OpenID Connect authentication for Django REST Framework
Clone or download
Allard Hoeve
Allard Hoeve Merge pull request #19 from koriaf/master
Handle ValueError for badly formed JWT
Latest commit 8bdce84 Apr 4, 2017

OpenID Connect authentication for Django Rest Framework

This package contains an authentication mechanism for authenticating users of a REST API using tokens obtained from OpenID Connect.

Currently, it only supports JWT and Bearer tokens. JWT tokens will be validated against the public keys of an OpenID connect authorization service. Bearer tokens are used to retrieve the OpenID UserInfo for a user to identify him.


Install using pip:

pip install drf-oidc-auth

Configure authentication for Django REST Framework in

        # ...

And configure the module itself in

    # Specify OpenID Connect endpoint. Configuration will be
    # automatically done based on the discovery document found
    # at <endpoint>/.well-known/openid-configuration
    'OIDC_ENDPOINT': '',

    # Accepted audiences the ID Tokens can be issued to
    'OIDC_AUDIENCES': ('myapp',),
    # (Optional) Function that resolves id_token into user.
    # This function receives a request and an id_token dict and expects to
    # return a User object. The default implementation tries to find the user
    # based on username (natural key) taken from the 'sub'-claim of the
    # id_token.
    'OIDC_RESOLVE_USER_FUNCTION': 'oidc_auth.authentication.get_user_by_id',
    # (Optional) Number of seconds in the past valid tokens can be 
    # issued (default 600)
    'OIDC_LEEWAY': 600,
    # (Optional) Time before signing keys will be refreshed (default 24 hrs)

    # (Optional) Time before bearer token validity is verified again (default 10 minutes)
    # (Optional) Token prefix in JWT authorization header (default 'JWT')
    # (Optional) Token prefix in Bearer authorization header (default 'Bearer')

Running tests

pip install tox