Easy integration with OIDC authentication servers
Project description
Introduction
EasyOIDC is a Python library that provides a simple interface to the OpenID Connect protocol. It is designed to be easy to use and to integrate into existing applications. It is built on top of the Authlib library.
EasyOIDC can basically adapt to any web framework that supports session variables, route definition, and redirection. As an example, integration examples with Flask, NiceGUI, Streamlit and Taipy are provided.
In addition, the library has high-level classes, to integrate even more easily with Flask, NiceGUI and Taipy. The idea of the project is to gradually incorporate high-level support for new web frameworks from the Python world.
EasyOIDC has been tested with OIDC backends such as Keycloak, Google and Auth0, and could connect to virtually any OpenID Connect compatible server.
Installation
The library is available via PyPi (https://pypi.org/project/EasyOIDC/)
pip install easyoidc
If you are going to use it with a specific web framework, you can install it like this:
pip install easyoidc[flask]
pip install easyoidc[nicegui]
pip install easyoidc[taipy]
Usage
Flask
This is an example of how to integrate EasyOIDC with Flask:
from flask import Flask
from EasyOIDC import Config, SessionHandler
from EasyOIDC.frameworks.flask import FlaskOIDClient
app = Flask(__name__)
session_storage = SessionHandler(mode='redis')
auth_config = Config('.env')
auth = FlaskOIDClient(app, auth_config=auth_config, session_storage=session_storage)
@app.route('/')
def root():
is_authenticated = auth.is_authenticated()
if is_authenticated:
userinfo = auth.get_userinfo()
return f"Welcome to the Flask app with Middleware!.<br>User authenticated={is_authenticated}<br>{userinfo}<br><a href='/logout'>Logout</a>"
else:
return f"Welcome to the Flask app with Middleware!.<br><a href='/login'>Login</a>"
if __name__ == "__main__":
app.run()
NiceGUI
This is an example of how you can integrate EasyOIDC with NiceGUI:
from EasyOIDC import Config, SessionHandler
from EasyOIDC.frameworks.nicegui import NiceGUIOIDClient
from nicegui import app, ui
session_storage = SessionHandler(mode='shelve')
auth_config = Config('.env')
auth = NiceGUIOIDClient(app, auth_config=auth_config, session_storage=session_storage)
@ui.page('/')
def root():
is_authenticated = auth.is_authenticated()
with ui.column().classes('absolute-center '):
if is_authenticated:
ui.markdown(f"User authenticated!")
ui.markdown(f"Name: {auth.get_userinfo()['name']}")
ui.markdown(f"Email: {auth.get_userinfo()['email']}")
ui.markdown(f"Roles: {auth.get_user_roles()}")
ui.markdown(f"<a href='/logout'>Logout</a>").classes('text-2xl')
else:
ui.markdown(f"NiceGUI demo.<br><a href='/login'>Login</a>").classes('text-2xl')
if __name__ in {"__main__", "__mp_main__"}:
ui.run(storage_secret=auth_config.cookie_secret_key, port=5000)
Configuration
Your app routes and server endpoints, can be provided from json and .env files, or via a dict or code of course.
The following is an example of a .env file:
# Auth0 example configuration
# Secret keys
client_id = RqtJHUjAyEMXdgT4j2ScdOfjUhFACS9G
client_secret = diylwTR8O_Y4B8_4AFXPYRPft3z_Im14hD8suAG8OiLCRtJPuCT6yHqlELQn_Yf
cookie_secret_key = some-secret-key
# OIDC
well_known_openid_url = https://myapplication.us.auth0.com/.well-known/openid-configuration
redirect_uri = http://localhost:5000/authorize
# Application routes
app_login_route = /login
app_logout_route = /logout
app_authorize_route = /authorize
unrestricted_routes = /
post_logout_uri = http://localhost:5000
In that case, EasyOIDC will get the server endpoints from the well-known url. You can also adapt the file examples/.env.google to your needs.
If you want to provide the endpoints manually, you can do it as follows:
# Google endpoints configuration example:
# OIDC
well_known_openid_url = https://accounts.google.com/.well-known/openid-configuration
authorization_endpoint = https://accounts.google.com/o/oauth2/auth
token_endpoint = https://oauth2.googleapis.com/token
userinfo_endpoint = https://openidconnect.googleapis.com/v1/userinfo
token_revoke_endpoint = https://oauth2.googleapis.com/revoke
redirect_uri = http://localhost:5000/authorize
scope = openid,profile,email
And more examples via code:
from EasyOIDC import Config
config = Config(client_id='my_client_id',
client_secret='my_client_secret',
cookie_secret_key='some-secret-key',
redirect_uri='http://localhost:5000/authorize',
well_known_openid_url='https://myapplication.us.auth0.com/.well-known/openid-configuration',
app_login_route='/login',
app_logout_route='/logout',
app_authorize_route='/authorize',
unrestricted_routes='/',
post_logout_uri='http://localhost:5000')
Server session data storage
EasyOIDC needs to store some data in the server session, like tokens and authenticated user information. The library provides a SessionHandler class that can be used to store the session data in memory, in a file or in a Redis database. The SessionHandler class is initialized as follows:
from EasyOIDC import SessionHandler
# Redis memory storage
session_storage = SessionHandler(mode='redis')
# or for file storage
session_storage = SessionHandler(mode='shelve')
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file easyoidc-0.1.10.tar.gz
.
File metadata
- Download URL: easyoidc-0.1.10.tar.gz
- Upload date:
- Size: 11.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.0 CPython/3.9.19
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c71d735e80276d21630e88618f1cd5a914bcdf3b41d39331e9cb9185c65a5ad4 |
|
MD5 | f2b98833517e4dd68c28b0f7188dfbfa |
|
BLAKE2b-256 | 19d1bfa0ac66aca9bf21ffbcad9b58e0dd41f11671f984fd95634b8c04de5926 |
File details
Details for the file EasyOIDC-0.1.10-py3-none-any.whl
.
File metadata
- Download URL: EasyOIDC-0.1.10-py3-none-any.whl
- Upload date:
- Size: 15.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.0 CPython/3.9.19
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | a7811346dd2352de89aacbfa1a1c33425c1bb32cf6bd53cfa5fca437994dfc5c |
|
MD5 | 2517a922dee4ac7c3f53faf1d94204c5 |
|
BLAKE2b-256 | f471a4b4672c7ff53393a7f709b1a4b25063f9c45533439e4fa7041014d3dbe1 |