Skip to main content

A Django authentication backend for Microsoft ADFS

Project description

Documentation Status https://img.shields.io/pypi/v/django-auth-adfs.svg https://travis-ci.org/jobec/django-auth-adfs.svg?branch=master https://codecov.io/github/jobec/django-auth-adfs/coverage.svg?branch=master

A Django authentication backend for Microsoft ADFS

Features

  • Integrates Django with Active Directory through Microsoft ADFS by using OAuth2.

  • Provides seamless single sign on (SSO) for your Django project on intranet environments.

  • Auto creates users and adds them to Django groups based on info in JWT claims received from ADFS.

Installation

Python package:

pip install django-auth-adfs

In your project’s settings.py

AUTHENTICATION_BACKENDS = (
    ...
    'django_auth_adfs.backend.AdfsBackend',
    ...
)

INSTALLED_APPS = (
    ...
    # Needed for the ADFS redirect URI to function
    'django_auth_adfs',
    ...

# checkout config.py for more settings
AUTH_ADFS = {
    "ADFS_SERVER": "adfs.yourcompany.com",
    "ADFS_CLIENT_ID": "your-configured-client-id",
    "ADFS_RESOURCE": "your-adfs-RPT-name",
    "ADFS_SIGNING_CERT": "/path/to/adfs-signing-certificate.pem",
    # Make sure to read the documentation about the ADFS_AUDIENCE setting
    # when you configured the identifier as a URL!
    "ADFS_AUDIENCE": "microsoft:identityserver:your-RelyingPartyTrust-identifier",
    "ADFS_ISSUER": "http://adfs.yourcompany.com/adfs/services/trust",
    "ADFS_CA_BUNDLE": "/path/to/ca-bundle.pem",
    "ADFS_CLAIM_MAPPING": {"first_name": "given_name",
                           "last_name": "family_name",
                           "email": "email"},
    "ADFS_REDIR_URI": "https://www.yourcompany.com/oauth2/login",
}

########################
# OPTIONAL SETTINGS
########################
TEMPLATES = [
    {
        ...
        'OPTIONS': {
            'context_processors': [
                # Only needed if you want to use the variable ADFS_AUTH_URL in your templates
                'django_auth_adfs.context_processors.adfs_url',
                ...
            ],
        },
    },
]


MIDDLEWARE_CLASSES = (
    ...
    # With this you can force a user to login without using
    # the @login_required decorator for every view function
    #
    # You can specify URLs for which login is not forced by
    # specifying them in LOGIN_EXEMPT_URLS in setting.py.
    # The values in LOGIN_EXEMPT_URLS are interpreted as regular expressions.
    'django_auth_adfs.middleware.LoginRequiredMiddleware',
)

In your project’s urls.py

urlpatterns = [
    ...
    # Needed for the redirect URL to function
    # The namespace is important and shouldn't be changed
    url(r'^oauth2/', include('django_auth_adfs.urls', namespace='auth_adfs')),
    ...
]

The URL you have to configure as the redirect URL in ADFS depends on the url pattern you configure. In the example above you have to make the redirect url in ADFS point to https://yoursite.com/oauth2/login

Contributing

Contributions to the code are more then welcome. For more details have a look at the CONTRIBUTION.rst file.

Changelog

0.0.4 (2016-03-14)

  • Made the absence of the group claim non-fatal to allow users without a group.

0.0.3 (2016-02-21)

  • ADFS_REDIR_URI is now a required setting

  • Now supports Python 2.7, 3.4 and 3.5

  • Now supports Django 1.7, 1.8 and 1.9

  • Added debug logging to aid in troubleshooting

  • Added unit tests

  • Lot’s of code cleanup

0.0.2 (2016-02-11)

  • Fixed a possible issue with the cryptography package when used with apache + mod_wsgi.

  • Added a optional context processor to make the ADFS authentication URL available as a template variable (ADFS_AUTH_URL).

  • Added a optional middleware class to be able force an anonymous user to authenticate.

0.0.1 (2016-02-09)

  • Initial release

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django-auth-adfs-0.0.4.tar.gz (26.8 kB view details)

Uploaded Source

Built Distribution

django_auth_adfs-0.0.4-py3-none-any.whl (21.6 kB view details)

Uploaded Python 3

File details

Details for the file django-auth-adfs-0.0.4.tar.gz.

File metadata

File hashes

Hashes for django-auth-adfs-0.0.4.tar.gz
Algorithm Hash digest
SHA256 aca3434fc0b16944cbeaaa19b591fbc2bd6c74e2f79b3dc1180d12b02b3eecd2
MD5 8d21c02345a6470cfae16a21cd6a65da
BLAKE2b-256 5d3418d4b4efdbf0fbd00bccc982f0bb08621d56b1fe8fe962ac0fea726409e2

See more details on using hashes here.

File details

Details for the file django_auth_adfs-0.0.4-py3-none-any.whl.

File metadata

File hashes

Hashes for django_auth_adfs-0.0.4-py3-none-any.whl
Algorithm Hash digest
SHA256 7d8bdac97110b0611a2e2586c2caf8bb2c669c76c21cf2a977d73ae01aec3ca4
MD5 3ba1e1cb3a358a4b799ae45cb0a65f96
BLAKE2b-256 618a8fef13d96164b1ec6806cba2e3da7c3c71cd080233ddb475f19d33c32437

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page