Skip to main content

The missing certificate infrastructure for web APIs.

Project description

CI Docs Coverage

Certified

An idiomatic framework for using certificates and cookies (macaroons/biscuits) within python web API-s.

We make the following design choices:

  • mTLS - mutual transport layer certificates (x509) authenticate client and server to one another

  • scopes - clients can "prove" they have access to a scope (e.g. admin) by including it within their 'certificatePolicies' at the handshake phase

  • tokens/cookies - we rely on the datalog model of biscuits to exchange cookies that carry authorization proofs. Tokens, not certificates are used to delegate authorization.

  • symmetry - symmetric ideas are used for setting up mutual identity verification (authentication) between client and server. This allows servers to act as clients in complex workflows, and clients to act as servers to run callbacks.

  • key management - we prescribe a file layout for these. Key file-names serve as a short-hand for referencing a given client/server. See docs/keys.


How do I know who originated an API request -- what organization they come from, and what kinds of organizational policies they have been asked to follow?

How can I consistently apply my own site's security policy to API actions?

And -- the big question -- how can I, as a client using an API, obtain, manage, and send these credentials to servers I interact with?

The certified package has you covered.

See documentation for explanations and howto-s.

License

Certified is available under a 3-clause BSD-style license, available in the file LICENSE.

Portions of certified (as marked in the code) are derived from python-trio/trustme, and are made available under the MIT license -- as reproduced within those files.

Installation

As a user, install with

pip install .

For development

As a developer, install with:

make install

Add new dependencies using, e.g.:

uv add pydantic          # run-time dependency
uv add --optional docs mkdocs-material # documentation-generation dep.
uv add --dev mypy        # development dependency

Run tests with:

uv run mypy .
uv run pytest

Preview the documentation with:

uv run mkdocs serve &

Docs

Documentation was built using this guide -- which comes highly recommended.

Roadmap

  • v0.8.1

    • use base64-encoded DER for storing keys in yaml files.

    • select certificate chain to send to server based on server name (test server configs.)

  • v0.9.0

    • better logging

    • simpler introduction methodology

    • readthedocs integration

    • biscuit examples

  • v0.10.0

    • more feature-ful 'message' function

    • add docs on how to use openssl to decode certificate contents

    • configurable biscuit_sec.Authorizor-based biscuit auth

    • better user experience with add-intro (now adds services)

    • better user experience with add-service (will look for json with ca_cert)

    • better user experience setting up org-level microservice certified set-org

  • v1.0.0

    • replace httpx with aiohttp (has better test client/server support).

    • change servers to services where appropriate

  • v1.1.0

    • fix biscuit_auth dependency version and change to uv packaging
  • v1.2.0

    • CI and better test coverage

    • better documentation for known_services and interface for showing configuration contents

  • v1.2.1

    • throw warning if id.crt does not contain the server's hostname in SAN (since this will usually result in a connection error from SSL)
  • v 1.3.0

    • Better documentation and more helpful error messages

    • Demo presentations and lessons learned

    • CLI interface for biscuit creation / validation

  • v1.4.0

  • v1.5.0

    • key rotation features and docs

Technology to watch

  • hardware certificate implementations (plug-ins?)

  • OAuth2 integrations / biscuit adoption

List of Useful Microservices

References

[openssl]: https://x509errors.org/guides/openssl "OpenSSL: TLS Guide" -- building a custom validator in C

Use of TLS/certs in services

more on custom attributes using openssl command

More on JWT/cookies/macaroons/biscuits

o

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

certified-1.1.0.tar.gz (47.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

certified-1.1.0-py3-none-any.whl (47.1 kB view details)

Uploaded Python 3

File details

Details for the file certified-1.1.0.tar.gz.

File metadata

  • Download URL: certified-1.1.0.tar.gz
  • Upload date:
  • Size: 47.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.8.15

File hashes

Hashes for certified-1.1.0.tar.gz
Algorithm Hash digest
SHA256 aab31281045331d0bb61c16614ebbaf147079c16aba9ea4f3718399636335405
MD5 63c61c88e798511f4477f8ff3950b24a
BLAKE2b-256 566d92ef5692650143c939552dcd0c3df7f07af1ed1f1f1af837425438fb3646

See more details on using hashes here.

File details

Details for the file certified-1.1.0-py3-none-any.whl.

File metadata

  • Download URL: certified-1.1.0-py3-none-any.whl
  • Upload date:
  • Size: 47.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.8.15

File hashes

Hashes for certified-1.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3c5804ce5ba3f264dac910f8bb8daf03bea8a1577893cdc7264a1bcff72902d1
MD5 78e8fd7335b474ba123b72a95b6b5ec8
BLAKE2b-256 03770ffff24c7c38e7d2c293a0299c067b67af80d2de0ed90b05de686f2dbaba

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page