This package provides JSON Web Token Authentication support for Django by using PyJWT.
The project is a fork of (https://github.com/jpadilla/django-jwt-auth) created by José Padilla (maintainer of PyJWT too). José doesn't seem to have the time anymore to work on django-jwt-auth.
New features from original code:
- refresh token
- provides 2 middlewares
- Django 3.0+
- better coverage and packaging
Install using pip
...
pip install webstack-django-jwt-auth
In your urls.py
add the following URL route to enable obtaining a token via a
POST included the user's username and password.
from jwt_auth import views as jwt_auth_views
from your_app.views import RestrictedView
urlpatterns = [
# ...
path("token-auth/", jwt_auth_views.jwt_token),
path("token-refresh/", jwt_auth_views.refresh_jwt_token),
path("protected-url/", RestrictedView.as_view()),
]
Inside your_app, create a Django restricted view:
import json
from django.http import JsonResponse
from django.views.generic import View
from jwt_auth.mixins import JSONWebTokenAuthMixin
class RestrictedView(JSONWebTokenAuthMixin, View):
def get(self, request):
data = {
"foo": "bar",
"username": request.user.username,
}
return JsonResponse(data)
You can easily test if the endpoint is working by doing the following in your terminal, if you had a user created with the username admin and password abc123.
curl -X POST -H "Content-Type: application/json" -d '{"username":"admin","password":"abc123"}' http://localhost:8000/token-auth/
Now in order to access protected api urls you must include the Authorization: Bearer <your_token>
header.
curl -H "Authorization: Bearer <your_token>" http://localhost:8000/protected-url/
There is also a provided middleware if you would prefer that to the view integration. Just add the following to your middleware:
MIDDLEWARE = (
# ...
'jwt_auth.middleware.JWTAuthenticationMiddleware',
)
There are some additional settings that you can override similar to how you'd do it with Django REST framework itself. Here are all the available defaults.
JWT_ALGORITHM = 'HS256'
JWT_ALLOW_REFRESH = False
JWT_AUDIENCE = None
JWT_AUTH_HEADER_PREFIX = 'Bearer'
JWT_DECODE_HANDLER = 'jwt_auth.utils.jwt_decode_handler',
JWT_ENCODE_HANDLER = 'jwt_auth.utils.jwt_encode_handler'
JWT_EXPIRATION_DELTA = datetime.timedelta(seconds=300)
JWT_LEEWAY = 0
JWT_LOGIN_URLS = [settings.LOGIN_URL]
JWT_PAYLOAD_GET_USER_ID_HANDLER = 'jwt_auth.utils.jwt_get_user_id_from_payload_handler'
JWT_PAYLOAD_HANDLER = 'jwt_auth.utils.jwt_payload_handler'
JWT_REFRESH_EXPIRATION_DELTA = datetime.timedelta(days=7)
JWT_SECRET_KEY: SECRET_KEY
JWT_VERIFY = True
JWT_VERIFY_EXPIRATION = True
This packages uses the JSON Web Token Python implementation, PyJWT and allows to modify some of it's available options.
Possible values:
- HS256 - HMAC using SHA-256 hash algorithm (default)
- HS384 - HMAC using SHA-384 hash algorithm
- HS512 - HMAC using SHA-512 hash algorithm
- RS256 - RSASSA-PKCS1-v1_5 signature algorithm using SHA-256 hash algorithm
- RS384 - RSASSA-PKCS1-v1_5 signature algorithm using SHA-384 hash algorithm
- RS512 - RSASSA-PKCS1-v1_5 signature algorithm using SHA-512 hash algorithm
Note:
For the RSASSA-PKCS1-v1_5 algorithms, the "secret" argument in jwt.encode is supposed to be a private RSA key as imported with Crypto.PublicKey.RSA.importKey. Likewise, the "secret" argument in jwt.decode is supposed to be the public RSA key imported with the same method.
Default is "HS256"
.
Enable token refresh functionality. Token issued from jwt_auth.views.jwt_token
will have an orig_iat
field.
Default is False
Typically, the base address of the resource being accessed, eg https://example.com
.
You can modify the Authorization header value prefix that is required to be sent together with the token.
Default is Bearer
.
This is an instance of Python's datetime.timedelta
. This will be added to
datetime.utcnow()
to set the expiration time.
Default is datetime.timedelta(seconds=300)
(5 minutes).
This allows you to validate an expiration time which is in the past but no very far. For example, if you have a JWT payload with an expiration time set to 30 seconds after creation but you know that sometimes you will process it after 30 seconds, you can set a leeway of 10 seconds in order to have some margin.
Default is 0
seconds.
Set the list of URLs that will be used to authenticate the user, you should take care to set only required URLs because the middleware will accept non-authenticated requests (no JWT) to these endpoints.
If you store user_id
differently than the default payload handler does,
implement this function to fetch user_id
from the payload.
Specify a custom function to generate the token payload
Limit on token refresh, is a datetime.timedelta
instance. This is how much
time after the original token that future tokens can be refreshed from.
Default is datetime.timedelta(days=7)
(7 days).
This is the secret key used to encrypt the JWT. Make sure this is safe and not shared or public.
Default is your project's settings.SECRET_KEY
.
If the secret is wrong, it will raise a jwt.DecodeError telling you as such. You
can still get at the payload by setting the JWT_VERIFY
to False
.
Default is True
.
You can turn off expiration time verification with by setting
JWT_VERIFY_EXPIRATION
to False
.
Default is True
.