A collection of HTTP(s) JupyterHub Header Authenticators,including a Header, and Dummy authenticator
Project description
An extended collection of HTTP(S) header JupyterHub Authenticators that relies on proxy authenticating. Every mentioned authenticator should be used while following the mentioned security recommendations at cwaldbieser.
Installation
Installation from pypi:
pip install jhub-authenticators
Installation from local git repository:
cd jhub-authenticators pip install .
Dummy Authentication
Provides an option for testing JupyterHub authentication with a dummy authenticator that can have a global preset password for any account:
c.JupyterHub.authenticator_class = 'jhubauthenticators.DummyAuthenticator' c.DummyAuthenticator.password = 'password'
Note! Don’t use in production.
Header Authentication
This Header Authentication method provides multiple functionalities beyond mere authentication. It can activated by adding the following to the JupyterHub configuration:
c.JupyterHub.authenticator_class = 'jhubauthenticators.HeaderAuthenticator'
By default, it exposes the following paths:
'/login' -> is utilizied to authenticate the user, relies on the 'allowed_headers' parameter to accomplish this. '/logout' -> clears the users authenticated session. '/set-user-data' -> allows an authenticated user to provide data to be persisted during the authenticated session. Here the 'user_external_allow_attributes' parameter defines which user attributes are allowed to be set.
Specify Authentication Header
First it provides the possibility to define a custom authentication header, this is accomplished by overriding the default allowed_headers dict required auth key:
c.HeaderAuthenticator.allowed_headers = {'auth': 'MyAuthHeader'}
This will overrive the default Remote-User header authentication to use the MyAuthHeader instead.
Additional User Data Headers
Beyond the auth key, the administrator is allowed to set additional headers that the authenticator will accept requests on.
For instance, if the MyCustomHeader should be accepted as well during authentication:
c.HeaderAuthenticator.enable_auth_state = True c.HeaderAuthenticator.allowed_headers = {'auth': 'MyAuthHeader', 'auth_data': 'MyCustomHeader'}
Any information provided via the MyCustomHeader during authentication will be added to the JupyterHub user’s auth_state, dictionary as defined by Authenticators auth_state. The data will be added to the auth_state by utilizing the header value in the allowed_headers dictionary as the key in the ‘auth_state’ dictionary. For instance the above configuration, will produce the following user profile:
user = { name: 'stored MyAuthHeader value', 'auth_state': {'MyCustomHeader': 'stored MyCustomHeader value'} }
It’s important to note here, that this information is only persisted for the life-time of the authenticated session.
Special Parsers
If the administrator requires that the defined allowed_headers should be parsed in a special way. The administrator can use the header_parser_classes parameter to define how a request with a particular header should be parsed, E.g:
from jhubauthenticators import Parser, JSONParser c.HeaderAuthenticator.header_parser_classes = {'auth': Parser, 'auth_data': JSONParser}
The auth header is here set to be parsed by the default Parser, which just returns the provided value unchanged. The JSONParser, however does what it indicated, attempts to parse the data as JSON.
In addition to these, the authenticator also provides the RegexUsernameParser which can be used as an auth parser, E.g:
# RegexUsernameParser c.HeaderAuthenticator.header_parser_classes = {'auth': RegexUsernameParser} # Email regex RegexUsernameParser.username_extract_regex = '([a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+)'
Which will try to expand an email from the defined auth allowed_headers Header. If this can’t be accomplished, the user will not be authenticated.
Related to the username_extract_regex, the RegexUsernameParser.replace_extract_chars parameter exists to accomplish post filtering of illegal characters on the extracted username, E.g:
# Replace every '@' and '.' char in the extracted username with '_' RegexUsernameParser.replace_extract_chars = {'@': '_', '.': '_'}
It is possible to define additional parsers by extending the Parser class and implementing the required parse method, E.g:
class MyParser(Parser) # MyAdvancedParser def parse(self, data) return data
Which can subsequently be activate by adding it to the header_parser_classes parameter, E.g.:
# MyAdvancedParser c.HeaderAuthenticator.header_parser_classes = {'auth': MyParser}
Set User state after Authentication
Finally, the HeaderAuthenticator also provides the administrator the possibility to define the user_external_allow_attributes parameter. This allows defines which user attributes an authenticated user is allowed to set a user-defined variable via the HeaderAuthenticator defined /set-user-data endpoint. For instance, an authentiacated user’s variable data could be allowed to be externally defined by defining the following configuration:
c.HeaderAuthenticator.user_external_allow_attributes = ['data']
By default the user_external_allow_attributes allows no such attributes and has to be explicitly enabled/defined. Furthermore, this will only allow an authenticated user to externally define their own data instance variable.
Additional configuration examples of this can be found in the tests/jupyterhub_configs directory.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file jhub-authenticators-0.5.0.tar.gz
.
File metadata
- Download URL: jhub-authenticators-0.5.0.tar.gz
- Upload date:
- Size: 20.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.9.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 15438ced21f4c251ec374d9da4755e3c0d7f1c0e4a42adbc33d04bfa9e0cd376 |
|
MD5 | 7ed2ae441bb006bc63c35549d8c494bc |
|
BLAKE2b-256 | 21878830f7cc3a5e5e0f1b73511399ade16f711deb5f3d7aeb21da95f777e63b |
File details
Details for the file jhub_authenticators-0.5.0-py3-none-any.whl
.
File metadata
- Download URL: jhub_authenticators-0.5.0-py3-none-any.whl
- Upload date:
- Size: 22.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.9.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 8dacb1e9a8f7e60b69ab7f626780309b4a648705947ed83acde494038a5b0eb5 |
|
MD5 | 4b8e61cfb7fb98e5811fc0bc6ecb060f |
|
BLAKE2b-256 | bccf2a35661f5797acda2ca3a7da0733515d66edff371b2ead3b0d2354e3dae6 |