated can listen to broadcast and presence on topic"on "realtime"."messages"for selectto authenticatedusing ( exists ( select user_id from rooms_users where user_id = (select auth.uid()) and topic = (select realtime.topic()) and realtime.messages.extension in ('broadcast', 'presence') ));
Broadcast and Presence write
Authorize Presence and Broadcast write in one RLS policy.
12345678910111213141516create policy "authenticated can send broadcast and presence on topic"on "realtime"."messages"for insertto authenticatedwith check ( exists ( select user_id from rooms_users where user_id = (select auth.uid()) and name = (select realtime.topic()) and realtime.messages.extension in ('broadcast', 'presence') ));
Interaction with Postgres Changes
Realtime Postgres Changes are separate from Channel authorization. The private
Channel option does not apply to Postgres Changes.
When using Postgres Changes with RLS, database records are sent only to clients who are allowed to read them based on your RLS policies.
Updating RLS policies
Client access polices are cached for the duration of the connection. Your database is not queried for every Channel message.
Realtime updates the access policy cache for a client based on your RLS polices when:
- A client connects to Realtime and subscribes to a Channel
- A new JWT is sent to Realtime from a client via the
access_token
message
If a new JWT is never received on the Channel, the client will be disconnected when the JWT expires.
Make sure to keep the JWT expiration window short.