2020-11-15 21:42:02 +00:00
---
title: Expression Policies
---
2021-05-29 19:47:35 +00:00
The passing of the policy is determined by the return value of the code. Use
2022-05-09 19:22:41 +00:00
2021-05-29 19:47:35 +00:00
```python
return True
```
2022-05-09 19:22:41 +00:00
2021-05-29 19:47:35 +00:00
to pass a policy and
2022-05-09 19:22:41 +00:00
2021-05-29 19:47:35 +00:00
```python
return False
```
2022-05-09 19:22:41 +00:00
2021-05-29 19:47:35 +00:00
to fail it.
2020-11-15 21:42:02 +00:00
2021-05-29 19:47:35 +00:00
## Available Functions
2020-11-15 21:42:02 +00:00
2021-05-29 19:47:35 +00:00
### `ak_message(message: str)`
2020-11-15 21:42:02 +00:00
Add a message, visible by the end user. This can be used to show the reason why they were denied.
Example:
```python
2020-12-05 21:08:42 +00:00
ak_message("Access denied")
2020-11-15 21:42:02 +00:00
return False
```
2021-12-09 08:37:41 +00:00
### `ak_call_policy(name: str, **kwargs) -> PolicyResult` (2021.12+)
2022-05-09 19:22:41 +00:00
Call another policy with the name _name_. Current request is passed to policy. Key-word arguments
2021-12-09 08:37:41 +00:00
can be used to modify the request's context.
Example:
```python
result = ak_call_policy("test-policy")
# result is a PolicyResult object, so you can access `.passing` and `.messages`.
return result.passing
result = ak_call_policy("test-policy-2", foo="bar")
# Inside the `test-policy-2` you can then use `request.context["foo"]`
return result.passing
```
2022-05-09 19:22:41 +00:00
import Functions from "../expressions/_functions.md";
2021-05-29 19:47:35 +00:00
<Functions />
## Variables
2022-05-09 19:22:41 +00:00
import Objects from "../expressions/_objects.md";
2021-05-29 19:47:35 +00:00
<Objects />
2020-11-15 21:42:02 +00:00
2022-05-09 19:22:41 +00:00
- `request`: A PolicyRequest object, which has the following properties:
2022-09-10 12:08:37 +00:00
2022-05-09 19:22:41 +00:00
- `request.user`: The current user, against which the policy is applied. See [User](../user-group/user.md#object-attributes)
2022-09-10 12:08:37 +00:00
:::warning
When a policy is executed in the context of a flow, this will be set to the previously authenticated user, i.e. when used with an authentication flow this will be set to _AnonymousUser_.
In flows, `context['pending_user']` should be used instead.
:::
2022-05-09 19:22:41 +00:00
- `request.http_request`: The Django HTTP Request. See ([Django documentation](https://docs.djangoproject.com/en/3.0/ref/request-response/#httprequest-objects))
- `request.obj`: A Django Model instance. This is only set if the policy is ran against an object.
- `request.context`: A dictionary with dynamic data. This depends on the origin of the execution.
2022-09-10 12:08:37 +00:00
2022-05-09 19:22:41 +00:00
- `geoip`: GeoIP object, which is added when GeoIP is enabled. See [GeoIP](https://geoip2.readthedocs.io/en/latest/#geoip2.models.City)
- `ak_is_sso_flow`: Boolean which is true if request was initiated by authenticating through an external provider.
- `ak_client_ip`: Client's IP Address or 255.255.255.255 if no IP Address could be extracted. Can be [compared](#comparing-ip-addresses), for example
2020-11-15 21:42:02 +00:00
```python
2020-12-05 21:08:42 +00:00
return ak_client_ip in ip_network('10.0.0.0/24')
2021-03-31 09:54:03 +00:00
# or
return ak_client_ip.is_private
2020-11-15 21:42:02 +00:00
```
2021-10-19 13:45:15 +00:00
See also [Python documentation](https://docs.python.org/3/library/ipaddress.html#ipaddress.ip_address)
2021-05-29 19:47:35 +00:00
2020-11-15 21:42:02 +00:00
Additionally, when the policy is executed from a flow, every variable from the flow's current context is accessible under the `context` object.
This includes the following:
2022-07-01 21:19:41 +00:00
- `context['flow_plan']`: The actual flow plan itself, can be used to inject stages.
2022-05-09 19:22:41 +00:00
- `context['prompt_data']`: Data which has been saved from a prompt stage or an external source.
- `context['application']`: The application the user is in the process of authorizing.
- `context['pending_user']`: The currently pending user, see [User](../user-group/user.md#object-attributes)
- `context['auth_method']`: Authentication method set (this value is set by password stages)
2021-08-23 15:23:55 +00:00
2021-08-28 10:50:42 +00:00
Depending on method, `context['auth_method_args']` is also set.
2021-08-23 15:23:55 +00:00
Can be any of:
2022-05-09 19:22:41 +00:00
- `password`: Standard password login
- `app_password`: App password (token)
2021-08-23 15:23:55 +00:00
2021-08-28 10:50:42 +00:00
Sets `context['auth_method_args']` to
2022-05-09 19:22:41 +00:00
2021-08-23 15:23:55 +00:00
```json
{
"token": {
"pk": "f6d639aac81940f38dcfdc6e0fe2a786",
"app": "authentik_core",
"name": "test (expires=2021-08-23 15:45:54.725880+00:00)",
"model_name": "token"
}
}
```
2022-05-09 19:22:41 +00:00
- `ldap`: LDAP bind authentication
2021-08-23 15:23:55 +00:00
2021-08-28 10:50:42 +00:00
Sets `context['auth_method_args']` to
2022-05-09 19:22:41 +00:00
2021-08-23 15:23:55 +00:00
```json
{
"source": {} // Information about the source used
}
```