Suggest edit

Usually, users are not assigned permissions in the application (although this is available), but rather roles. The role is associated with the permission set, not with the individual user.

Permissions are not a substitute for Gate or Policies included in the framework.

Typically, you manage several dozen permits in a typical business process. You can also have, say, 10 to 100 users. Although these users are not entirely different from each other, You can divide them into logical groups according to what they do with the program. These groups are called roles.

If you needed to manage users directly by assigning them permissions, it would be tedious and erroneous due to a large number of users and permissions.

  • You can group one, two, or more permissions in a role.
  • The user is assigned one or more roles.
  • A set of permissions owned by the user, calculated as a combination of permissions from each user role.


Method hasAccess will strictly require passed permission to be valid to grant access.

// Check is carried out both for the user and for his role

Method hasAnyAccess will grant access if any permission passes the check.

$user = User::find(1);

if ($user->hasAnyAccess(['user.admin', 'user.update'])) {
    // Execute this code if the user has permission

Note. Permissions can be checked based on wildcards using the * character to match any set of permissions.

$user = User::find(1);

if ($user->hasAccess('user.*')) {
    // Execute this code if the user has permission

The user has several options for managing roles:

// Get all user roles

// Check whether the user has a role

// Add role to user

In rare cases, you may need to take users who have permission directly or through a role. To do this, you can use:


// Or if the user has at least one of the passed permissions
   'non existent',


Roles also have procedures for:

// Returns all users with this role.

Admin Creation

To create a user with the maximum (at the time of creation) rights, run the following command:

php artisan orchid:admin nickname secretpassword

To give the existing user the maximum permissions, run with the --id option:

php artisan orchid:admin --id=1

If you have added new mandatory columns for the user and need to modify the command to add corresponding values, first specify Orchid to use your model by adding the following code to the service provider:

use Orchid\Support\Facades\Dashboard;

class AppServiceProvider extends ServiceProvider
    public function boot()

Then override the createAdmin method in your User model:

public static function createAdmin(string $name, string $email, string $password): void
    throw_if(static::where('email', $email)->exists(), 'User already exists');

        'name'        => $name,
        'email'       => $email,
        'password'    => Hash::make($password),
        'permissions' => Dashboard::getAllowAllPermission(),

Now you can modify this method as per your requirements, and when executing the creation command, this method will be executed.

Add Your Own Permissions

You can define your own permissions in applications. Using them, you explicitly implement access to certain functions.

An example of adding your own permissions using a provider:

use Illuminate\Support\ServiceProvider;
use Orchid\Platform\ItemPermission;
use Orchid\Platform\Dashboard;

class PermissionServiceProvider extends ServiceProvider
     * @param Dashboard $dashboard
    public function boot(Dashboard $dashboard)
        $permissions = ItemPermission::group('modules')
            ->addPermission('analytics', 'Access to data analytics')
            ->addPermission('monitor', 'Access to the system monitor');


Roles vs Permissions

It is generally best to code your app around permissions only.

Roles can still be used to group permissions for easy assignment, and you can still use the role-based helper methods if truly necessary. But most app-related logic can usually be best controlled using the can methods, which allows Laravel’s Gate layer to do all the heavy lifting.

eg: users have roles, and roles have permissions, and your app always checks for permissions, not roles.

Check-in Screens

Each created screen already has a built-in permission check set using method permission, which accepts both an array and a string value for verification:

namespace App\Orchid\Screens;

use Orchid\Screen\Screen;

class History extends Screen
     * The permissions required to access this screen.
    public function permission(): ?iterable
        return [
    // ...

If several keys are listed, access will be granted if the user has at least one permission.

If there is no access, the static method unaccessed will be called, which by default will show a 403 error. You can override this response, e.g. to redirect a payment page or return a different response:

use Illuminate\Http\RedirectResponse;

 * @return \Illuminate\Http\RedirectResponse
public static function unaccessed(): RedirectResponse
    return redirect('/other-screen');

Check-in Middleware

Small applications may not need to define permissions for each screen or class, instead, it makes sense to check their availability for routes. To do this, register a new middleware in app/Http/Kernel:

 * The application's route middleware.
 * These middleware may be assigned to groups or used individually.
 * @var array
protected $routeMiddleware = [
    'access' => \Orchid\Platform\Http\Middleware\Access::class,

After that, it can be used for any route definitions, by passing the parameter access:my-permission, just like in Auth::user()->hasAccess($string);

Route::screen('/stories', StoriesScreen::class)

You can also group them into groups:

Route::middleware(['access:systems.history'])->group(function () {
    Route::screen('/stories', StoriesScreen::class);
    Route::get('stories/best', function () {
        // ...

Check-in Blade

For applications that rely on Blade templating to render, it will be convenient to add “Custom If Statements” as follows:

use Illuminate\Support\Facades\Blade;
use Illuminate\Support\Facades\Auth;

 * Bootstrap any application services.
 * @return void
public function boot()
    Blade::if('hasAccess', function (string $value) {
        $user = Auth::user();

        if ($user === null) {
            return false;

        return $user->hasAccess($value);

Once the custom conditional has been defined, you can use it within your templates:

    <!-- User has permission for the 'platform.index' action -->
    <!-- User doesn't have permission for 'platform.index',
         but has permission for 'platform.other' -->
    <!-- User doesn't have permission for both 'platform.index'
         and 'platform.other' -->

    <!-- User doesn't have permission for 'platform.index' -->

User Impersonation

The Orchid\Access\Impersonation class provides developers with convenient functionality for logging in as another user. It allows administrators to impersonate other users in order to view and perform actions on their behalf. This is useful for troubleshooting and resolving issues reported by users.

To switch to another user, use the loginAs() method:

use Orchid\Access\Impersonation;

// Login as another user

To revert back to the original user, call the logout() method:

// Revert back to the original user

The isImpersonating() method checks if the impersonation has been performed:

if (Impersonation::isImpersonating()) {
    // The user is impersonating another user

The impersonator() method returns information about the original user. If no impersonation has been performed, the method will return null:

// Get information about the original user
$impersonator = Impersonation::impersonator();

Our Friends