django-oidc-provider/DOC.md

400 lines
13 KiB
Markdown
Raw Normal View History

2015-02-26 19:44:31 +00:00
# Welcome to the Docs!
Django OIDC Provider can help you providing out of the box all the endpoints, data and logic needed to add OpenID Connect capabilities to your Django projects.
2015-03-25 17:54:11 +00:00
2015-06-24 15:40:00 +00:00
**This project is still in DEVELOPMENT and is rapidly changing.**
2015-02-26 19:44:31 +00:00
2015-03-25 17:54:11 +00:00
****************************************
2015-02-26 19:44:31 +00:00
Before getting started there are some important things that you should know:
* Although OpenID was built on top of OAuth2, this isn't an OAuth2 server. Maybe in a future it will be.
* Despite that implementation MUST support TLS. You can make request without using SSL. There is no control on that.
2015-03-01 23:21:37 +00:00
* This cover `Authorization Code` flow and `Implicit` flow, NO support for `Hybrid` flow at this moment.
2015-02-26 19:44:31 +00:00
* Only support for requesting Claims using Scope Values.
# Table Of Contents
2015-02-27 17:24:43 +00:00
- [Requirements](#requirements)
2015-02-26 19:44:31 +00:00
- [Installation](#installation)
- [Settings](#settings)
2015-02-27 21:14:46 +00:00
- [SITE_URL](#site_url)
- [LOGIN_URL](#login_url)
2015-03-19 17:04:32 +00:00
- [OIDC_AFTER_USERLOGIN_HOOK](#oidc_after_userlogin_hook)
2015-02-27 21:14:46 +00:00
- [OIDC_CODE_EXPIRE](#oidc_code_expire)
2015-02-27 21:17:20 +00:00
- [OIDC_EXTRA_SCOPE_CLAIMS](#oidc_extra_scope_claims)
- [OIDC_IDTOKEN_EXPIRE](#oidc_idtoken_expire)
2015-03-02 20:46:55 +00:00
- [OIDC_IDTOKEN_SUB_GENERATOR](#oidc_idtoken_sub_generator)
2015-07-17 14:31:45 +00:00
- [OIDC_RSA_KEY_FOLDER](#oidc_rsa_key_folder)
2015-06-24 15:40:00 +00:00
- [OIDC_SKIP_CONSENT_ENABLE](#oidc_skip_consent_enable)
- [OIDC_SKIP_CONSENT_EXPIRE](#oidc_skip_consent_expire)
2015-02-27 21:17:20 +00:00
- [OIDC_TOKEN_EXPIRE](#oidc_token_expire)
2015-08-11 20:12:15 +00:00
- [OIDC_USERINFO](#oidc_userinfo)
2015-02-26 19:44:31 +00:00
- [Users And Clients](#users-and-clients)
- [Templates](#templates)
2015-08-11 20:12:15 +00:00
- [Standard Claims](#standard-claims)
2015-02-26 19:44:31 +00:00
- [Server Endpoints](#server-endpoints)
2015-03-25 17:54:11 +00:00
- [Running Tests](#running-tests)
2015-11-13 17:40:07 +00:00
- [Relying Parties](#relying-parties)
2015-02-26 19:44:31 +00:00
2015-02-27 17:24:43 +00:00
## Requirements
2015-07-01 20:53:28 +00:00
- Python: `2.7` `3.4`
2016-01-06 19:36:52 +00:00
- Django: `1.7` `1.8` `1.9`
2015-02-27 17:24:43 +00:00
2015-02-26 19:44:31 +00:00
## Installation
2015-09-03 19:56:30 +00:00
If you want to get started fast see our `/example_project` folder.
2015-03-25 14:35:59 +00:00
2015-02-26 19:44:31 +00:00
Install the package using pip.
```bash
2015-08-04 15:55:10 +00:00
$ pip install django-oidc-provider
2015-02-26 19:44:31 +00:00
```
Add it to your apps.
```python
INSTALLED_APPS = (
'django.contrib.admin',
'django.contrib.auth',
'django.contrib.contenttypes',
'django.contrib.sessions',
'django.contrib.messages',
'django.contrib.staticfiles',
2015-02-27 17:21:45 +00:00
'oidc_provider',
2015-02-26 19:44:31 +00:00
# ...
)
```
Add the provider urls.
```python
urlpatterns = patterns('',
# ...
2015-02-27 17:21:45 +00:00
url(r'^openid/', include('oidc_provider.urls', namespace='oidc_provider')),
2015-02-26 19:44:31 +00:00
# ...
)
```
2015-07-17 14:31:45 +00:00
Generate server RSA key and run migrations (if you don't).
```bash
python manage.py creatersakey
python manage.py migrate
```
2015-02-26 19:44:31 +00:00
Add required variables to your project settings.
2015-07-17 14:31:45 +00:00
```python
# You maybe have this on top of your settings.py
import os
BASE_DIR = os.path.dirname(os.path.dirname(__file__))
SITE_URL = 'http://localhost:8000'
LOGIN_URL = '/accounts/login/'
OIDC_RSA_KEY_FOLDER = BASE_DIR
```
## Settings
2015-02-27 21:23:06 +00:00
##### SITE_URL
2015-06-22 21:41:22 +00:00
REQUIRED. The OP server url.
`str`. For example `http://localhost:8000`.
2015-02-27 21:14:46 +00:00
2015-02-27 21:23:06 +00:00
##### LOGIN_URL
2015-03-02 20:46:55 +00:00
REQUIRED. Used to log the user in. [Read more in Django docs](https://docs.djangoproject.com/en/1.7/ref/settings/#login-url).
2015-03-02 20:51:35 +00:00
2015-06-22 21:41:22 +00:00
`str`. Default is `/accounts/login/`.
2015-02-27 21:14:46 +00:00
2015-03-19 17:04:32 +00:00
##### OIDC_AFTER_USERLOGIN_HOOK
OPTIONAL. Provide a way to plug into the process after the user has logged in, typically to perform some business logic.
Default is:
```python
def default_hook_func(request, user, client):
return None
```
Return `None` if you want to continue with the flow.
The typical situation will be checking some state of the user or maybe redirect him somewhere.
With request you have access to all OIDC parameters. Remember that if you redirect the user to another place then you need to take him back to the authorize endpoint (use `request.get_full_path()` as the value for a "next" parameter).
2015-02-27 21:23:06 +00:00
##### OIDC_CODE_EXPIRE
2015-06-22 21:41:22 +00:00
OPTIONAL.
2015-03-02 20:51:35 +00:00
2015-06-22 21:41:22 +00:00
`int`. Expressed in seconds. Default is `60*10`.
2015-02-27 21:14:46 +00:00
2015-02-27 21:23:06 +00:00
##### OIDC_EXTRA_SCOPE_CLAIMS
2015-06-19 18:51:59 +00:00
OPTIONAL. A string with the location of your class. Default is `oidc_provider.lib.claims.AbstractScopeClaims`.
Used to add extra scopes specific for your app. This class MUST inherit ``AbstractScopeClaims``.
2015-02-27 21:14:46 +00:00
OpenID Connect Clients will use scope values to specify what access privileges are being requested for Access Tokens.
[Here](http://openid.net/specs/openid-connect-core-1_0.html#ScopeClaims) you have the standard scopes defined by the protocol.
2015-03-03 15:30:11 +00:00
Check out an example of how to implement it:
2015-02-27 21:14:46 +00:00
2015-02-26 19:44:31 +00:00
```python
2015-02-27 21:14:46 +00:00
from oidc_provider.lib.claims import AbstractScopeClaims
2015-02-26 19:44:31 +00:00
2015-02-27 21:14:46 +00:00
class MyAppScopeClaims(AbstractScopeClaims):
2015-02-26 19:44:31 +00:00
2015-03-06 15:54:27 +00:00
def setup(self):
2015-02-27 21:14:46 +00:00
# Here you can load models that will be used
# in more than one scope for example.
2015-03-06 15:54:27 +00:00
# print self.user
# print self.scopes
2015-02-27 21:14:46 +00:00
try:
self.some_model = SomeModel.objects.get(user=self.user)
2015-04-16 00:53:52 +00:00
except SomeModel.DoesNotExist:
2015-02-27 21:14:46 +00:00
# Create an empty model object.
self.some_model = SomeModel()
2015-02-26 19:44:31 +00:00
2015-02-27 21:14:46 +00:00
def scope_books(self, user):
# Here you can search books for this user.
dic = {
'books_readed': books_readed_count,
}
return dic
2015-02-26 19:44:31 +00:00
```
2015-02-27 21:14:46 +00:00
See how we create our own scopes using the convention:
``def scope_<SCOPE_NAME>(self, user):``
If a field is empty or ``None`` will be cleaned from the response.
2015-02-27 21:23:06 +00:00
##### OIDC_IDTOKEN_EXPIRE
2015-06-22 21:41:22 +00:00
OPTIONAL.
2015-03-02 20:51:35 +00:00
2015-06-28 16:53:51 +00:00
`int`. Expressed in seconds. Default is `60*10`.
2015-03-02 20:46:55 +00:00
##### OIDC_IDTOKEN_SUB_GENERATOR
2016-01-12 19:07:54 +00:00
OPTIONAL. A string with the location of your function. `sub` is a locally unique and never reassigned identifier within the Issuer for the End-User, which is intended to be consumed by the Client.
2015-03-02 20:51:35 +00:00
2016-01-12 19:07:54 +00:00
The function receives a `user` object and returns a unique `string` for the given user.
2015-03-02 20:51:35 +00:00
Default is:
2015-03-02 20:46:55 +00:00
```python
2015-03-03 16:39:32 +00:00
def default_sub_generator(user):
2015-03-02 20:46:55 +00:00
2015-07-30 15:11:57 +00:00
return str(user.id)
2015-03-02 20:46:55 +00:00
```
2015-02-27 21:14:46 +00:00
2015-07-17 14:31:45 +00:00
##### OIDC_RSA_KEY_FOLDER
2015-07-30 15:17:49 +00:00
REQUIRED. Path of the folder where `OIDC_RSA_KEY.pem` lives. Used to sign/encrypt `id_token`. The package will automatically generate a public key and expose it in the `jwks_uri` endpoint.
You can easily create it using `python manage.py creatersakey` command.
2015-07-17 14:31:45 +00:00
2015-06-24 15:41:32 +00:00
##### OIDC_SKIP_CONSENT_ENABLE
2015-06-22 21:41:22 +00:00
OPTIONAL. If enabled, the Server will save the user consent given to a specific client, so that user won't be prompted for the same authorization multiple times.
`bool`. Default is `True`.
2015-06-24 15:41:32 +00:00
##### OIDC_SKIP_CONSENT_EXPIRE
2015-06-22 21:41:22 +00:00
OPTIONAL. User consent expiration after been granted.
2015-03-02 20:51:35 +00:00
2015-06-22 21:41:22 +00:00
`int`. Expressed in days. Default is `30*3`.
2015-02-27 21:14:46 +00:00
2015-06-24 15:41:32 +00:00
##### OIDC_TOKEN_EXPIRE
OPTIONAL. Token object expiration after been created.
`int`. Expressed in seconds. Default is `60*60`.
2015-08-11 20:12:15 +00:00
##### OIDC_USERINFO
OPTIONAL. A string with the location of your class. Read [standard claims](#standard-claims) section.
2015-02-26 19:44:31 +00:00
## Users And Clients
User and client creation it's up to you. This is because is out of the scope in the core implementation of OIDC.
So, there are different ways to create your Clients. By displaying a HTML form or maybe if you have internal thrusted Clients you can create them programatically.
[Read more about client creation](http://tools.ietf.org/html/rfc6749#section-2).
For your users, the tipical situation is that you provide them a login and a registration page.
If you want to test the provider without getting to deep into this topics you can:
Create a user with: ``python manage.py createsuperuser``.
2016-01-12 19:10:33 +00:00
To create clients use Django admin (if you have it enabled):
2015-02-26 19:44:31 +00:00
2016-01-11 21:22:47 +00:00
![Client Creation](http://i64.tinypic.com/2dsfgoy.png)
2016-01-12 19:10:33 +00:00
Or create a client with Django shell: ``python manage.py shell``:
2015-02-26 19:44:31 +00:00
```python
>>> from oidc_provider.models import Client
>>> c = Client(name='Some Client', client_id='123', client_secret='456', response_type='code', redirect_uris=['http://example.com/'])
>>> c.save()
```
## Templates
Add your own templates files inside a folder named ``templates/oidc_provider/``.
You can copy the sample html here and edit them with your own styles.
**authorize.html**
```html
<h1>Request for Permission</h1>
<p>Client <strong>{{ client.name }}</strong> would like to access this information of you ...</p>
<form method="post" action="{% url 'oidc_provider:authorize' %}">
{% csrf_token %}
{{ hidden_inputs }}
<ul>
{% for scope in params.scope %}
<li>{{ scope | capfirst }}</li>
{% endfor %}
</ul>
<input name="allow" type="submit" value="Authorize" />
</form>
```
**error.html**
```html
<h3>{{ error }}</h3>
<p>{{ description }}</p>
```
2015-08-11 20:12:15 +00:00
## Standard Claims
This subset of OpenID Connect defines a set of standard Claims. They are returned in the UserInfo Response.
The package comes with a setting called `OIDC_USERINFO`, basically it refers to a class that MUST have a class-method named `get_by_user`, this will be called with a Django `User` instance and returns an object with all the claims of the user as attributes.
List of all the attributes grouped by scopes:
| profile | email | phone | address |
| ------------------ | -------------- | --------------------- | ---------------------- |
| name | email | phone_number | address_formatted |
| given_name | email_verified | phone_number_verified | address_street_address |
| family_name | | | address_locality |
| middle_name | | | address_region |
| nickname | | | address_postal_code |
| preferred_username | | | address_country |
| profile | | | |
| picture | | | |
| website | | | |
| gender | | | |
| birthdate | | | |
| zoneinfo | | | |
| locale | | | |
| updated_at | | | |
Example using a django model:
```python
from django.conf import settings
from django.db import models
class UserInfo(models.Model):
GENDER_CHOICES = [
('F', 'Female'),
('M', 'Male'),
]
user = models.OneToOneField(settings.AUTH_USER_MODEL, primary_key=True)
given_name = models.CharField(max_length=255, blank=True, null=True)
family_name = models.CharField(max_length=255, blank=True, null=True)
gender = models.CharField(max_length=100, choices=GENDER_CHOICES, null=True)
birthdate = models.DateField(null=True)
updated_at = models.DateTimeField(auto_now=True, null=True)
email_verified = models.NullBooleanField(default=False)
phone_number = models.CharField(max_length=255, blank=True, null=True)
phone_number_verified = models.NullBooleanField(default=False)
address_locality = models.CharField(max_length=255, blank=True, null=True)
address_country = models.CharField(max_length=255, blank=True, null=True)
@classmethod
def get_by_user(cls, user):
return cls.objects.get(user=user)
```
2015-02-26 19:44:31 +00:00
## Server Endpoints
**/authorize endpoint**
Example of an OpenID Authentication Request using the ``Authorization Code`` flow.
```curl
GET /openid/authorize?client_id=123&redirect_uri=http%3A%2F%2Fexample.com%2F&response_type=code&scope=openid%20profile%20email&state=abcdefgh HTTP/1.1
Host: localhost:8000
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
```
After the user accepts and authorizes the client application, the server redirects to:
```curl
http://example.com/?code=5fb3b172913448acadce6b011af1e75e&state=abcdefgh
```
The ``code`` param will be use it to obtain access token.
**/token endpoint**
```curl
POST /openid/token/ HTTP/1.1
Host: localhost:8000
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
client_id=123&client_secret=456&redirect_uri=http%253A%252F%252Fexample.com%252F&grant_type=authorization_code&code=[CODE]&state=abcdefgh
```
**/userinfo endpoint**
```curl
POST /openid/userinfo/ HTTP/1.1
Host: localhost:8000
Authorization: Bearer [ACCESS_TOKEN]
```
2015-03-25 17:54:11 +00:00
## Running Tests
2015-08-03 18:23:44 +00:00
Use [tox](https://pypi.python.org/pypi/tox) for running tests in each of the environments, also to run coverage among:
2015-07-27 19:01:32 +00:00
```bash
$ tox
```
If you have a Django project properly configured with the package. Then just run tests as normal.
2015-03-25 17:54:11 +00:00
```bash
2015-07-22 19:22:14 +00:00
$ python manage.py test --settings oidc_provider.tests.app.settings oidc_provider
2015-03-25 17:54:11 +00:00
```
2015-04-22 19:18:58 +00:00
2015-07-02 15:16:43 +00:00
Also tests run on every commit to the project, we use [travis](https://travis-ci.org/juanifioren/django-oidc-provider/) for this.
2015-11-13 17:40:07 +00:00
## Relying Parties
2015-04-22 19:18:58 +00:00
This provider was tested (and fully works) with these OIDC Clients:
- [Drupal OpenID Connect](https://www.drupal.org/project/openid_connect)
- [Passport OpenID Connect](https://github.com/jaredhanson/passport-openidconnect) (for NodeJS)
2015-11-13 17:40:07 +00:00
- [OIDCAndroidLib](https://github.com/kalemontes/OIDCAndroidLib) (for Android)
- [Amazon IAM OpenID Connect Identity Provider](https://console.aws.amazon.com/iam/home) (for AWS)
- [Amazon Cognito](https://console.aws.amazon.com/cognito/home) (for AWS Identity pools)