Django app to authenticate with code or JWT for DjangoRestFramework
Project description
Experimental application to manage code and jwt auth from Auth0 with Django.
If you’re using the JWT mechanism, you’ll need to include the openid email scopes to get the email_verified claim.
This app provides a custom user model which is required for use with the app (see step 2 of setup).
Setup
Add to your INSTALLED_APPS setting like this:
INSTALLED_APPS = [ ... 'ECAuth0Backend', ]
Set django to use the ECAuth0Backend user model:
AUTH_USER_MODEL = 'ECAuth0Backend.A0User'
Include the URLconf in your project urls.py like this:
urlpatterns = [ # your urls ] + ECAuth0Backend.urls.urlpatterns
Run python manage.py migrate to create the user model.
Add the required configuration to your settings.py:
AUTH0_DOMAIN = '' # Your auth0 domain AUTH0_CLIENT_ID = '' # Your auth0 client ID for code auth AUTH0_CLIENT_SECRET = '' # Your auth0 client secret for code auth AUTH0_CALLBACK_URL = '' # Callback url you want auth0 to send the client back to (url pattern defined below) AUTH0_BACKEND_SUCCESS_REDIRECT = '' # where to redirect on successful code auth. Default '/success/' AUTH0_BACKEND_FAILURE_REDIRECT = '' # where to redirect on failed code auth. Default '/failed/' AUTH0_BACKEND_CALLBACK_URL = '' # url pattern to use for auth callback. Default r'^auth_callback/$' AUTH0_JWT_SECRET = '' # auth0 client secret for jwt client AUTH0_JWT_CLIENT_ID = '' # auth0 client id for jwt client AUTH0_JWT_HEADER_SEPARATOR = '' # jwt header separator, defaults to 'JWT'
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
ECAuth0Backend-0.1.3.tar.gz
(5.5 kB
view hashes)