SDK to generate tokens for the 4th Platform
Project description
Python 3 SDK for Baikal
SDK to easilly generate tokens for an application in the 4th platform. It can be used asynchronously for aiohttp or asyncio frameworks.
NOTE: Starting from v0.1.3, the license has changed to Apache 2.0
Installation
You can install easily with pip:
pip install baikal-sdk
Usage
Create a client
from clients.baikal_client import OpenIDClient
oidc_client = OpenIDClient(
authserver_endpoint='https://auth.xxx.baikalplatform.com', # authserver endpoint
client_id='your_oauth_client_id',
client_secret='your_oauth_client_secret',
# For using grantUser method (jwt-bearer grant type)
client_keys=[{ 'key': 'stringWithTheKey', format: 'pem' }], # optional
issuer='http://yourserver.com/', # your jwt issuer id
private_certs_path='/path/to/certs/directory' # directory to read certificates/private keys.
)
If you want to use in an asynchronous environment:
from clients.aio.baikal_client import OpenIDClient
oidc_client = OpenIDClient(
authserver_endpoint='https://auth.xxx.baikalplatform.com', # authserver endpoint
client_id='your_oauth_client_id',
client_secret='your_oauth_client_secret',
# For using grantUser method (jwt-bearer grant type)
client_keys=[{ 'key': 'stringWithTheKey', format: 'pem' }], # optional
issuer='http://yourserver.com/', # your jwt issuer id
private_certs_path='/path/to/certs/directory' # directory to read certificates/private keys.
)
the asynchronous client will use aiohttp client to perform requests to authserver and will handle the asynchronous session internally. See aiohttp_example.py for a real example.
Get an access_token for a user using jwt-bearer
access_token = oidc_client.grant_user(
'userSUB',
['list', 'of', 'scopes'],
['list', 'of', 'purposes'],
authorization_id='46921050-e97c-418b-928c-4158256be92c', # optional
identifier={'id': 'my-phone-number', 'type': 'phone_number'}, # optional
full_authserver_response=False # optional (get full response, including expires_in, scopes ...)
)
to use it asynchronously (e.g. with aiohttp):
access_token = await oidc_client.async_grant_user(
'userSUB',
['list', 'of', 'scopes'],
['list', 'of', 'purposes'],
authorization_id='46921050-e97c-418b-928c-4158256be92c', # optional
identifier={'id': 'my-phone-number', 'type': 'phone_number'} # optional
)
Get a client_credentials access_token
access_token = oidc_client.grant_client(
scopes=['list', 'of', 'scopes'] #optional
purposes=['list', 'of', 'purposes'] #optional
)
The methods can be called asynchronously using await:
access_token = await oidc_client.async_grant_client(...)
Introspect access_token
payload = oidc_client.introspect(access_token)
assert 'scope-sep-string' in payload['scope']
The upper methods can be called in an asynchronous environment using await:
access_token = await oidc_client.async_introspect(...)
Expose your public keys in a server route to use with a jwt-bearer
If you have configured your issuer in the authserver to read from an endpoint, you should expose your public keys in an accessible route.
oid_client.get_jwk_set()
This will output the public part of your keys to be directly exposed in JWK format (required by authserver and any OIDC server).
Configuration
The OpenIDClient
configuration will be read from environment if ommited
export BAIKAL_AUTHSERVER_ENDPOINT='https://auth.xxx.baikalplatform.com'
export BAIKAL_CLIENT_ID='your_oauth_client_id'
export BAIKAL_CLIENT_SECRET='your_oauth_client_secret'
export BAIKAL_ISSUER='http://yourserver.com/'
export BAIKAL_PRIVATE_CERTS_PATH='/path/to/certs/directory'
Supported certs format are (should match the file extension):
- json: JSON stringified JWK
- private: DER encoded 'raw' private key
- pkcs8: DER encoded (unencrypted!) PKCS8 private key
- public: DER encoded SPKI public key (alternate to 'spki')
- spki: DER encoded SPKI public key
- pkix: DER encoded PKIX X.509 certificate
- x509: DER encoded PKIX X.509 certificate
- pem: PEM encoded of PKCS8 / SPKI / PKIX
Grant public methods accept a request config as the last argument, to allow specifying headers and timeout per-request (in seconds):
access_token = oid_client.grant_client(
scopes=["scope1"],
headers={
'X-Correlator': '1234-5678-9012-3456-7890'
},
timeout=30
)
If you are using the library against a Telefónica Kernel development environment, you can accept self-signed certs setting this environment variable:
export BAIKAL_VERIFY_CERTS=False # Accept self signed certs for authserver communication (not used in token validation)
Configure asynchronous connections
- AIOHTTP_SESSION_SIZE: max # of requests per session. By default 200.
- AIOHTTP_SESSION_DNS_CACHE: TTL of dns sessions. By default 20.
- AIOHTTP_SESSION_LIMIT: Total number of opened connections. By default 500.
Generate private keys
It's not needed to have private keys generated from a secured authority. For oauth2 verify you can use self-generated keys. Here it's included some tips.
If you want to generate different keys (in JWK format) for development purpose you can use https://mkjwk.org/.
Generate a RSA private key (with SHA 256 hash, RS256) (using openssl)
openssl genrsa -des3 -out private-rsa-protected.pem 2048
This will produce a private rsa key of 2048 bits protected with a password, in order to remove the password and use directly the private key in the library you can run this:
openssl rsa -in private-rsa-protected.pem -out private-rsa.pem
# rm private-rsa-protected.pem
Another option (single line) is to use this command:
openssl genpkey -out rsakey.pem -algorithm RSA -pkeyopt rsa_keygen_bits:2048
The private-rsa.pem can be used with the library to generate assertions and to expose the public key part as stated before. Just place the pem in your directory and point the sdk private_certs_path to it. The public key is automatically generated in JWK as you can check in the expose your public keys section.
It's not recommended to use rsa keys bigger than 2048 (e.g 4096) as the computational cost is not worth. It's better to have a keys rotation policy every given time (e.g. a week). It's also not recommended to use keys of 1024 length as it can be cracked.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file baikal-sdk-1.2.4.tar.gz
.
File metadata
- Download URL: baikal-sdk-1.2.4.tar.gz
- Upload date:
- Size: 15.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.7.16
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e593ba1228e686c496817a061851b42565d13e1e7c6794002c9fb56691ceeb99 |
|
MD5 | 47a9f8fc55f99f26a3a2686bbffa57f6 |
|
BLAKE2b-256 | 05c9d1589abbf4ccd72827e63651fbf1b11350264d8ebf560ef3bbc0127c8eb8 |