Skip to main content

Verify OIDC JWT identity tokens using OIDC discovery

Project description

Python library to verify id tokens using OIDC discovery

PyPI - Version PyPI - Python Version GitHub Release Test suite status

OpenID connect identity tokens are a popular choice for federating identity between different systems without the need to share secrets. For example Trusted publishing on PyPI allows use of OIDC tokens created by GitHub or GitLab CI jobs to be used to authenticate when uploading new Python packages. Similarly, OIDC tokens can be used to authenticate to Google Cloud, AWS and Azure from any OIDC identity provider.

The jwt.io and jwt.ms tools allow validating OIDC id tokens without first configuring public keys by means of the OpenID connect discovery protocol.

This library implements the OpenID Connect discovery standard in Python to allow verification of OpenID Connect id tokens without previous configuration of public keys, etc.

Both synchronous and asynchronous (asyncio) implementations are provided.

Example

Suppose you created a GitLab OIDC token as part of a CI job to make an authenticated HTTP GET request to some service:

# .gitlab-ci.yml within https://gitlab.com/my-group/my-project

job_with_id_token:
  id_tokens:
    ID_TOKEN:
      aud: https://my-service.example.com
  script:
    - curl -X GET -H "Authorization: Bearer $ID_TOKEN" https://my-service.example.com

The following example shows how to verify the OIDC token came from a specific project within a backend implementation:

from typing import Any
from federatedidentity import Issuer, verifiers, verify_id_token

# Use OIDC discovery to fetch public keys for verifying GitLab tokens.
GITLAB_ISSUER = Issuer.from_discovery("https://gitlab.com")

# Expected project path for id token
EXPECTED_PROJECT_PATH = "my-group/my-project"

# Expected audience claim for id token.
EXPECTED_AUDIENCE_CLAIM = "https://my-service.example.com"

def verify_gitlab_token(token: str) -> dict[str, Any]:
    """
    Verify an OIDC token from GitLab and return the dictionary of claims. Raises
    federatedidentity.exceptions.FederatedIdentityError if the token failed verification.
    """
    return verify_id_token(
        token,
        valid_issuers=[GITLAB_ISSUER],
        valid_audiences=[EXPECTED_AUDIENCE_CLAIM],
        required_claims=[
            # The "project_path" claim must match the expected project.
            {"project_path": EXPECTED_PROJECT_PATH},
        ],
    )

See the full documentation for more examples.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

verify_oidc_identity-0.4.32.tar.gz (7.9 kB view details)

Uploaded Source

Built Distribution

verify_oidc_identity-0.4.32-py3-none-any.whl (10.5 kB view details)

Uploaded Python 3

File details

Details for the file verify_oidc_identity-0.4.32.tar.gz.

File metadata

  • Download URL: verify_oidc_identity-0.4.32.tar.gz
  • Upload date:
  • Size: 7.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for verify_oidc_identity-0.4.32.tar.gz
Algorithm Hash digest
SHA256 9e44b802c14c5dddde680f23cf801980ae78698a2a60810e00af8bf59e9266f1
MD5 d6b45768d9aab0420648da1db01fbab3
BLAKE2b-256 4ed57878580b80d52f8fa0781e987f40e877d09bcce7931b0edf4b8ba949a61c

See more details on using hashes here.

Provenance

The following attestation bundles were made for verify_oidc_identity-0.4.32.tar.gz:

Publisher: main.yml on rjw57/verify-oidc-identity

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file verify_oidc_identity-0.4.32-py3-none-any.whl.

File metadata

File hashes

Hashes for verify_oidc_identity-0.4.32-py3-none-any.whl
Algorithm Hash digest
SHA256 bffb8c3f3288e2351c61cd9d22906c6f67c70290c8b52ceade1a501fcbb837c1
MD5 25c24ebe2ef092b7d30a1721bcb0513d
BLAKE2b-256 7d602609c5e9e24dbe7067e0e85ef554b1c56785ead173203c95826dde7e93c7

See more details on using hashes here.

Provenance

The following attestation bundles were made for verify_oidc_identity-0.4.32-py3-none-any.whl:

Publisher: main.yml on rjw57/verify-oidc-identity

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page