Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file added blog/clerk-multitenancy/cover.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
312 changes: 312 additions & 0 deletions blog/clerk-multitenancy/index.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,312 @@
---
title: "Building Multi-Tenant Apps Using Clerk's \"Organization\" and Next.js"
description: Clerk's "organization" feature provides a powerful pre-built tenant management experience. Let's see how we can easily create a full-fledged multi-tenant application with it.
tags: [auth, clerk, multi-tenancy]
authors: yiming
date: 2024-11-24
image: ./cover.png
---

# Building Multi-Tenant Apps Using Clerk's \"Organization\" and Next.js

![Cover Image](cover.png)

Building a full-fledged multi-tenant application can be very challenging. Besides having a flexible sign-up and sign-in system, you also need to implement several other essential pieces:

- Creating and managing tenants
- User invitation flow
- Managing roles and permissions
- Enforcing data segregation and access control throughout the entire application

It sounds like lots of work, and it indeed is. You may have done this multiple times if you're a veteran SaaS developer.

<!--truncate-->

[Clerk](https://clerk.com) is one of the most popular authentication and user management cloud services. Its combination of APIs and pre-built UI components dramatically simplifies the integration of such capabilities into your application. Similarly, its newer "Organization" feature provides an excellent starting point for creating multi-tenant applications. In this post, we'll explore leveraging it to build a non-trivial one while trying to keep our code simple and clean.

## The goal and the stack

The target application we'll build is a Todo List. Its core functionalities are simple: creating lists and managing todos within them. However, the focus will be on the multi-tenancy and access control aspects:

- **Organization management**

Users can create organizations and invite others to join. They can manage members and set their roles.

- **Current context**

Users can choose an organization to be the current context.

- **Data segregation**

Only data within the current organization can be accessed.

- **Role-based access control**

- Admin members have full access to all data within their organization.
- Regular members have full access to the todo lists they own.
- Regular members can view the other members' todo lists and manage their content, as long as the list is not private.

Clerk can be used with any JavaScript framework, but its support for Next.js seems to be the best. So we'll use Next.js as our full-stack framework, along with two other essential pieces of weapon:

- [Prisma](https://prisma.io): the ORM
- [ZenStack](https://zenstack.dev): the access control layer on top of Prisma

You can find the link of the completed project at the end of the post.

## Adding organization management

I assume you've created a Next.js project and set up the basic Clerk sign-up/sign-in flow following [the guide](https://clerk.com/docs/quickstarts/nextjs). Also, make sure you've[ enabled the "Organization" feature](https://clerk.com/docs/organizations/overview) in Clerk's dashboard.

Now, we can add the "OrganizationSwitcher" component into the layout.

```tsx title="src/app/layout.tsx"
// highlight-next-line
import { OrganizationSwitcher } from "@clerk/nextjs";
...

export default function RootLayout({ children }: { children: React.ReactNode }) {
return (
<ClerkProvider>
<html lang="en">
<body>
<header>
<SignedOut>
<SignInButton />
</SignedOut>
<SignedIn>
<div>
// highlight-next-line
<OrganizationSwitcher />
<UserButton />
</div>
</SignedIn>
</header>
</body>
</html>
</ClerkProvider>
);
}
```

With this one-liner, you'll have a set of fully working UI components for managing organizations and choosing an active one!

<div align="center">
<img src={require('./org-switcher.png').default} style={{borderRadius: '15px'}} width="480" />
</div>

## Setting up the database

Our user and organization data are stored on Clerk's side. We need to store the todo lists and items in our own database. In this section, we'll set up Prisma and ZenStack and create the database schema.

Let's start with installing the necessary packages:

```bash
npm install --save-dev prisma zenstack
npm install @prisma/client @zenstackhq/runtime
```

Then we can create the database schema. Please note that we're creating a **schema.zmodel** file (as a replacement of "schema.prisma"). The [ZModel language](/docs/the-complete-guide/part1/zmodel) is a superset of Prisma schema language, allowing you to model both the data schema and access control policies. In this section, we'll only focus on the data modeling part.

```zmodel title="/schema.zmodel"
datasource db {
provider = "postgresql"
url = env("DATABASE_URL")
}

generator js {
provider = "prisma-client-js"
}

// Todo list
model List {
id String @id @default(cuid())
createdAt DateTime @default(now())
title String
private Boolean @default(false)
orgId String?
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Make orgId required for proper tenant isolation

The orgId field is marked as optional (String?) which could potentially break tenant isolation. Since this is a multi-tenant application, every list should belong to an organization.

-  orgId     String?
+  orgId     String
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
orgId String?
orgId String

ownerId String
todos Todo[]
}

// Todo item
model Todo {
id String @id @default(cuid())
title String
completedAt DateTime?
list List @relation(fields: [listId], references: [id], onDelete: Cascade)
listId String
}
```

You can then generate a regular Prisma schema file and push the schema to the database:

```bash
# The `zenstack generate` command generates the "prisma/schema.prisma" file and runs "prisma generate"
npx zenstack generate
npx prisma db push
```

Finally, create a "src/server/db.ts" file to export the Prisma client:

```ts title="src/server/db.ts"
import { PrismaClient } from "@prisma/client";
export const prisma = new PrismaClient();
```

## Implementing access control

As mentioned, ZenStack allows you to model both data and access control in a single schema. Let's see how we can entirely implement our authorization requirements with it. The rules are defined with the `@@allow` and `@@deny` attributes. Access is rejected by default unless explicitly granted with an `@@allow` rule.

Although authorization is a distinct concept from authentication, it usually depends on authentication to work. For example, to determine if the current user has access to a list, a verdict must be made based on the user's id, current organization, and role in the organization. To access such information, let's first declare a type to express it:

```zmodel title="/schema.zmodel"
// The shape of `auth()`
type Auth {
// Current user's ID
userId String @id

// User's current organization ID
currentOrgId String?

// User's role in the current organization
currentOrgRole Role?

@@auth
}
```

Then you can use the special `auth()` function in access policy rules to access the current user's information. Let's use the `List` model as an example to demonstrate how the rules are defined.

```zmodel title="/schema.zmodel"
model List {
...

// deny anonymous access
@@deny('all', auth() == null)

// tenant segregation: deny access if the user's current org doesn't match
@@deny('all', auth().currentOrgId != orgId)

// owner/admin has full access
@@allow('all', auth().userId == ownerId || auth().currentOrgRole == 'org:admin')

// can be read by org members if not private
@@allow('read', !private)

// when create, owner must be set to current user
@@allow('create', ownerId == auth().userId)
}
```

The last piece of the puzzle is, as you may already be wondering, where the value of `auth()` comes from? At runtime, ZenStack offers an `enhance()` API to create an enhanced `PrismaClient` (a lightweighted wrapper) that automatically enforces the access policies. You pass in a user context (usually fetched from the authentication provider) when calling `enhance()`, and that context provides the value for `auth()`.

We'll see how it works in detail in the next section.

## Finally, the UI

Before diving into creating the UI, let's first make a helper to get an enhanced `PrismaClient` for the current user.

```ts title="src/server/db.ts"
import { auth } from "@clerk/nextjs/server";
import { Role } from "@prisma/client";
import { enhance } from "@zenstackhq/runtime";

export async function getUserDb() {
// get the current user's information from Clerk
const { userId, orgId, orgRole } = await auth();

// create an enhanced Prisma Client with proper user context
const user = userId
? {
userId,
currentOrgId: orgId,
currentOrgRole: orgRole
}
: undefined; // anonymous
return enhance(prisma, { user });
}
```

Let's build the UI using [React Server Components](https://nextjs.org/docs/app/building-your-application/rendering/server-components) (RSC) and [Server Actions](https://nextjs.org/docs/app/building-your-application/data-fetching/server-actions-and-mutations). We'll also consistently use the `getUserDb()` helper to access the database with access control enforcement.

Here's the RSC that renders the todo lists for the current user (with styling omitted):

```tsx title="src/components/TodoList.tsx"
// Component showing Todo list for the current user

export default async function TodoLists() {
const db = await getUserDb();

// enhanced PrismaClient automatically filters out
// the lists that the user doesn't have access to
const lists = await db.list.findMany({
orderBy: { updatedAt: "desc" },
});

return (
<div>
<div>
{/* client component for creating a new List */}
<CreateList />

<ul>
{lists?.map((list) => (
<Link href={`/lists/${list.id}`} key={list.id}>
<li>{list.title}</li>
</Link>
))}
</ul>
</div>
</div>
);
}
```

A client component that creates a new list by calling into a server action:

```tsx title="src/components/CreateList.tsx"
"use client";

import { createList } from "~/app/actions";

export default function CreateList() {
function onCreate() {
const title = prompt("Enter a title for your list");
if (title) {
createList(title);
}
}
Comment on lines +273 to +278
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Replace prompt() with a proper form component

Using prompt() for user input is not recommended for production applications. Consider implementing a proper form component with validation and better UX.

export default function CreateList() {
  const [isOpen, setIsOpen] = useState(false);
  const [title, setTitle] = useState('');

  async function onSubmit(e: React.FormEvent) {
    e.preventDefault();
    if (title.trim()) {
      await createList(title);
      setIsOpen(false);
      setTitle('');
    }
  }

  return (
    <>
      <button onClick={() => setIsOpen(true)}>Create a list</button>
      {isOpen && (
        <dialog open>
          <form onSubmit={onSubmit}>
            <input
              value={title}
              onChange={(e) => setTitle(e.target.value)}
              placeholder="List title"
              required
            />
            <button type="submit">Create</button>
            <button type="button" onClick={() => setIsOpen(false)}>
              Cancel
            </button>
          </form>
        </dialog>
      )}
    </>
  );
}


return (
<button onClick={onCreate}>
Create a list
</button>
);
}
```

```ts title="src/app/actions.ts"
'use server';

import { revalidatePath } from "next/cache";
import { getUserDb } from "~/server/db";

export async function createList(title: string) {
const db = await getUserDb();
await db.list.create({ data: { title } });
revalidatePath("/");
}
```
Comment on lines +294 to +299
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Add error handling to server action

The server action should include error handling and return appropriate error messages to the client.

 export async function createList(title: string) {
+  try {
     const db = await getUserDb();
     await db.list.create({ data: { title } });
     revalidatePath("/");
+    return { success: true };
+  } catch (error) {
+    console.error('Failed to create list:', error);
+    return { 
+      success: false, 
+      error: 'Failed to create list. Please try again.' 
+    };
+  }
 }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
export async function createList(title: string) {
const db = await getUserDb();
await db.list.create({ data: { title } });
revalidatePath("/");
}
```
export async function createList(title: string) {
try {
const db = await getUserDb();
await db.list.create({ data: { title } });
revalidatePath("/");
return { success: true };
} catch (error) {
console.error('Failed to create list:', error);
return {
success: false,
error: 'Failed to create list. Please try again.'
};
}
}


<div align="center">
<img src={require('./list-ui.gif').default} style={{borderRadius: '15px'}} width="640" />
</div>

The components that manage Todo items are not shown for brevity, but the ideas are similar. You can find the fully completed code [here](https://github.com/ymc9/clerk-zenstack-multitenancy).

## Conclusion

Authentication and authorization are two cornerstones of most applications. They can be especially challenging to build for multi-tenant ones. This post demonstrated how the work can be significantly simplified and streamlined by combining Clerk's "Organization" feature and ZenStack's access control capabilities. The end result is a secure application with great flexibility and little boilerplate code.

Clerk also supports defining [custom roles and permissions](https://clerk.com/docs/organizations/roles-permissions) (still Beta) for organizations. Although not covered in this post, with some tweaking, you should be able to leverage it to define access policies. That way, you can manage permissions with Clerk's dashboard and have ZenStack enforce them at runtime.

Binary file added blog/clerk-multitenancy/list-ui.gif
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added blog/clerk-multitenancy/org-switcher.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.