FLASK JWT implementing the RFC7519 proposed standard
Project description
Flask-JWT-RFC7519
This Repository is build on flask-jwt-extended. All credit for the framework goes to the owner of the flask-jwt-extended repository.
This implementation changes the jwt payload to follow the proposed standard of RFC7519. This includes sub, aud and iss claims.
Differences between flask-jwt-extended and this repo:
Added two config options. You can specify what who the ISS is and who the AUD is.
current_app.config['JWT_ISS_CLAIM'] (string)
current_app.config['JWT_AUD_CLAIM'] (list of strings)
The SUB is handled by the current_app.config['JWT_IDENTITY_CLAIM']
already in the flask-jwt-extended
To verify the AUD and/or ISS claim use respectively:
@jwt.aud_claim_verification_loader
@jwt.iss_claim_verification_loader
They will provide the value from key-value pair in the config dict. To handle incorrect aud or iss use the
@jwt.aud_claim_verification_failed_loader
@jwt.iss_claim_verification_failed_loader
The user_claims_loader is removed and replaced with additional_claims_loader.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for Flask_JWT_RFC7519-1.0.2-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | dcd804773108238206ffc284cef1e4d13dca6a435fa5d939563526f646768af9 |
|
MD5 | 4606221e23c8165b875e7bc6d0f5212e |
|
BLAKE2b-256 | 4d21f68cd1fe9c19b56abcfedd1985978276e9a3d611d7d07cc444a07e0e4596 |