Kerberos authentication backend for Python Social Auth
This package provides Kerberos backend for Python Social Auth. It can be used to
enable passwordless authentication inside a Django app or any other application
that supports Python Social Auth. This is a pure Python implementation which doesn't
depend on Apache
pip install social-auth-kerberos
WARNING: you will need gcc, Python and kerberos devel packages to
gssapi dependency because it doesn't provide binary packages. Try
dnf install gcc krb5-devel python3-devel (Red Hat/Fedora) or
apt-get install gcc libkrb5-dev libpython3-dev (Debian/Ubuntu).
Configure Python Social Auth and then make sure you have the following settings enabled:
AUTHENTICATION_BACKENDS = [ 'social_auth_kerberos.backend.KerberosAuth', 'django.contrib.auth.backends.ModelBackend', ] SOCIAL_AUTH_KRB5_KEYTAB = '/Kiwi/your-application.keytab'
The principal name for your Kiwi TCMS web service must be
the domain name of the Kiwi TCMS server and
REALM.EXAMPLE.COM is the
Kerberos realm that is used in your organization.
/Kiwi/your-application.keytab is the keytab file for your
web app principal! If you install this inside a Docker container make sure
Python Social Auth, and by extension this plugin, will create new user accounts upon first access of the web interface. In Kiwi TCMS users need to either be in the special group Tester or have sufficient permissions to add/edit/delete objects.
You can automatically assign new accounts to the Tester group if
social_auth_kerberos.pipeline.initiate_defaults to the end
WARNING: this is not done for you automatically because some administrators may want to employ different behaviour for newly registered accounts!
For more information about Kerberos see:
- How to configure Firefox for kerberos
- How to configure kerberos on Fedora
- How to generate a keytab file
or check out
v0.2.4 (24 Mar 2020)
social_auth_kerberos.pipelinewith function to initialize default permissions for newly created accounts. See section Pipeline configuration
- Update README with more information how to configure this plugin
- Enable integration testing with Kerberos and coverage collection
v0.2.3 (22 Mar 2020)
- Keep a reference to current user before checking anything else. Resolves a crash for clients which know that the server is Kerberos enabled and directly send the Authorization header
- Be more tolerant to authorization request headers which don't match RFC-4459, section 4.2
v0.2.2 (10 Nov 2019)
- Pin license version to GPLv2 for Tidelift
v0.2.1 (10 Dec 2018)
- Initial release