Skip to main content

Helpers to integrate Single Sign-On in nameko-based applications using Keycloak.

Project description

docs

Documentation Status

tests

Github Actions Build Status
Coverage Status

package

PyPI Package latest release PyPI Wheel Supported versions Supported implementations
Commits since latest release

This package is still work in progress.

Helpers to integrate Single Sign-On in nameko-based applications using Keycloak.

Features

  • nameko service mixin

  • database and model-agnostic user management

  • authentication service

  • fake Keycloak client for use in tests

Installation

pip install nameko-keycloak

You can also install the in-development version with:

pip install https://github.com/emplocity/nameko-keycloak/archive/master.zip

Usage

To set up SSO with Keycloak in your nameko service, follow these steps.

  1. Get Keycloak configuration from realm -> Clients -> Installation, download as Keycloak OIDC JSON.

    Save this configuration in a .json file.

  2. Add the mixin and dependency provider to your service and point to OIDC JSON config:

    from nameko_keycloak.dependencies import KeycloakProvider
    from nameko_keycloak.service import KeycloakSsoServiceMixin
    
    class MyService(KeycloakSsoServiceMixin):
        keycloak = KeycloakProvider("/tmp/keycloak.json")
  3. Set up URLs for HTTP endpoints. The mixin exposes five methods prefixed with keycloak_, which you should use in your HTTP service. Delegate from your entrypoints like this:

    @http("GET", "/login")
    def login_sso(self, request):
        return self.keycloak_login_sso(request)

    This way it is up to you to control the URL routes and any middleware or extra request handling (such as CORS headers).

  4. Implement a fetch_user() method on your service that takes user’s email address as a single argument and returns a user instance for that email (or None if no such user exists in whatever storage you’re using).

    For example:

    def fetch_user(self, email: str) -> Optional[User]:
        user_manager = UserManager(self.db.session)
        return user_manager.get_by_email(email)

    This method is used to ensure that there is a local application user who matches the global identity stored in Keycloak.

  5. (Optionally) Implement success and failure hook methods on your service.

    If you provide keycloak_success() method, the mixin will call it after successful login and redirect from Keycloak back to your application. The method will receive currently logged user as its argument. Similarly the mixin will call keycloak_failure() upon Keycloak errors.

    Example:

    def keycloak_success(self, user: User) -> None:
        logger.info(f"Successful login: {user=}")
    
    def keycloak_failure(self) -> None:
        logger.error("Failed to log in")

Documentation

https://nameko-keycloak.readthedocs.io/

Authors

nameko-keycloak is developed and maintained by Emplocity.

License

This work is released under the Apache 2.0 license.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

nameko_keycloak-2.0.0.tar.gz (20.7 kB view details)

Uploaded Source

Built Distribution

nameko_keycloak-2.0.0-py3-none-any.whl (13.3 kB view details)

Uploaded Python 3

File details

Details for the file nameko_keycloak-2.0.0.tar.gz.

File metadata

  • Download URL: nameko_keycloak-2.0.0.tar.gz
  • Upload date:
  • Size: 20.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.6

File hashes

Hashes for nameko_keycloak-2.0.0.tar.gz
Algorithm Hash digest
SHA256 81dab4d51b1d7b77446bea754c036699b43a618868a8f130412b2fe5257bbfd7
MD5 b5e219821c8d53f6956ea6cfe25abde9
BLAKE2b-256 cbc994a1764372a7dcbb80318266f79ee567fd8f1503cd93d4d365086a3c13a8

See more details on using hashes here.

File details

Details for the file nameko_keycloak-2.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for nameko_keycloak-2.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 dbabdcff924ff68d2b0f27a404fa29e2b47c6693e877733af78949fffc31f864
MD5 c24058fe07ce7053b67f7c42d737f4d6
BLAKE2b-256 22234b8d5fe5363401907e7fb371c735dc0daffcc4ba4e595e6e807e2addb260

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page