Skip to main content

A lightweight package to manage tokens in your application in a single encrypted file and asymmetric token encryption.

Project description

logo

TokenVault

PyPI version License: MIT CI codecov

TokenVault is a lightweight package for secure user management using encrypted tokens stored in a single file with asymmetric encryption.

Features

  • Secure token storage - All tokens and metadata encrypted in a single file
  • Asymmetric encryption - Even if the file is compromised, tokens remain secure
  • Git-friendly - Version control your user data with full encryption
  • No database required - Perfect for POCs, prototypes, and small applications
  • CLI management - Easy user management via command line
  • FastAPI integration - Drop-in authentication for FastAPI applications

Rationale

Why use TokenVault instead of a full identity provider or custom server?

  • Lightweight & Serverless – No need to deploy or maintain a user management service. Your entire user/token state lives in a single encrypted file.
  • Git/Data-Versioning Friendly – The vault is just a file, so it fits naturally into repositories and data-versioning workflows (Git, DVC, etc.). You can track user changes, review access control in pull requests, and roll back if needed.
  • Cost-Free – Avoid recurring bills from external identity providers (e.g., Cognito, Auth0). TokenVault is free and open source.
  • Ideal for Prototypes & Private APIs – Quickly make an app private with API keys, managed in Git alongside code. Perfect for early-stage projects, POCs, and internal tools.
  • Team Sharing with Security – Share access securely by distributing only the encrypted vault and a password or environment variable. Even if the file leaks, tokens remain protected.
  • Drop-in Authentication – FastAPI integration makes it simple to secure endpoints without spinning up a separate auth microservice.

When to Use

Use TokenVault when you want to:

  • Secure internal APIs without adding heavy dependencies.
  • Manage small to medium sets of users directly in Git.
  • Version-control user & metadata updates with data-versioning tools.
  • Keep prototypes and POCs simple but secure.
  • Avoid vendor lock-in and recurring SaaS costs for identity management.

Installation

pip install tokenvault

Quick Start

from tokenvault import TokenVault

# Create vault and add user
vault = TokenVault()
token = vault.add("user@example.com", metadata={"name": "John Doe", "role": "admin"})

# Validate token
user_data = vault.validate(token)
print(user_data)  # {'name': 'John Doe', 'role': 'admin'}

# Save vault
vault.save("vault.db")

# Load vault
loaded_vault = TokenVault("vault.db")
loaded_vault.validate(token)  # {'name': 'John Doe', 'role': 'admin'}

Encryption

For enhanced security, encrypt your vault with a password:

import os
from tokenvault import TokenVault

vault = TokenVault()
token = vault.add("user@example.com", metadata={"name": "John Doe"})

# Generate and save with password
password = vault.generate_key()
vault.save("vault.db", password=password)

# Load with password
TokenVault("vault.db", password=password).validate(token)

# Or picked-up automatically from environment variable
os.environ['TOKENVAULT_PASSWORD'] = password
TokenVault("vault.db").validate(token)

CLI Usage

Manage users via command line:

# Initialize vault (unencrypted by default)
$ tv init vault.db
Vault created at vault.db and not encrypted

# Add user (token copied to clipboard)
$ tv add user@example.com vault.db --metadata='{"role": "admin", "name": "John Doe"}'

# List users
$ tv list vault.db
user@example.com

# Validate token
$ tv validate <token> vault.db
{"role": "admin", "name": "John Doe"}

# Remove user
$ tv remove user@example.com vault.db

# Create vault with generated password
$ tv init vault.db --generate-password
Generated password (copied to clipboard): G99********
Vault created at vault.db and encrypted with password

# Or use a specific password
$ tv init vault.db --password "your-secret-password"
Vault created at vault.db and encrypted with password

# Set environment variable for subsequent commands
$ export TOKENVAULT_PASSWORD=G99********

# Add user (password picked up from environment)
$ tv add user@example.com vault.db

FastAPI Integration

Secure your FastAPI endpoints with TokenVault. See the examples/ directory for a complete working demo.

from fastapi import FastAPI, Depends, HTTPException, status
from fastapi.security import HTTPBearer, HTTPAuthorizationCredentials
from tokenvault import TokenVault

app = FastAPI()
security = HTTPBearer()
vault = TokenVault("vault.db")

async def get_current_user(credentials: HTTPAuthorizationCredentials = Depends(security)):
    token = credentials.credentials
    user_data = vault.validate(token)
    
    if user_data is None:
        raise HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
            detail="Invalid authentication token",
            headers={"WWW-Authenticate": "Bearer"},
        )
    
    return user_data

@app.get("/protected")
async def protected_route(user_data: dict = Depends(get_current_user)):
    return {"message": "Access granted", "user": user_data}

@app.get("/public")
async def public_route():
    return {"message": "This is a public endpoint"}

Usage Example

# Add user and get token
$ tv add user@example.com vault.db --metadata='{"role": "admin", "name": "John Doe"}'

# Make authenticated requests
$ curl -H "Authorization: Bearer <token>" http://localhost:8000/protected
{"message": "Access granted", "user": {"role": "admin", "name": "John Doe"}}

# Public endpoints work without authentication
$ curl http://localhost:8000/public
{"message": "This is a public endpoint"}

Security

For security best practices, vulnerability reporting, and known limitations, see SECURITY.md.

Use with Care ⚠️

TokenVault is a pet project, built to simplify small-scale, secure user management.
While it provides encryption and safe defaults, it is not a replacement for enterprise-grade identity management solutions (e.g., Cognito, Auth0, Keycloak).

Use it with care in:

  • Personal projects
  • Internal tools
  • Prototypes & proofs-of-concept
  • Small teams that benefit from Git-based user/version control

Avoid using it for:

  • Applications with large user bases
  • Systems requiring strict compliance (HIPAA, GDPR, SOC2, etc.)
  • High-security production environments where professional solutions are required

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tokenvault-0.1.1.tar.gz (11.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tokenvault-0.1.1-py3-none-any.whl (9.3 kB view details)

Uploaded Python 3

File details

Details for the file tokenvault-0.1.1.tar.gz.

File metadata

  • Download URL: tokenvault-0.1.1.tar.gz
  • Upload date:
  • Size: 11.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.10

File hashes

Hashes for tokenvault-0.1.1.tar.gz
Algorithm Hash digest
SHA256 56fabea65621b5d575c85c024b545bb0ab0c4c06dacee9e53c41d2a99d652f93
MD5 2c1c35bbbf195df5495619b651baac59
BLAKE2b-256 26f38ded64e33cd8b815755365f8214d3026560aa389e9e3eb7f355f545f111a

See more details on using hashes here.

File details

Details for the file tokenvault-0.1.1-py3-none-any.whl.

File metadata

  • Download URL: tokenvault-0.1.1-py3-none-any.whl
  • Upload date:
  • Size: 9.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.10

File hashes

Hashes for tokenvault-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 a39ccc0fe796bc6982a34a019b77da68146b3355c427062c74c0e86e76b00bc4
MD5 81b2a8a77e7c08915de33bb7ed544c14
BLAKE2b-256 49fba0c111cd24a5915b87c41cfb612c2850bb3630dbd1fb9d4021bb8bfa0715

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page