Loading...
Loading...
Complete guide for Frappe/ERPNext permission system - roles, user permissions, perm levels, data masking, and permission hooks
npx skill4agent add openaec-foundation/erpnext_anthropic_claude_development_skill_package erpnext-permissionsDeterministic patterns for implementing robust permission systems in Frappe/ERPNext applications.
| Layer | Controls | Configured Via | Version |
|---|---|---|---|
| Role Permissions | What users CAN do | DocType permissions table | All |
| User Permissions | WHICH documents users see | User Permission records | All |
| Perm Levels | WHICH fields users see | Field permlevel property | All |
| Permission Hooks | Custom logic | hooks.py | All |
| Data Masking | MASKED field values | Field mask property | v16+ |
| Type | Check | For |
|---|---|---|
| | View document |
| | Edit document |
| | Create new |
| | Delete |
| | Submit (submittable only) |
| | Cancel |
| | Select in Link (v14+) |
| Role permission for unmasked view | View unmasked data (v16+) |
| Role | Assigned To |
|---|---|
| Everyone (including anonymous) |
| All registered users |
| Only Administrator user |
| System Users (v15+) |
# DocType level
frappe.has_permission("Sales Order", "write")
# Document level
frappe.has_permission("Sales Order", "write", "SO-00001")
frappe.has_permission("Sales Order", "write", doc=doc)
# For specific user
frappe.has_permission("Sales Order", "read", user="john@example.com")
# Throw on denial
frappe.has_permission("Sales Order", "delete", throw=True)
# On document instance
doc = frappe.get_doc("Sales Order", "SO-00001")
if doc.has_permission("write"):
doc.status = "Approved"
doc.save()
# Raise error if no permission
doc.check_permission("write")from frappe.permissions import get_doc_permissions
# Get all permissions for document
perms = get_doc_permissions(doc)
# {'read': 1, 'write': 1, 'create': 0, 'delete': 0, ...}from frappe.permissions import add_user_permission, remove_user_permission
# Restrict user to specific company
add_user_permission(
doctype="Company",
name="My Company",
user="john@example.com",
is_default=1
)
# Remove restriction
remove_user_permission("Company", "My Company", "john@example.com")
# Get user's permissions
from frappe.permissions import get_user_permissions
perms = get_user_permissions("john@example.com")from frappe.share import add as add_share
# Share document with user
add_share(
doctype="Sales Order",
name="SO-00001",
user="jane@example.com",
read=1,
write=1
)mask****+91-811XXXXXXX{
"fieldname": "phone_number",
"fieldtype": "Data",
"options": "Phone",
"mask": 1
}mask{
"permissions": [
{"role": "Employee", "permlevel": 0, "read": 1},
{"role": "HR Manager", "permlevel": 0, "read": 1, "mask": 1}
]
}┌─────────────────────────────────────────────────────────────────────┐
│ DATA MASKING FLOW │
├─────────────────────────────────────────────────────────────────────┤
│ │
│ 1. Field has mask=1 in DocField configuration │
│ │
│ 2. System checks: meta.has_permlevel_access_to( │
│ fieldname=df.fieldname, │
│ df=df, │
│ permission_type="mask" │
│ ) │
│ │
│ 3. If user LACKS mask permission: │
│ └─► Value automatically masked in: │
│ • Form views │
│ • List views │
│ • Report views │
│ • API responses (/api/resource/, /api/method/) │
│ │
│ 4. If user HAS mask permission: │
│ └─► Full value displayed │
│ │
└─────────────────────────────────────────────────────────────────────┘frappe.db.sql()def get_customer_report(filters):
data = frappe.db.sql("""
SELECT name, phone, email FROM tabCustomer
""", as_dict=True)
# Manual masking for users without permission
if not frappe.has_permission("Customer", "mask"):
for row in data:
if row.phone:
row.phone = mask_phone(row.phone)
return data
def mask_phone(phone):
"""Mask phone number: +91-81123XXXXX"""
if len(phone) > 5:
return phone[:6] + "X" * (len(phone) - 6)
return "****"# hooks.py
has_permission = {
"Sales Order": "myapp.permissions.check_order_permission"
}# myapp/permissions.py
def check_order_permission(doc, ptype, user):
"""
Returns:
None: Continue standard checks
False: Deny permission
"""
# Deny editing cancelled orders for non-managers
if ptype == "write" and doc.docstatus == 2:
if "Sales Manager" not in frappe.get_roles(user):
return False
return None # ALWAYS return None by defaultget_list()get_all()# hooks.py
permission_query_conditions = {
"Customer": "myapp.permissions.customer_query"
}# myapp/permissions.py
def customer_query(user):
"""Return SQL WHERE clause fragment."""
if not user:
user = frappe.session.user
# Managers see all
if "Sales Manager" in frappe.get_roles(user):
return ""
# Others see only their customers
return f"`tabCustomer`.owner = {frappe.db.escape(user)}"frappe.db.escape()| Method | User Permissions | Query Hook |
|---|---|---|
| ✅ Applied | ✅ Applied |
| ❌ Ignored | ❌ Ignored |
# User-facing query - respects permissions
docs = frappe.get_list("Sales Order", filters={"status": "Open"})
# System query - bypasses permissions
docs = frappe.get_all("Sales Order", filters={"status": "Open"}){
"fieldname": "salary",
"fieldtype": "Currency",
"permlevel": 1
}{
"permissions": [
{"role": "Employee", "permlevel": 0, "read": 1},
{"role": "HR Manager", "permlevel": 0, "read": 1, "write": 1},
{"role": "HR Manager", "permlevel": 1, "read": 1, "write": 1}
]
}Need to control access?
├── To entire DocType → Role Permissions
├── To specific documents → User Permissions
├── To specific fields (hide completely) → Perm Levels
├── To specific fields (show masked) → Data Masking (v16+)
├── With custom logic → has_permission hook
└── For list queries → permission_query_conditions hook
Checking permissions in code?
├── Before action → frappe.has_permission() or doc.has_permission()
├── Raise error → doc.check_permission() or throw=True
└── Bypass needed → doc.flags.ignore_permissions = True (document why!){
"role": "Sales User",
"read": 1, "write": 1, "create": 1,
"if_owner": 1
}@frappe.whitelist()
def approve_order(order_name):
doc = frappe.get_doc("Sales Order", order_name)
if not doc.has_permission("write"):
frappe.throw(_("No permission"), frappe.PermissionError)
doc.status = "Approved"
doc.save()@frappe.whitelist()
def sensitive_action():
frappe.only_for(["Manager", "Administrator"])
# Only reaches here if user has rolefrappe.db.escape(user)frappe.clear_cache()| ❌ Don't | ✅ Do |
|---|---|
| |
| |
| |
| |
| |
| Assume masking in custom SQL | Implement masking manually |
| Feature | v14 | v15 | v16 |
|---|---|---|---|
| ✅ | ✅ | ✅ |
| ❌ | ✅ | ✅ |
| Custom Permission Types | ❌ | ❌ | ✅ (experimental) |
| Data Masking | ❌ | ❌ | ✅ |
| ❌ | ❌ | ✅ |
# Enable debug output
frappe.has_permission("Sales Order", "read", doc, debug=True)
# View logs
print(frappe.local.permission_debug_log)
# Check user's effective permissions
from frappe.permissions import get_doc_permissions
perms = get_doc_permissions(doc, user="john@example.com")references/permission-types-reference.mdpermission-api-reference.mdpermission-hooks-reference.mdexamples.mdanti-patterns.mderpnext-databaseerpnext-syntax-controllerserpnext-syntax-hooks