2016-02-11 20:24:34 +00:00
.. _settings:
Settings
########
2017-12-14 17:30:46 +00:00
Customize django-oidc-provider so that it fits your project's needs.
2016-02-11 20:24:34 +00:00
2017-05-05 03:19:57 +00:00
OIDC_LOGIN_URL
==============
2016-02-11 20:24:34 +00:00
2017-12-14 17:30:46 +00:00
OPTIONAL. `` str `` . Used to log the user in. By default Django's `` LOGIN_URL `` will be used. `Read more in the Django docs <https://docs.djangoproject.com/en/1.11/ref/settings/#login-url> `_
2016-02-11 20:24:34 +00:00
2017-05-05 03:19:57 +00:00
`` str `` . Default is `` /accounts/login/ `` (Django's `` LOGIN_URL `` ).
2016-02-11 20:24:34 +00:00
2016-05-26 20:05:16 +00:00
SITE_URL
========
OPTIONAL. `` str `` . The OP server url.
2017-12-14 17:30:46 +00:00
If not specified, it will be automatically generated using `` request.scheme `` and `` request.get_host() `` .
2016-05-26 20:05:16 +00:00
For example `` http://localhost:8000 `` .
2016-02-11 20:24:34 +00:00
OIDC_AFTER_USERLOGIN_HOOK
=========================
2016-02-12 19:22:47 +00:00
OPTIONAL. `` str `` . A string with the location of your function. Provide a way to plug into the process after the user has logged in, typically to perform some business logic.
2016-02-11 20:24:34 +00:00
Default is::
def default_hook_func(request, user, client):
return None
Return `` None `` if you want to continue with the flow.
The typical situation will be checking some state of the user or maybe redirect him somewhere.
2017-12-14 17:30:46 +00:00
With `` request `` you have access to all OIDC parameters. Remember that if you redirect the user to another place then you need to take him back to the authorize endpoint (use `` request.get_full_path() `` as the value for a "next" parameter).
2016-02-11 20:24:34 +00:00
2017-05-05 03:19:57 +00:00
OIDC_AFTER_END_SESSION_HOOK
===========================
OPTIONAL. `` str `` . A string with the location of your function. Provide a way to plug into the log out process just before calling Django's log out function, typically to perform some business logic.
Default is::
def default_after_end_session_hook(request, id_token=None, post_logout_redirect_uri=None, state=None, client=None, next_page=None):
return None
Return `` None `` if you want to continue with the flow.
2016-02-11 20:24:34 +00:00
OIDC_CODE_EXPIRE
================
2016-02-12 19:22:47 +00:00
OPTIONAL. `` int `` . Code object expiration after been delivered.
2016-02-11 20:24:34 +00:00
2016-02-12 19:22:47 +00:00
Expressed in seconds. Default is `` 60*10 `` .
2016-02-11 20:24:34 +00:00
OIDC_EXTRA_SCOPE_CLAIMS
=======================
2016-05-30 16:28:07 +00:00
OPTIONAL. `` str `` . A string with the location of your class. Default is `` oidc_provider.lib.claims.ScopeClaims `` .
2016-02-11 20:24:34 +00:00
2016-09-19 21:05:29 +00:00
Used to add extra scopes specific for your app. OpenID Connect RP's will use scope values to specify what access privileges are being requested for Access Tokens.
2016-02-11 20:24:34 +00:00
2016-09-19 21:05:29 +00:00
Read more about how to implement it in :ref: `scopesclaims` section.
2016-02-11 20:24:34 +00:00
OIDC_IDTOKEN_EXPIRE
===================
2016-09-12 16:07:12 +00:00
OPTIONAL. `` int `` . ID Token expiration after been delivered.
2016-02-11 20:24:34 +00:00
2016-02-12 19:22:47 +00:00
Expressed in seconds. Default is `` 60*10 `` .
OIDC_IDTOKEN_PROCESSING_HOOK
============================
2016-03-01 17:54:57 +00:00
OPTIONAL. `` str `` or `` (list, tuple) `` .
A string with the location of your function hook or `` list `` or `` tuple `` with hook functions.
2016-02-17 22:16:39 +00:00
Here you can add extra dictionary values specific for your app into id_token.
2016-06-16 20:18:39 +00:00
The `` list `` or `` tuple `` is useful when you want to set multiple hooks, i.e. one for permissions and second for some special field.
2016-03-01 17:54:57 +00:00
2016-06-16 20:18:39 +00:00
The function receives a `` id_token `` dictionary and `` user `` instance
2016-02-17 22:25:02 +00:00
and returns it with additional fields.
2016-02-17 22:16:39 +00:00
Default is::
2016-02-17 22:25:02 +00:00
def default_idtoken_processing_hook(id_token, user):
2016-02-17 22:16:39 +00:00
2016-02-18 13:17:04 +00:00
return id_token
2016-02-11 20:24:34 +00:00
2018-02-05 15:29:08 +00:00
OIDC_INTROSPECTION_PROCESSING_HOOK
==================================
OPTIONAL. `` str `` or `` (list, tuple) `` .
A string with the location of your function hook or `` list `` or `` tuple `` with hook functions.
Here you can add extra dictionary values specific to your valid response value for token introspection.
2018-04-24 14:10:27 +00:00
The function receives an `` introspection_response `` dictionary, a `` client `` instance and an `` id_token `` dictionary.
2018-02-05 15:29:08 +00:00
Default is::
2018-04-24 14:10:27 +00:00
def default_introspection_processing_hook(introspection_response, client, id_token):
2018-02-05 15:29:08 +00:00
return introspection_response
2018-04-24 09:09:49 +00:00
OIDC_INTROSPECTION_VALIDATE_AUDIENCE_SCOPE
==========================================
OPTIONAL `` bool ``
A flag which toggles whether the audience is matched against the client resource scope when calling the introspection endpoint.
Default is `` True `` .
2016-02-11 20:24:34 +00:00
OIDC_IDTOKEN_SUB_GENERATOR
==========================
2016-02-12 19:22:47 +00:00
OPTIONAL. `` str `` . A string with the location of your function. `` sub `` is a locally unique and never reassigned identifier within the Issuer for the End-User, which is intended to be consumed by the Client.
2016-02-11 20:24:34 +00:00
The function receives a `` user `` object and returns a unique `` string `` for the given user.
Default is::
def default_sub_generator(user):
return str(user.id)
2018-04-10 21:41:38 +00:00
OIDC_IDTOKEN_INCLUDE_CLAIMS
==============================
OPTIONAL. `` bool `` . If enabled, id_token will include standard claims of the user (email, first name, etc.).
Default is `` False `` .
2016-10-28 19:56:06 +00:00
OIDC_SESSION_MANAGEMENT_ENABLE
==============================
2017-12-14 17:30:46 +00:00
OPTIONAL. `` bool `` . Enables OpenID Connect Session Management 1.0 in your provider. See the :ref: `sessionmanagement` section.
2016-10-28 19:56:06 +00:00
Default is `` False `` .
2017-05-05 03:19:57 +00:00
OIDC_UNAUTHENTICATED_SESSION_MANAGEMENT_KEY
===========================================
2017-12-14 17:30:46 +00:00
OPTIONAL. Supply a fixed string to use as browser-state key for unauthenticated clients. See the :ref: `sessionmanagement` section.
2017-05-05 03:19:57 +00:00
Default is a string generated at startup.
2016-02-11 20:24:34 +00:00
OIDC_SKIP_CONSENT_EXPIRE
========================
2017-12-14 17:30:46 +00:00
OPTIONAL. `` int `` . How soon User Consent expires after being granted.
2016-02-11 20:24:34 +00:00
2016-02-12 19:22:47 +00:00
Expressed in days. Default is `` 30*3 `` .
2016-02-11 20:24:34 +00:00
OIDC_TOKEN_EXPIRE
=================
2017-12-14 17:30:46 +00:00
OPTIONAL. `` int `` . Token object (access token) expiration after being created.
2016-02-11 20:24:34 +00:00
2016-02-12 19:22:47 +00:00
Expressed in seconds. Default is `` 60*60 `` .
2016-02-11 20:24:34 +00:00
OIDC_USERINFO
=============
2017-12-14 17:30:46 +00:00
OPTIONAL. `` str `` . A string with the location of your function. See the :ref: `scopesclaims` section.
2016-07-07 15:50:27 +00:00
The function receives a `` claims `` dictionary with all the standard claims and `` user `` instance. Must returns the `` claims `` dict again.
Example usage::
def userinfo(claims, user):
claims['name'] = '{0} {1}'.format(user.first_name, user.last_name)
claims['given_name'] = user.first_name
claims['family_name'] = user.last_name
claims['email'] = user.email
claims['address']['street_address'] = '...'
return claims
.. note ::
Please **DO NOT** add extra keys or delete the existing ones in the `` claims `` dict. If you want to add extra claims to some scopes you can use the `` OIDC_EXTRA_SCOPE_CLAIMS `` setting.
2017-05-05 03:19:57 +00:00
OIDC_GRANT_TYPE_PASSWORD_ENABLE
===============================
2017-12-14 17:30:46 +00:00
OPTIONAL. A boolean whether to allow the Resource Owner Password
2017-05-05 03:19:57 +00:00
Credentials Grant. https://tools.ietf.org/html/rfc6749#section-4.3
.. important ::
From the specification:
"Since this access token request utilizes the resource owner's
password, the authorization server **MUST** protect the endpoint
against brute force attacks (e.g., using rate-limitation or
generating alerts)."
There are many ways to implement brute force attack prevention. We cannot
decide what works best for you, so you will have to implement a solution for
this that suits your needs.
OIDC_TEMPLATES
==============
OPTIONAL. A dictionary pointing to templates for authorize and error pages.
Default is::
{
'authorize': 'oidc_provider/authorize.html',
'error': 'oidc_provider/error.html'
}
2017-12-14 17:30:46 +00:00
See the :ref: `templates` section.
2017-05-05 03:19:57 +00:00
2017-12-14 17:30:46 +00:00
The templates that are not specified here will use the default ones.