This is a Django login view that authenticates against an OpenID Connect Authentication Server.
Use it if you own a single Authentication Server that you want to share between multiple apps.
It's a OAuth2-based standard for authentication in applications.
It can be used for social logins (but we recommend Aiakos if you need more than one), and for setting up Single Sign-On into multiple services hosted by the same company. In the last case, it somewhat supersedes LDAP, as with OIDC people are entering their credentials only into the views served by the Authentication Server, and not into all the company's applications.
- Python 2.7 / 3.5+
- Django 1.8+
- openid-connect
pip install django-auth-oidc
INSTALLED_APPS += ['django_auth_oidc']
urlpatterns += [
url(r'^auth/', include('django_auth_oidc.urls')),
]
App's redirect URI: http(s)://app-domain/auth/done App's post-logout redirect URI: http(s)://app-domain/LOGOUT_REDIRECT_URL (or / if not set)
You may specify following settings in the Django settings file:
- AUTH_SERVER - OpenID Connect Authorization Server URL.
- AUTH_CLIENT_ID - Client ID received from the Authorization Server
- AUTH_CLIENT_SECRET - Client secret received from the Authorization Server
- AUTH_PROTOCOL (optional) - Legacy protocol supported by openid-connect library, for example github or gitlab. See openid-connect's documentation for full list of supported protocols.
Or, alternatively, you may set the AUTH_URL environment variable:
AUTH_URL=(protocol+)http(s)://client_id:client_secret@server/
(Note: ":", "@", "/" and "%" inside client_id and client_secret must be urlquoted.)
- AUTH_SCOPE (default: ['openid']) - list of scopes to request from the auth server
- AUTH_GET_USER_FUNCTION (default: 'django_auth_oidc:get_user_by_username') - name of a function that takes the user info dict, and returns an user object representing that user; note that it should set the user.backend attribute.