Skip to main content

Django REST Framework JWT Authentication package enables to authenticate to Django REST Framework's API Views and ViewSets by using JWT (in header or as query param).

Project description

DRF JWT Auth

Django REST Framework JWT Authentication package enables to authenticate to Django REST Framework's API Views and ViewSets by using JWT (in header or as query param).

In difference with other packages, this package offers the following features:

  • The user autheticated is based on the payload info, so no user is loaded from database.
  • So that, the user model that you will find on every request.user will be an instance of drfjwtauth.user.JWTUser, a class that keeps the same API that django.contrib.auth.models.User but is not loaded from database and no write operations can be made over that user (due to it's not a model).
  • Provides a view (in drfjwtauth.views.VerifyJWTView) to verify a token using a POST request.
  • NO login or token renew views are provided

Installation

$ pip install drf-jwt-auth

Setup

Authentication class

You can setup DRF JWT Auth as authentication class in two ways:

  1. As default authentication class adding to the DEFAULT_AUTHENTICATION_CLASSES key in the the global DRF settings:
REST_FRAMEWORK = {
    [...]
    'DEFAULT_AUTHENTICATION_CLASSES': ['...', 'drfjwtauth.auth.JWTAuth',  '...'],
    [...]
}
  1. In every APIView/ViewSet/view function:
from rest_framework.views import APIView
from drfjwtauth.auth import JWTAuth

class ExampleView(APIView):
    authentication_classes = [JWTAuth]

@authentication_classes([JWTAuth])
def example_view(request, format=None):
    [...]

Token Verify View

In your project's urls.py:

from django.urls import path

from drfjwtauth.views import VerifyJWTView

urlpatterns = [
    [...],
    path('token/verify/', VerifyJWTView.as_view(), name='token-verify')
    [...],
]

Available settings and defaults

In your Django project's settings you can setup the following dict and keys:

DRF_JWT_AUTH = {
    'ALGORITHM': JWT algorithm to sign tokens (HS256 by default).
    'SIGNING_KEY': Secret key to sign tokens (same value as Django SECRET_KEY settings by default).
    'AUTH_HEADER': Value before the token in the HTTP Authorization header (Bearer by default).
    'QUERY_PARAM_NAME': Value before the query param name for HTTP GET requests (jwt by default).
}

Django management commands

This package adds two management commands that let's you to create JWT with a specific expiration date, generate_jwt and generate_jwt_from_db:

  • generate_jwt: Accept the next arguments to create a JWT without database based on default's Django User Model:
    • username [positional][mandatory]
    • -d, --expiration_date [mandatory]. A date in isoformat to invalidate the JWT.
    • --id [optional]
    • --first_name [optional]
    • --last_name [optional]
    • --email [optional]
    • --is_active [optional]
    • --is_staff [optional]
    • --is_superuser [optional]
    • --channels ... [optional]
    • --groups ... [optional]
    • --permissions ... [optional]

For example:

python manage.py generate_jwt new_user -d 2030-12-31 --id 1 --first_name New --last_name User --email new_user@company.com --is_active --is_staff --channels a b --groups web_users --permissions can_visit_dashboards
  • generate_jwt_from_db: Given a username and a expiration date will return a JWT for the matched user in the database:
    • username [positional][mandatory]
    • -d, --expiration_date [mandatory]. A date in isoformat to invalidate the JWT.

For example:

python manage.py generate_jwt existing_user -d 2030-12-31

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

drf-jwt-auth-0.2.3.tar.gz (8.0 kB view details)

Uploaded Source

File details

Details for the file drf-jwt-auth-0.2.3.tar.gz.

File metadata

  • Download URL: drf-jwt-auth-0.2.3.tar.gz
  • Upload date:
  • Size: 8.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.7.10

File hashes

Hashes for drf-jwt-auth-0.2.3.tar.gz
Algorithm Hash digest
SHA256 837314c7620b5512a0fa1199fb3b9a3dd6146bcc5eb6b13c29e3a478f8d41128
MD5 ab42acd8de9d824c6c65bcc64c007097
BLAKE2b-256 e20b7414cf64e440f1625094258e114bbfbac899642b3e4efc77dea77c338a12

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page