Skip to main content

Django DRF module for SSO authentication using CAS, OIDC, SAML, etc. Under development, use at your own risks

Project description

DRF-SSO

Library for implementing SSO on full-stack applications using Django Rest Framework as backend.

Supported SSO Methods

  • CAS - Supported
  • SAMLv2 - Supported (except SLS, SP Initiated Only)
  • OAuth - Supported
  • OIDC - Supported

Configuration

Installation in settings.py example

DRF_SSO = {
    "FRONTEND_CALLBACK_URL": os.getenv("SSO_FRONT", "http://localhost:5173/access"),
    "MODULE_BASE_URL": os.getenv("SSO_BACK", "http://localhost:8000/sso/"),
    "PROVIDERS": {
        "oauth": {
            "title": "oidc_provider",
            "type": "OIDC",
            "populate_user": "core.utils.populate_from_m365",
            "config": {
                "client_id": os.getenv("M365_ID"),
                "client_secret": os.getenv("M365_SECRET"),
                "manifest_uri": "https://login.microsoftonline.com/organizations/v2.0/.well-known/openid-configuration",
            }
        },
        "cas": {
            "title": "cas_provider",
            "type": "CAS",
            "populate_user": "core.utils.populate_from_cas",
            "config": {
                "login_url": "https://mycas.com/login",
                "validate_url": "https://mycas.com/serviceValidate"
            }
        }
    }
}

Frontend Integration

The library exposes views that perform redirections to SSO services for authentication. It handles the retrieval of user attributes from Identity Providers and triggers a callback method with these attributes as parameters. The developer must define how to populate their user records from the retrieved attributes.

Once user processing is complete, a frontend callback is invoked with a handover token (short-lived JWT token, expires in 5 minutes) and optionally additional attributes. This callback must be implemented to perform a POST request to an endpoint exposed by the library (<Installation path URL>/tokens/), exchanging the handover token for the user's access and refresh JWT tokens.

The handover token serves as a secure bridge between the SSO completion and the frontend authentication flow, ensuring that sensitive user data and tokens are never exposed in URL parameters or browser history. The frontend receives this temporary token and immediately exchanges it for production tokens through a secure API call, maintaining the security of the authentication process while providing a seamless user experience.

User Population Methods

There are two ways to populate users:

Custom Method Implementation

You can add the populate_user key to a provider configuration and specify the path to your custom method.

The method signature must be:

def user_population(payload: dict, name: str) -> tuple[User, dict]:
    """
    Args:
        payload: User information from the provider (e.g., ID Token payload for OIDC)
        name: Provider name
    
    Returns:
        tuple: (User model instance, additional data dictionary)
    """
    user, created = User.objects.get_or_create(email=payload['email'])
    user.first_name = payload.get('given_name', '')
    user.last_name = payload.get('family_name', '')
    user.save()
    
    # Additional data to pass to frontend callback
    extra_data = {'department': payload.get('department'), 'new': created}
    
    return user, extra_data

After calling this method, the library invokes the frontend callback as follows: <URL>/<handover_token>?department=IT&new=False

Built-in Configuration Method

You can add the populate_user_conf key to a provider configuration with the following format:

{
    "lookup_field": ("email", "email"),  # (model_field, payload_key)
    "mappings": {
        "first_name": "given_name",        # Direct mapping
        "last_name": "family_name",        # Direct mapping
        "is_staff": lambda p: p.get('role') == 'admin'  # Callable mapping
    }
}

This method will get or create a user based on the lookup_field, then update the user model for each mapping key using either payload[str] or callable(payload).

Error Handling

You can and shoud surround your method with a try/except and you should raise drf_sso.exception.PopulationException, the library catch this exception when populating user. Then redirect to frontend callback with an "err" query parameter containing the details

Example:

if payload.get('department') != "HR":
    raise PopulationException("Only HR are authorized to login on this application.")

will redirect to: https://myfront.com/callback/?err=Only%20HR%20are%20authorized%20to%20login%20on%20this%20application.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

drf_sso_dev_internal-0.0.2b3.tar.gz (17.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

drf_sso_dev_internal-0.0.2b3-py3-none-any.whl (23.0 kB view details)

Uploaded Python 3

File details

Details for the file drf_sso_dev_internal-0.0.2b3.tar.gz.

File metadata

  • Download URL: drf_sso_dev_internal-0.0.2b3.tar.gz
  • Upload date:
  • Size: 17.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.2

File hashes

Hashes for drf_sso_dev_internal-0.0.2b3.tar.gz
Algorithm Hash digest
SHA256 6d15955e5253041592a6e173e3b05c4259765caa9970b8d257a8808c2ed52a75
MD5 dc381059e234e6fbde0b2228cad9b128
BLAKE2b-256 2b86a79323068584a6c258ec573a784e82220b49be46e388afa0037a12e35f32

See more details on using hashes here.

File details

Details for the file drf_sso_dev_internal-0.0.2b3-py3-none-any.whl.

File metadata

File hashes

Hashes for drf_sso_dev_internal-0.0.2b3-py3-none-any.whl
Algorithm Hash digest
SHA256 1d3bec0c1a12e79ce57f7aa12ffe5637109bc39a756f552d9d2b0ea8ed76eac2
MD5 c176a31947fbf7c7b3e747eac1ff39ec
BLAKE2b-256 4cbe05bebabbe0b10d29c98135680aeae93b906d0fd8735937c9913a99bebab5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page