Skip to main content

Passkey Auth made easy: all sites and APIs can be guarded even without any changes on the protected site.

Project description

Paskia

Login dialog screenshot

An easy to install passkey-based authentication service that protects any web application with strong passwordless login.

What is Paskia?

  • Easy to use fully featured auth&auth system (login and permissions)
  • Organization and role-based access control
    • Org admins control their users and roles
    • Multiple independent orgs
    • Master admin can do everything or delegate to org admins
  • User Profile and Admin by API and web interface
  • Implements login/reauth/forbidden flows for you
  • Single Sign-On (SSO): Users register once and authenticate across your services
  • Remote autentication by entering random keywords from another device (like 2fa)
  • No CORS, NodeJS or anything extra needed.

Authenticate to get to your app, or in your app

  • API fetch: auth checks and login without leaving your app
  • Forward-auth proxy: protect any unprotected site or service (Caddy, Nginx)

The API mode is useful for applications that can be customized to run with Paskia. Forward auth can also protect your javascript and other assets. Each provides fine-grained permission control and reauthentication requests where needed, and both can be mixed where needed.

Authentication flows already done

Forbidden dialog, dark mode Automatic light/dark mode switching with overrides by user profile and protected app's theme.

Paskia includes set of login, reauthentication and forbidden dialogs that it can use to perform the needed flows. We never leave the URL, no redirections, and if you make use of API mode, we won't even interrupt whatever your app was doing but retry the blocked API fetch after login like nothing happened.

Quick Start

Install UV and run:

uvx paskia --rp-id example.com

On the first run it downloads the software and prints a registration link for the Admin. The server starts on localhost:4401, serving authentication for *.example.com. For local testing, leave out --rp-id.

For production you need a web server such as Caddy to serve HTTPS on your actual domain names and proxy requests to Paskia and your backend apps (see documentation below).

For a permanent install of paskia CLI command, not needing uvx:

uv tool install paskia

Configuration

You will need to specify your main domain to which all passkeys will be tied as rp-id. Use your main domain even if Paskia is not running there. All other options are optional.

paskia [options]
Option Description Default
-l, --listen endpoint Listen address: host:port, :port (all interfaces), or /path.sock localhost:4401
--rp-id domain Main/top domain for passkeys localhost
--rp-name "text" Branding name for the entire system (passkey auth, login dialog). Same as rp-id
--origin url Only sites listed can login (repeatable) rp-id and all subdomains
--auth-host url Dedicated authentication site, e.g. auth.example.com Use /auth/ path on each site
--save Save current options to database (only --rp-id required on further invocations)

To clear a stored setting, pass an empty value like --auth-host=. The database is stored in {rp-id}.paskiadb in current directory. This can be overridden by environment PASKIA_DB if needed.

Tutorial: From Local Testing to Production

This section walks you through a complete example, from running Paskia locally to protecting a real site in production.

Step 1: Production Configuration

For a real deployment, configure Paskia with your domain name (rp-id). This enables SSO setup for that domain and any subdomains.

uvx paskia --rp-id=example.com --rp-name="Example Corp"

This binds passkeys to the rp-id, allowing them to be used there or on any subdomain of it. The --rp-name is the branding shown in UI and registered with passkeys for everything on your domain (rp id). On the first run, you'll see a registration link—use it to create your Admin account. You may enter your real name here for a more suitable account name.

Step 2: Set Up Caddy

Install Caddy and copy the auth folder to /etc/caddy/auth. Say your current unprotected Caddyfile looks like this:

app.example.com {
    reverse_proxy :3000
}

Add Paskia full site protection:

app.example.com {
    import auth/setup
    handle {
        import auth/require perm=myapp:login
        reverse_proxy :3000
    }
}

Run systemctl reload caddy. Now app.example.com requires the myapp:login permission. Try accessing it and you'll land on a login dialog.

Step 3: Assign Permissions via Admin Panel

Admin panel permissions

  1. Go to app.example.com/auth/admin/
  2. Create a permission, give it a name and scope myapp:login
  3. Assign it to Organization
  4. In that organization, assign it to the Administration role

Now you have granted yourself the new permission.

Permission scopes are text identifiers with colons as separators that we can use for permission checks. The myapp: prefix is a convention to namespace permissions per application—you but you can use other forms as you see fit (urlsafe characters, no spaces allowed).

Step 4: Add API Authentication to Your App

Your backend already receives Remote-* headers from Caddy's forward-auth. For frontend API calls, we provide a JS paskia module:

import { apiJson } from 'https://cdn.jsdelivr.net/npm/paskia@latest/dist/paskia.js'

const data = await apiJson('/api/sensitive', { method: 'POST' })

When a 401/403 occurs, the auth dialog appears automatically, and the request retries after authentication.

To protect the API path with a different permission, update your Caddyfile:

app.example.com {
    import auth/setup

    @api path /api/*
    handle @api {
        import auth/require perm=myapp:api
        reverse_proxy :3000
    }

    handle {
        import auth/require perm=myapp:login
        reverse_proxy :3000
    }
}

Create the myapp:api permission in the admin panel, that will be required for all API access. Link to /auth/ for the built-in profile page.

You may also remove the myapp:login protection from the rest of your site paths, unless you wish to keep all your assets behind a login page. Having this as the last entry in your config allows free access to everything not matched by other sections.

    handle {
        reverse_proxy :3000
    }

Step 5: Run Paskia as a Service

Create a system user paskia, install UV on the system, and create a systemd unit:

sudo useradd --system --home-dir /srv/paskia --create-home paskia

Install UV on the system (or arch btw pacman -S uv):

curl -LsSf https://astral.sh/uv/install.sh | sudo env UV_INSTALL_DIR=/usr/local/bin sh

Create a systemd unit:

sudo systemctl edit --force --full paskia@.service

Paste the following and save:

[Unit]
Description=Paskia for %i

[Service]
Type=simple
User=paskia
WorkingDirectory=/srv/paskia
ExecStart=uvx paskia@latest --rp-id=%i

[Install]
WantedBy=multi-user.target

Run the service and view log:

sudo systemctl enable --now paskia@example.com && sudo journalctl -n30 -ocat -fu paskia@example.com

Optional: Dedicated Authentication Site

Add a Caddy configuration for the authentication domain:

auth.example.com {
    reverse_proxy :4401
}

Now all authentication happens at auth.example.com instead of /auth/ paths on your apps. Your existing protected sites continue to work as before but they just forward to the dedicated site for user profile and other such functionality.

Enter your auth site domain on Admin / Server Options panel or use --auth-host=auth.example.com when starting the server.

Further Documentation

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

paskia-1.3.1.tar.gz (1.9 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

paskia-1.3.1-py3-none-any.whl (2.0 MB view details)

Uploaded Python 3

File details

Details for the file paskia-1.3.1.tar.gz.

File metadata

  • Download URL: paskia-1.3.1.tar.gz
  • Upload date:
  • Size: 1.9 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.21 {"installer":{"name":"uv","version":"0.9.21","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for paskia-1.3.1.tar.gz
Algorithm Hash digest
SHA256 23823fb401018994c14abe2f2572c31f6a8db3a082b926ba7523557d81bdb0b1
MD5 820430362b1d5d67545865fca2a6a41a
BLAKE2b-256 4e33f00c5275957398c395d0dbaa033239ca3eed0c914c0014efbd6c5ddf39fb

See more details on using hashes here.

File details

Details for the file paskia-1.3.1-py3-none-any.whl.

File metadata

  • Download URL: paskia-1.3.1-py3-none-any.whl
  • Upload date:
  • Size: 2.0 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.21 {"installer":{"name":"uv","version":"0.9.21","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for paskia-1.3.1-py3-none-any.whl
Algorithm Hash digest
SHA256 31c9b7c7f8825f517a603024b4c1f2a8a05dcde27dcd51fb1f4ce7b278bbadc1
MD5 d476e43840e9e01c5154aeab7571c9f2
BLAKE2b-256 5f2f1549d2f5a88f939c169c847e4ee4e6ad91bf920c19569dc24a4f401c4473

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page