Check Roles and Permissions with Authorization Checks
Authorization checks are checks you perform in your code to determine the access rights and privileges of a user, ensuring they have the necessary Permissions to perform specific actions or access certain content. These checks are essential for protecting sensitive data, gating premium features, and ensuring users stay within their allowed scope of access.
Within Organizations, authorization checks can be performed by checking a user's Roles or Custom Permissions. Roles like org:admin determine a user's level of access within an Organization, while Custom Permissions like org:invoices:create provide fine-grained control over specific features and actions.
Examples
For examples on how to perform authorization checks, see the guide on authorization checks.
You can protect content and even entire routes based on Organization membership, Roles, and Permissions by performing .
In the following example, the page is restricted to authenticated users, users who have the org:admin Role, and users who belong to the Acme Corp Organization.
- The
Authobject is used to access theisSignedInproperty andhas()method. - The
isSignedInproperty is used to check if the user is signed in. - The
has()method is used to check if the user has theorg:adminRole. - The useOrganization() hook is used to access the organization data.
- The Organization name is checked to ensure it matches the required Organization name. If a user is not in the required Organization, the page will display a message and the <OrganizationSwitcher /> component will be rendered to allow the user to switch to the required Organization.
'use client'
import { OrganizationSwitcher, useAuth, useOrganization } from '@clerk/nextjs'
export default function Page() {
// The `useAuth()` hook gives you access to properties like `isSignedIn` and `has()`
const { isSignedIn, has } = useAuth()
const { organization } = useOrganization()
// Check if the user is authenticated
if (!isSignedIn) {
return <p>You must be signed in to access this page.</p>
}
// Check if there is an Active Organization
if (!organization) {
return (
<>
<p>Set an Active Organization to access this page.</p>
<OrganizationSwitcher />
</>
)
}
// Check if the user has the `org:admin` Role
if (!has({ role: 'org:admin' })) {
return <p>You must be an admin to access this page.</p>
}
// Check if Organization name matches (e.g., "Acme Corp")
const requiredOrgName = 'Acme Corp'
if (organization.name !== requiredOrgName) {
return (
<>
<p>
This page is only accessible in the <strong>{requiredOrgName}</strong> Organization.
Switch to the <strong>{requiredOrgName}</strong> Organization to access this page.
</p>
<OrganizationSwitcher />
</>
)
}
return (
<p>
You are currently signed in as an <strong>admin</strong> in the{' '}
<strong>{organization.name}</strong> Organization.
</p>
)
}For more examples on how to perform authorization checks, see the dedicated guide.
You can protect content and even entire routes based on Organization membership, Roles, and Permissions by performing .
In the following example, the page is restricted to authenticated users, users who have the org:admin Role, and users who belong to the Acme Corp Organization.
- The
Authobject is used to access theisAuthenticatedandorgIdproperties, as well as thehas()method. - The
isAuthenticatedproperty is used to check if the user is authenticated. - The
orgIdproperty is used to check if there is an Active Organization. - The
has()method is used to check if the user has theorg:adminRole. - To fetch the Organization server-side, the clerkClient() helper is used to access the
getOrganization()method. - The Organization name is checked to ensure it matches the required Organization name. If a user is not in the required Organization, the page will display a message and the <OrganizationSwitcher /> component will be rendered to allow the user to switch to the required Organization.
This example is written for Next.js App Router, but can be adapted to other frameworks by using the appropriate method for accessing the Auth object, and the appropriate initialization for clerkClient().
import { auth, clerkClient } from '@clerk/nextjs/server'
import { OrganizationSwitcher } from '@clerk/nextjs'
export default async function Page() {
// The `Auth` object gives you access to properties like `isAuthenticated` and `userId`
// Accessing the `Auth` object differs depending on the SDK you're using
// https://clerk.com/docs/reference/backend/types/auth-object#how-to-access-the-auth-object
const { isAuthenticated, orgId, has } = await auth()
// Check if the user is authenticated
if (!isAuthenticated) {
return <p>You must be signed in to access this page.</p>
}
// Check if there is an Active Organization
if (!orgId) {
return (
<>
<p>Set an Active Organization to access this page.</p>
<OrganizationSwitcher />
</>
)
}
// Check if the user has the `org:admin` Role
if (!has({ role: 'org:admin' })) {
return <p>You must be an admin to access this page.</p>
}
// To fetch the Active Organization server-side,
// first initialize the JS Backend SDK.
// This varies depending on the SDK you're using
// https://clerk.com/docs/js-backend/getting-started/quickstart
// Then use the `clerkClient()` to access the `getOrganization()` method
const client = await clerkClient()
const organization = await client.organizations.getOrganization({ organizationId: orgId })
// Check if Organization name matches (e.g., "Acme Corp")
const requiredOrgName = 'Acme Corp'
if (organization.name !== requiredOrgName) {
return (
<>
<p>
This page is only accessible in the <strong>{requiredOrgName}</strong> Organization.
Switch to the <strong>{requiredOrgName}</strong> Organization to access this page.
</p>
<OrganizationSwitcher />
</>
)
}
return (
<p>
You are currently signed in as an <strong>admin</strong> in the{' '}
<strong>{organization.name}</strong> Organization.
</p>
)
}For more examples on how to perform authorization checks, see the dedicated guide.
Next steps
Now that you know how to check Roles and Permissions, you can:
Perform authorization checks
Learn how to perform authorization checks to limit access to content or entire routes based on a user's Role or Permissions.
Features and Plans
Learn how to check Features and Plans for Subscription-based applications.
Set up Roles and Permissions
Learn how to set up Roles and Permissions to control what invited users can access.
Configure default Roles
Learn how to configure default Roles for new Organization members.
Feedback
Last updated on