Access Manager v2 API for Android SDK
Unsupported docs
PubNub no longer maintains Android SDK docs, but our Java SDK or Kotlin SDK are fully compatible with the Android platform and you can use them to build mobile apps, ensuring stable software development.
Access Manager allows you to enforce secure controls for client access to resources within the PubNub network. With Access Manager, your servers can grant their clients access to individual PubNub resources for a limited duration, with the ability to extend access or add permissions for additional resources.
As soon as Access Manager is enabled, no publish/subscribe operations can be done without first explicitly providing an authorization token to the PubNub object. If an invalid token is provided, the requesting client will receive a Forbidden error.
For more information about Access Manager, refer to Managing Permissions with Access Manager.
Grant
Requires Access Manager add-on
This method requires that the Access Manager add-on is enabled for your key in the Admin Portal. Read the support page on enabling add-on features on your keys.
The grant method allows you to grant permissions for one or more resources to one or more authKeys. You may need to make multiple grant calls with an authKey so that you can specify explicit permissions for each channel, channelGroup and uuid resources. For common permissions, you can normally use a single request.
Privileges specifically granted to an application's subscribeKey always take precedence over privileges granted to channel or auth_key. Therefore an application that requires authentication at the user level should not grant access at either the Application or Channel levels. View the Grant Levels section for more details.
Permissions
The grant request allows your server to securely grant access for your clients on the following resources within the platform. Each resource allows a limited set of permissions that control the operations that can be performed by the clients. For permissions and API operations mapping information, refer to Managing Permissions with Access Manager.
| Resource | Permissions |
|---|---|
channel | read, write, get, manage, update, join, delete |
uuid | get, update, delete |
channelGroup | read, manage |
Wildcard permissions
Wildcard notation allows you to grant permissions to multiple channels at a time and later revoke these permissions in the same manner. You can only go one level deep using wildcards. In other words:
a.*grants access on all channels that begin witha..*ora.b.*won't work this way. If you grant on*ora.b.*, the grant treats*ora.b.*as a channel name, not a wildcard.
Wildcard revokes
You can revoke permissions with wildcards from one level deep, like a.*, only when you initially used wildcards to grant permissions to a.*.
Grant levels
When a user attempts to access a PubNub resource, Access Manager will evaluate any existing rules using the following order of precedence before access to a channel is granted to the user:
-
Application Level - Access Manager privileges are always evaluated first at the
Applicationlevel. If eitherreadorwriteattribute is set totruefor asubscribeKey, Access Manager will immediately grant access for that attribute without proceeding to check permissions at eitherChannelorUserlevels. If an attribute is set tofalseat the Application level, Access Manager proceeds to evaluate the attribute at the next most granular level. -
Channel Level - After first verifying an attribute at the Application level, Access Manager evaluates the attribute at the Channel level. If an attribute is set to
truefor a combination ofsubscribeKey, andchannel, Access Manager grants access for that attribute at theChannellevel without proceeding to check whether there may beuserlevel permissions. -
User Level (Recommended) - As a final step Access Manager evaluates the attributes at the
Userlevel. If an attribute is set totrueforsubscribeKey,channelandauth_key, access is granted for that attribute. Similarly, user level grants also allow you granting anauth_keyaccess tochannelGroupsanduuids. User level grants requireauth_keyand are the recommended approach if you need to manage permissions for individual users within your application. Each user should be assigned a uniqueauth_keyand securely passed back to the user to perform operations on the platform.
Method(s)
To Grant Permissions on a Channel you can use the following method(s) in the Android SDK:
1this.pubnub.grant().authKeys(Arrays).channels(Arrays).uuids(Arrays).write(Boolean).read(Boolean).manage(Boolean).delete(Boolean).get(Boolean).update(Boolean).join(Boolean).ttl(Long).async(PNCallback)
| Parameter | Description |
|---|---|
authKeysType: Arrays Default: n/a | Specifies auth Key to grant permissions. It is possible to specify multiple auth keys. You can also grant access to a single auth key for multiple channels at the same time. Zero or more channels with zero or more auth tokens are allowed. |
channelsType: Arrays Default: n/a | Specifies the channels on which to grant permissions. If no channels/channelGroups are specified, then the grant applies to any and all channels/channelGroups that have been or will be created for that publish/subscribe key set. Furthermore, any existing or future grants on specific channels are ignored, until the all channels grant is revoked. It is possible to grant permissions to multiple channels simultaneously. Wildcard notation like a.* can be used to grant access on channels. You can grant one level deep.
|
channelGroupsType: Arrays Default: n/a | Specifies the channelGroups to grant permissions. If no channels/channelGroups are specified, then the grant applies to any and all channels/channelGroups that have been or will be created for that publish/subscribe key set. Furthermore, any existing or future grants on specific channelGroups are ignored, until the all channelGroups grant is revoked. It is possible to grant permissions to multiple channelGroups simultaneously. This parameter does not support wildcards. |
uuidsType: Arrays Default: n/a | A list of uuids to grant permissions to. You can't grant permissions to channels and channel groups in the same request if you decide to use uuids. This parameter does not support wildcards. |
writeType: Boolean Default: false | Write permission |
readType: Boolean Default: false | Read permission |
manageType: Boolean Default: false | Manage permission |
deleteType: Boolean Default: false | Delete permission |
getType: Boolean Default: false | Get permission |
updateType: Boolean Default: false | Update permission |
joinType: Boolean Default: false | Join permission |
ttlType: Long Default: Not set | Time to live for permission to be valid |
async *Type: PNCallback Default: n/a | PNCallback of type PNAccessManagerGrantResult |
Sample code
Grant Access Manager permissions for channel and auth_key
1pubnub.grant()
2 .channels(Arrays.asList("ch1", "ch2", "ch3")) //channels to allow grant on
3 .channelGroups(Arrays.asList("cg1", "cg2", "cg3")) // groups to allow grant on
4 .authKeys(Arrays.asList("key1", "key2", "key3")) // the keys we are provisioning
5 .write(true) // allow those keys to write (false by default)
6 .manage(true) // allow those keys to manage channel groups (false by default)
7 .read(true) // allow keys to read the subscribe feed (false by default)
8 .delete(true) // allow keys to delete messages (false by default)
9 .ttl(12337) // how long those keys will remain valid (0 for eternity)
10 .async(new PNCallback<PNAccessManagerGrantResult>() {
11 @Override
12 public void onResponse(PNAccessManagerGrantResult result, PNStatus status) {
13 // PNAccessManagerGrantResult is a parsed and abstracted response from server
14 }
15 });
Returns
The grant() operation returns a PNAccessManagerGrantResult which contains the following operations:
| Method | Description |
|---|---|
getLevel()Type: String | Subkey or channel level. |
getTtl()Type: Int | Ttl of grant. |
getSubscribeKey()Type: String | The subscribeKey. |
getChannels()Type: Map<String, Map<String, PNAccessManagerKeyData>> | Access rights per channel. See PNAccessManagerKeyData for more details. |
getChannelGroups()Type: Map<String, Map<String, PNAccessManagerKeyData>> | Access rights per channel group. See PNAccessManagerKeyData for more details. |
PNAccessManagerKeyData
| Method | Description |
|---|---|
isReadEnabled()Type: Boolean | true if the user has read rights. |
isWriteEnabled()Type: Boolean | true if the user has write rights. |
isManageEnabled()Type: Boolean | true if the user has manage rights. |
isDeleteEnabled()Type: Boolean | true if the user has delete rights. |
Size of revoke requests
Access Manager grant or revoke requests must be less than ~32KiB at a time, or the client will return an error. For requests greater than 32KiB, break them into smaller batched requests. When the message size exceeds 32KiB the server returns the HTTP Error code 500, instead of the correct error code 414.
NTP configuration
For NTP synchronization, please ensure that you have configured NTP on your server to keep the clock in sync. This is to prevent system clock drift leading to 400 Invalid Timestamp error response. Read more in the support article.
Other examples
Grant subscribe access to a channel only for clients with a specific auth_key with a 5 minute ttl
1pubnub.grant()
2 .channels(Arrays.asList("my_channel"))
3 .write(false)
4 .read(true)
5 .authKeys(Arrays.asList("my_ro_authkey"))
6 .ttl(5)
7 .async(new PNCallback<PNAccessManagerGrantResult>() {
8 @Override
9 public void onResponse(PNAccessManagerGrantResult result, PNStatus status) {
10 // PNAccessManagerGrantResult is a parsed and abstracted response from server
11 }
12 });
The above code would return the following response to the client:
1if (!status.isError()) {
2 result.getTtl(); // 5
3 result.getLevel(); // user
4}
Allow access to a specific channel for Presence
1pubnub.grant()
2 .channels(Arrays.asList("my_channel-pnpres"))
3 .write(true)
4 .read(true)
5 .async(new PNCallback<PNAccessManagerGrantResult>() {
6 @Override
7 public void onResponse(PNAccessManagerGrantResult result, PNStatus status) {
8 // PNAccessManagerGrantResult is a parsed and abstracted response from server
9 }
10 });
Grant Access Manager permissions for channel group
1pubnub.grant()
2 .channelGroups(Arrays.asList("cg1", "cg2", "cg3")) // groups to allow grant on
3 .authKeys(Arrays.asList("key1", "key2", "key3")) // the keys we are provisioning
4 .write(true) // allow those keys to write (false by default)
5 .manage(true) // allow those keys to manage channel groups (false by default)
6 .read(true) // allow keys to read the subscribe feed (false by default)
7 .ttl(12337) // how long those keys will remain valid (0 for eternity)
8 .async(new PNCallback<PNAccessManagerGrantResult>() {
9 @Override
10 public void onResponse(PNAccessManagerGrantResult result, PNStatus status) {
11 // PNAccessManagerGrantResult is a parsed and abstracted response from server
12 }
13 });
The above code would return the following response to the client:
1if (!status.isError()) {
2 result.getTtl(); // 12337
3 result.getLevel(); // user
4}
Application level grant
Use application level grants with caution
When access is granted on an application level, all channels and users will have access.
Application level grants can also happen due to a bug in your code. For example, Null parameters for channels and auth-keys can cause accidental application level grants.
1pubnub.grant()
2 .write(true)
3 .read(true)
4 .async(new PNCallback<PNAccessManagerGrantResult>() {
5 @Override
6 public void onResponse(PNAccessManagerGrantResult result, PNStatus status) {
7 // PNAccessManagerGrantResult is a parsed and abstracted response from server
8 }
9 });
Channel level grant
1pubnub.grant()
2 .channels(Arrays.asList("my_channel"))
3 .write(true)
4 .read(true)
5 .async(new PNCallback<PNAccessManagerGrantResult>() {
6 @Override
7 public void onResponse(PNAccessManagerGrantResult result, PNStatus status) {
8 // PNAccessManagerGrantResult is a parsed and abstracted response from server
9 }
10 });
User level grant
1pubnub.grant()
2 .channels(Arrays.asList("my_channel"))
3 .write(true)
4 .read(true)
5 .authKeys(Arrays.asList("my_authkey"))
6 .ttl(5)
7 .async(new PNCallback<PNAccessManagerGrantResult>() {
8 @Override
9 public void onResponse(PNAccessManagerGrantResult result, PNStatus status) {
10 // PNAccessManagerGrantResult is a parsed and abstracted response from server
11 }
12 });
UUID level grant
1pubnub.grant()
2 .uuids(Arrays.asList("uuid1", "uuid2")) // uuids to allow grant on
3 .authKeys(Arrays.asList("key1")) // the keys you are provisioning
4 .get(true) // allow those keys to get (false by default)
5 .update(true) // allow those keys to update (false by default)
6 .delete(true) // allow keys to delete (false by default)
7 .ttl(60) // how long those keys will remain valid (0 for eternity)
8 .async(new PNCallback<PNAccessManagerGrantResult>() {
9 @Override
10 public void onResponse(PNAccessManagerGrantResult result, PNStatus status) {
11 // PNAccessManagerGrantResult is a parsed and abstracted server response
12 }
13 });