Middleware to allow authorization using Keycloak and Django
Project description
Django Keycloak Authorization
Middleware to allow authorization using Keycloak and Django for DRF and Graphene based projects. This package can only be used for projects started from scratch since they override the users management.
Installation
-
Add
django_keycloak
to the DjangoINSTALLED_APPS
-
Add
django_keycloak.middleware.KeycloakMiddleware
to the Django `MIDDLEWARE -
Change Django
AUTHENTICATION_BACKENDS
to:AUTHENTICATION_BACKENDS = ( 'django_keycloak.backends.KeycloakAuthenticationBackend', )
-
Add the following to Django settings:
KEYCLOAK_CONFIG = { 'SERVER_URL': 'https://keycloak.staging.ubiwhere.com', 'INTERNAL_URL': 'https://keycloak.staging.ubiwhere.com', 'REALM': 'django', 'CLIENT_ID': 'api', 'CLIENT_SECRET_KEY': '0414b857-8430-4fbb-b86a-62bc398f37ea', 'CLIENT_ADMIN_ROLE': 'admin', 'REALM_ADMIN_ROLE': 'admin', 'EXEMPT_URIS': [], 'GRAPHQL_ENDPOINT': 'graphql/' }
-
Override the Django user model on settings:
AUTH_USER_MODEL = "django_keycloak.KeycloakUser"
-
If using graphene add the
GRAPHQL_ENDPOINT
to settings and ``KeycloakGrapheneMiddlewareto the graphene
MIDDLEWARE`
Django Admin
The Django superuser that can be used for the Django Admin login, must
created with the normal management command python manage.py createsuperuser
. But first you must create this user on keycloak and set a
client admin role and realm admin role like the CLIENT_ADMIN_ROLE
and
REALM_ADMIN_ROLE
that were added on settings previously.
Django Rest Framework
In the Django settings the the Rest Framework settings can't have any Authorization values (used in other projects). Example:
```json
# Rest framework settings
REST_FRAMEWORK = {
'DEFAULT_PAGINATION_CLASS': 'rest_framework.pagination.LimitOffsetPagination',
'PAGE_SIZE': 100, # Default to 20
'PAGINATE_BY_PARAM': 'page_size',
# Allow client to override, using `?page_size=xxx`.
'MAX_PAGINATE_BY': 100,
# Maximum limit allowed when using `?page_size=xxx`.
'TEST_REQUEST_DEFAULT_FORMAT': 'json'
}
```
DRY Permissions
The permissions must be set like in other projects. You must the the permissions configuration for each model. Example:
```json
@staticmethod
@authenticated_users
def has_read_permission(request):
roles = request.remote_user.get('client_roles')
return True if 'ADMIN' in roles else False
```
Keycloak users synchronization
The management command sync_keycloak_users
must be ran periodically. In
order to remove from the local users the ones that are no longer available at
keycloak. This command can be called using the task named sync_users_with_keycloak
,
using celery. Fot that you just need to:
-
Add the task to the
CELERY_BEAT_SCHEDULE
ìns Django settings:CELERY_BEAT_SCHEDULE = { 'sync_users_with_keycloak': { 'task': 'django_keycloak.tasks.sync_users_with_keycloak', 'schedule': timedelta(hours=24), 'options': {'queue': 'sync_users'} }, }
-
Add the
sync_users
queue to the docker-compose celery service:command: celery worker -A citibrain_base -B -E -l info -Q backup,celery,sync_users --autoscale=4,1
Attention: This task is only responsible to delete users from local storage. The creation of new users, that are on keycloak, is done when they try to login.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file django_uw_keycloak-0.3.tar.gz
.
File metadata
- Download URL: django_uw_keycloak-0.3.tar.gz
- Upload date:
- Size: 10.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.3.0 pkginfo/1.7.0 requests/2.25.1 setuptools/52.0.0 requests-toolbelt/0.9.1 tqdm/4.56.0 CPython/3.6.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 88e7befe9735e0e4a0193b860256a6598978d34d5372412b08aa5637688b63fb |
|
MD5 | 1f1981be5b6734392ef306733d7ad282 |
|
BLAKE2b-256 | d013a75c83fdc9b48d1e44e7c57f9f5daeab03f3de5420b241f8148a90a59083 |
File details
Details for the file django_uw_keycloak-0.3-py3-none-any.whl
.
File metadata
- Download URL: django_uw_keycloak-0.3-py3-none-any.whl
- Upload date:
- Size: 12.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.3.0 pkginfo/1.7.0 requests/2.25.1 setuptools/52.0.0 requests-toolbelt/0.9.1 tqdm/4.56.0 CPython/3.6.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | a023d492cf2374a4a82600b3ab0d83c1b5c6207886af7954bbe2e2ec7ea985e8 |
|
MD5 | cf0d796279b60fa817faf8da6f2cc43e |
|
BLAKE2b-256 | 4470cc3acfadb4f68c36f31afd2330f294336eab0ba1a4d441f2f5ce0548b9ec |