Enables one Django project (client) to authenticate via a second Django project (server) via oauth2.
- When apps aren't bundled in a single Django project, settings.py becomes easier to maintain. Moreover, you can customize settings.py for each app without having to resort to hacks.
- You can run the entire test suite quickly.
- Your apps can use different SQL databases e.g., SQLite, Postgres.
- You can easily incorporate apps written in other web frameworks like Flask, Express.js, or Rails.
- You can easily support SSO for 3rd party software that you acquire.
- You can quickly build a prototype of a new app without having to worry about deprecating it at some point.
- You can hire freelancers to help develop one app without having to share your entire code base.
- You can trial new deployment strategies on one app at a time (e.g., your main Django project is on Heroku while you beta test a new app using Zappa).
Djangito can also be used as an alternative to an SSO service (e.g., AWS Cognito). But it's cheaper, fully customizable, and seamlessly handles foreign key relationships with custom User tables.
pip install djangito
# in server virtual environment- Add
oauth2_provider
anddjango_server
to INSTALLED_APPS in settings.py - Add
users
to INSTALLED_APPS andAUTH_USER_MODEL = 'users.User'
in settings.py (only required if you want to use the opinionated Djangito user model) - Add
path('o/', include('djangito_server.urls'))
to urls.py - Create an OAuth2 Client Application
in the Django admin
with parameters
client_type="confidential"
andauthorization_grant_type="authorization-code"
.skip_authorization
can also be set toTrue
to bypass the page asking users to grant authority to the client application.
Note: While this project uses DRF serializers,
rest_framework
does not need to be install as a Django app in your project.
pip install djangito
# in client virtual environment- Add
'django_client'
to INSTALLED_APPS in settings.py - Add
'users'
to INSTALLED_APPS andAUTH_USER_MODEL = 'users.User'
in settings.py (only required if you want to use the opinionated Djangito user model) - Add
path('oidc/', include('djangito_client.urls'))
to urls.py - Create an Application on server admin in instance to get
DJANGITO_CLIENT_ID
ANDDJANGITO_CLIENT_SECRET
- Add Djangito settings to settings.py e.g.,
DJANGITO_SERVER_URL = 'https://main.mysite.com'
DJANGITO_CLIENT_ID = 'some_large_string_generated_by_djangito_server_app'
DJANGITO_CLIENT_SECRET = 'another_large_string_generated_by_djangito_server_app'
- Client application redirects user login to server application
- Client pulls that user's data using oauth2 after logging in ("authorization code" flow)
- Client will also update all foreign key fields (e.g.,
user.company
), including the data associated with that ForeignKey - When user data changes on the server, it is POSTed to all the client applications
via a JWT (signed using
DJANGITO_CLIENT_SECRET
) - If server User data is deleted, there is (currently) no impact to the client User data
- Comes with an opinionated "users" app containing a custom User model. (You can create your own user model as well. Just add an Integer field called server_id to your custom User model as well as to all related ForeignKey fields. You can also modify the Djangito User model by just copying the "user" directory into your project directory and the local version will be used.)
Note: "users" wasn't named "djangito_users" since, per the Django documentation, settings.AUTH_USER_MODEL can't change mid-project. The name "users" is commonly used in tutorials for a custom User model (e.g., how-switch-custom-django-user-model-mid-project).
- Anytime the user logs in from the client application
- Anytime the data is modified on the server application (note that just logging into the server application modifies the last_login field)
- settings.LOGIN_URL is monkey patched in djangito_client.patches to redirect to client.com/login_handler
- login_handler directs to server.com/o/authorize with query string parameters client_id, redirect_uri, scope (i.e., permissions requested), nonce, the original path that initiated the transaction.
- server.com/o/authorize (oauth2_provider.AuthorizationView) executes authorization and redirects to callback URI with query string parameters authorization, the original that initiated the transaction
- callback_handler gets access token
- callback_handler gets user_data from server using the access token
- callback_handler creates (or updates) User table using the JSON user data from the server.
- callback_handler create a random password for the client database i.e., just a fill to avoid exceptions.
- callback_handler calls login(request, u) to login user
- callback_handler revokes the token on the server i.e., this simulate one-time-use
- callback_handler redirects back to the original URL, now authenticated
- settings.LOGIN_REDIRECT_URL is monkey patched in djangito_client.patches to redirect to server.com/o/logout
- server.com/o/logout calls logout(request)
- server.com/o/logout redirects to client.com
- The blog post that inspired this project
- The best video explaining OpenID Connect
- Setting up an OAuth Client using authlib
- django-simple-sso (I couldn't get this to work, but the idea is very similar)
- The blog post that inspired the use of pytest in this project