iOS Objective-C: Authorization
This tutorial will show you how assign roles to your users, and use those claims to authorize or deny a user to perform certain actions in the app. We recommend you to Log in to follow this quickstart with examples configured for your account.
I want to integrate with my app15 minutes
I want to explore a sample app2 minutes
Get a sample configured with your account settings or check it out on Github.
Many identity providers supply access claims which contain, for example, user roles or groups. You can request the access claims in your token with
scope: openid roles or
scope: openid groups.
If an identity provider does not supply this information, you can create a rule for assigning roles to users.
Create a Rule to Assign Roles
Create a rule that assigns the following access roles to your user:
- An admin role
- A regular user role
To assign roles, go to the New rule page. In the Access Control section, select the Set roles to a user template.
Edit the following line from the default script to match the conditions that fit your needs:
The rule is checked every time a user attempts to authenticate.
- If the user has a valid email and the domain is
@example.com, the user gets the admin role.
- If the email contains anything else, the user gets the regular user role.
Test the Rule in Your Project
Import the Swift wrapper and Auth0 library:
Restrict Content Based on Access Level
Now you can recognize the users with different roles in your app. You can use this information to give and restrict access to selected features in your app to users with different roles.
In the sample project, the user with the admin role can access the admin panel.