FastAPI middleware for Stytch B2B authentication with Redis caching, MongoDB entitlements, and team context
Project description
ayz-auth
FastAPI middleware for Stytch B2B authentication with Redis caching, MongoDB entitlements, and team context.
Overview
ayz-auth is a lightweight, production-ready authentication middleware for FastAPI applications using Stytch B2B authentication services. It provides session token verification with Redis caching for optimal performance, optional MongoDB integration for organization entitlements and team context, and includes comprehensive error handling and logging.
Version 2.0.0 adds support for feature-based authorization using organization entitlements and user team context, while maintaining 100% backwards compatibility with v1.x.
Features
Core Features
- 🔐 Stytch B2B Integration: Seamless integration with Stytch B2B authentication
- ⚡ Redis Caching: Intelligent caching to reduce API calls and improve performance
- 🚀 FastAPI Native: Built specifically for FastAPI with proper dependency injection
- 📝 Type Safe: Full Pydantic models with type hints throughout
- 🛡️ Security First: Secure token handling with configurable logging levels
- 🔧 Configurable: Environment-based configuration with sensible defaults
- 📊 Comprehensive Logging: Structured logging with sensitive data protection
- 🧪 Well Tested: Comprehensive test suite with mocking support
New in v2.0.0
- 🎫 Entitlements System: Feature-based authorization using subscription tiers and entitlements
- 👥 Team Context: User team membership for data filtering and multi-tenancy
- 🗄️ MongoDB Integration: Optional read-only access to organization and user data
- 🎯 Authorization Decorators:
require_entitlement,require_any_entitlement,require_all_entitlements - ♻️ 100% Backwards Compatible: Works with or without MongoDB, no breaking changes
Installation
Basic Installation (Authentication Only)
pip install ayz-auth
Or with UV:
uv add ayz-auth
Installation with MongoDB Support (v2.0.0+)
For entitlements and team context features:
pip install 'ayz-auth[mongodb]'
Or with UV:
uv add 'ayz-auth[mongodb]'
Quick Start
1. Environment Configuration
Create a .env file or set environment variables:
# Required
STYTCH_PROJECT_ID=your_project_id
STYTCH_SECRET=your_secret_key
STYTCH_ENV=test # or "live" for production
REDIS_URL=redis://localhost:6379
# Optional (v2.0.0+ - for entitlements and team context)
STYTCH_MONGODB_URI=mongodb://localhost:27017/soulmates
2. Basic Usage
from fastapi import FastAPI, Depends
from ayz_auth import verify_auth, StytchContext
app = FastAPI()
@app.get("/protected")
async def protected_route(user: StytchContext = Depends(verify_auth)):
return {
"message": f"Hello {user.member_email}",
"member_id": user.member_id,
"organization_id": user.organization_id
}
@app.get("/user-info")
async def get_user_info(user: StytchContext = Depends(verify_auth)):
return {
"member_id": user.member_id,
"email": user.member_email,
"name": user.member_name,
"organization_id": user.organization_id,
"session_expires_at": user.session_expires_at,
"authentication_factors": user.authentication_factors
}
3. Optional Authentication
For endpoints that work with or without authentication:
from typing import Optional
from ayz_auth import verify_auth_optional
@app.get("/optional-auth")
async def optional_route(user: Optional[StytchContext] = Depends(verify_auth_optional)):
if user:
return {"message": f"Hello {user.member_email}"}
else:
return {"message": "Hello anonymous user"}
4. Custom Authentication Requirements
Create custom dependencies with additional requirements:
from ayz_auth import create_auth_dependency
# Require specific custom claims
admin_auth = create_auth_dependency(required_claims=["admin"])
moderator_auth = create_auth_dependency(required_claims=["moderator", "verified"])
# Require specific authentication factors
mfa_auth = create_auth_dependency(required_factors=["mfa"])
@app.get("/admin")
async def admin_route(user: StytchContext = Depends(admin_auth)):
return {"message": "Admin access granted"}
@app.get("/sensitive")
async def sensitive_route(user: StytchContext = Depends(mfa_auth)):
return {"message": "MFA verified access"}
5. Entitlement-Based Authorization (v2.0.0+)
Requires MongoDB configuration - see Entitlements Guide
from ayz_auth import require_entitlement, require_any_entitlement, require_all_entitlements
# Require a single entitlement
@app.get("/foresight/analyze")
async def foresight_route(user: StytchContext = Depends(require_entitlement("foresight"))):
return {
"message": "Foresight analysis",
"team": user.current_team_name,
"tier": user.subscription_tier
}
# Require ANY of the specified entitlements
@app.get("/analytics")
async def analytics_route(user: StytchContext = Depends(require_any_entitlement("foresight", "analytics_basic"))):
return {"message": "Analytics dashboard"}
# Require ALL of the specified entitlements
@app.get("/premium")
async def premium_route(user: StytchContext = Depends(require_all_entitlements("foresight", "advanced_analytics"))):
return {"message": "Premium features"}
6. Team Context and Data Filtering (v2.0.0+)
Use team context for multi-tenant data isolation:
@app.get("/projects")
async def list_projects(user: StytchContext = Depends(verify_auth)):
# Filter by team if available
if user.current_team_id:
query = {"team_id": user.current_team_id}
else:
query = {"user_id": user.mongo_user_id}
projects = await db.projects.find(query).to_list()
return {"projects": projects}
Configuration
All configuration is handled through environment variables with the STYTCH_ prefix:
| Variable | Default | Description |
|---|---|---|
STYTCH_PROJECT_ID |
required | Your Stytch project ID |
STYTCH_SECRET |
required | Your Stytch secret key |
STYTCH_ENV |
test |
Stytch environment (test or live) |
STYTCH_REDIS_URL |
redis://localhost:6379 |
Redis connection URL |
STYTCH_REDIS_PASSWORD |
None |
Redis password (if required) |
STYTCH_REDIS_DB |
0 |
Redis database number |
STYTCH_CACHE_TTL |
300 |
Cache TTL in seconds (5 minutes) |
STYTCH_CACHE_PREFIX |
ayz_auth |
Redis key prefix |
STYTCH_LOG_LEVEL |
INFO |
Logging level |
STYTCH_LOG_SENSITIVE_DATA |
False |
Log sensitive data (never in production) |
STYTCH_REQUEST_TIMEOUT |
10 |
Request timeout in seconds |
STYTCH_MAX_RETRIES |
3 |
Maximum retry attempts |
STYTCH_MONGODB_URI |
None |
v2.0.0+ MongoDB connection URI for entitlements (optional) |
StytchContext Model
The StytchContext model contains all the essential session data from Stytch:
class StytchContext(BaseModel):
# Core identifiers
member_id: str
session_id: str
organization_id: str
# Session timing
session_started_at: datetime
session_expires_at: datetime
session_last_accessed_at: datetime
authenticated_at: datetime
# Member information
member_email: Optional[str]
member_name: Optional[str]
# Session metadata
session_custom_claims: Dict[str, Any]
authentication_factors: List[str]
raw_session_data: Dict[str, Any]
# v2.0.0+ Entitlements (None if MongoDB not configured)
entitlements: Optional[List[str]] = None
subscription_tier: Optional[str] = None
subscription_limits: Optional[Dict[str, int]] = None
# v2.0.0+ Team context (None if MongoDB not configured)
current_team_id: Optional[str] = None
current_team_name: Optional[str] = None
# v2.0.0+ MongoDB identifiers (None if MongoDB not configured)
mongo_user_id: Optional[str] = None
mongo_organization_id: Optional[str] = None
# Utility properties
@property
def is_expired(self) -> bool: ...
@property
def time_until_expiry(self) -> Optional[float]: ...
Error Handling
The middleware provides structured error responses:
# 401 Unauthorized - Missing or invalid token
{
"error": "authentication_failed",
"message": "Authorization header is required",
"type": "token_extraction"
}
# 401 Unauthorized - Token verification failed
{
"error": "authentication_failed",
"message": "Invalid or expired session token",
"type": "token_verification"
}
# 503 Service Unavailable - Stytch API issues
{
"error": "service_unavailable",
"message": "Authentication service temporarily unavailable",
"type": "stytch_api"
}
# 403 Forbidden - Insufficient permissions (custom auth)
{
"error": "insufficient_permissions",
"message": "Missing required claims: ['admin']",
"type": "authorization"
}
# 403 Forbidden - Insufficient authentication factors (custom auth)
{
"error": "insufficient_authentication",
"message": "Missing required authentication factors: ['mfa']",
"type": "authorization"
}
# 403 Forbidden - Missing entitlement (v2.0.0+)
{
"error": "forbidden",
"message": "This feature requires the 'foresight' entitlement",
"required_entitlement": "foresight",
"current_tier": "standard",
"upgrade_required": true
}
Caching Strategy
The middleware implements intelligent multi-tier caching:
Token Verification Cache
- Redis Cache Check: Fast lookup of previously verified tokens
- Stytch API Fallback: Fresh verification when cache misses
- Cache entries automatically expire based on session expiration time
Entitlements Cache (v2.0.0+)
- Organization entitlements: 1-hour TTL (changes infrequently)
- User context: 5-minute TTL (team changes may occur)
- Performance: Cached requests <10ms, uncached <100ms
Integration with Your User System
Since the middleware only returns Stytch session data, you can easily integrate it with your existing user system:
from your_app.models import User
from your_app.database import get_user_by_stytch_member_id
@app.get("/profile")
async def get_profile(stytch: StytchContext = Depends(verify_auth)):
# Use the member_id to fetch your user data
user = await get_user_by_stytch_member_id(stytch.member_id)
if not user:
raise HTTPException(404, "User not found")
# Check permissions using your user model
if "read_profile" not in user.permissions:
raise HTTPException(403, "Insufficient permissions")
return {
"stytch_data": stytch.to_dict(),
"user_data": user.to_dict()
}
Development
Running Tests
# Install development dependencies
uv sync --dev
# Run tests
pytest
# Run tests with coverage
pytest --cov=ayz_auth
Code Quality
# Format code
black src/ tests/
isort src/ tests/
# Lint code
ruff check src/ tests/
# Type checking
mypy src/
Contributing
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests for new functionality
- Ensure all tests pass
- Submit a pull request
License
MIT License - see LICENSE file for details.
Migrating from v1.x to v2.0.0
v2.0.0 is 100% backwards compatible with v1.x. Simply upgrade and optionally enable MongoDB features when ready.
See the Migration Guide for detailed upgrade instructions and best practices.
Additional Documentation
- Entitlements Guide - Detailed guide on entitlements and team context features
- Migration Guide - Upgrade instructions from v1.x to v2.0.0
- Example Usage - Complete example application with all features
Support
For issues and questions:
- GitHub Issues: https://github.com/brandsoulmates/ayz-auth/issues
- Documentation: https://github.com/brandsoulmates/ayz-auth
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file ayz_auth-2.0.1.tar.gz.
File metadata
- Download URL: ayz_auth-2.0.1.tar.gz
- Upload date:
- Size: 76.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4e4880f7d5fc9e21a999c5c55787456d666827457ffc5d2c9a3044a5686de67c
|
|
| MD5 |
8132d5e4426a0b5469cbc280737a5e2e
|
|
| BLAKE2b-256 |
092019ffccc9782b4e98af5d99018fe9b8b447cd05ff2d0c0d2e39a3601bc0c3
|
Provenance
The following attestation bundles were made for ayz_auth-2.0.1.tar.gz:
Publisher:
ci-cd.yml on brandsoulmates/ayz-auth
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
ayz_auth-2.0.1.tar.gz -
Subject digest:
4e4880f7d5fc9e21a999c5c55787456d666827457ffc5d2c9a3044a5686de67c - Sigstore transparency entry: 615588175
- Sigstore integration time:
-
Permalink:
brandsoulmates/ayz-auth@3e45afa0424d9047f341d01c0e5e365cffe214a5 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/brandsoulmates
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
ci-cd.yml@3e45afa0424d9047f341d01c0e5e365cffe214a5 -
Trigger Event:
push
-
Statement type:
File details
Details for the file ayz_auth-2.0.1-py3-none-any.whl.
File metadata
- Download URL: ayz_auth-2.0.1-py3-none-any.whl
- Upload date:
- Size: 31.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
14bf263d6f45f42eda15c1399510a2798618b48318d8e3552282398e6ed14b32
|
|
| MD5 |
2e5ce631caafcf35b402d9e625e4f2dc
|
|
| BLAKE2b-256 |
fb031af19d832e815b50792d3f9f6858ef32698fccaeafdec45635a8f53b0601
|
Provenance
The following attestation bundles were made for ayz_auth-2.0.1-py3-none-any.whl:
Publisher:
ci-cd.yml on brandsoulmates/ayz-auth
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
ayz_auth-2.0.1-py3-none-any.whl -
Subject digest:
14bf263d6f45f42eda15c1399510a2798618b48318d8e3552282398e6ed14b32 - Sigstore transparency entry: 615588224
- Sigstore integration time:
-
Permalink:
brandsoulmates/ayz-auth@3e45afa0424d9047f341d01c0e5e365cffe214a5 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/brandsoulmates
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
ci-cd.yml@3e45afa0424d9047f341d01c0e5e365cffe214a5 -
Trigger Event:
push
-
Statement type: