JSON Web Token Authentication support for Django REST Framework
This package provides JSON Web Token Authentication support for Django REST framework.
If you want to know more about JWT, check out the following resources:
- DjangoCon 2014 - JSON Web Tokens Video | Slides
- Auth with JSON Web Tokens
- JWT.io
- Python (2.7, 3.3, 3.4)
- Django (1.6, 1.7)
- Django REST Framework (2.4.3, 2.4.4, 3.0.0)
Install using pip
...
$ pip install djangorestframework-jwt
In your settings.py
, add JSONWebTokenAuthentication
to Django REST framework's DEFAULT_AUTHENTICATION_CLASSES
.
REST_FRAMEWORK = {
'DEFAULT_PERMISSION_CLASSES': (
'rest_framework.permissions.IsAuthenticated',
),
'DEFAULT_AUTHENTICATION_CLASSES': (
'rest_framework.authentication.SessionAuthentication',
'rest_framework.authentication.BasicAuthentication',
'rest_framework_jwt.authentication.JSONWebTokenAuthentication',
),
}
In your urls.py
add the following URL route to enable obtaining a token via a POST included the user's username and password.
urlpatterns = patterns(
'',
# ...
url(r'^api-token-auth/', 'rest_framework_jwt.views.obtain_jwt_token'),
)
You can easily test if the endpoint is working by doing the following in your terminal, if you had a user created with the username admin and password abc123.
$ curl -X POST -d "username=admin&password=abc123" http://localhost:8000/api-token-auth/
Alternatively, you can use all the content types supported by the Django REST framework to obtain the auth token. For example:
$ curl -X POST -H "Content-Type: application/json" -d '{"username":"admin","password":"abc123"}' http://localhost:8000/api-token-auth/
Now in order to access protected api urls you must include the Authorization: JWT <your_token>
header.
$ curl -H "Authorization: JWT <your_token>" http://localhost:8000/protected-url/
If JWT_ALLOW_REFRESH
is True, issued tokens can be "refreshed" to obtain a new brand token with renewed expiration time. Add a URL pattern like this:
url(r'^api-token-refresh/', 'rest_framework_jwt.views.refresh_jwt_token'),
Pass in an existing token to the refresh endpoint as follows: {"token": EXISTING_TOKEN}
. Note that only non-expired tokens will work. The JSON response looks the same as the normal obtain token endpoint {"token": NEW_TOKEN}
.
$ curl -X POST -H "Content-Type: application/json" -d '{"token":"<EXISTING_TOKEN>"}' http://localhost:8000/api-token-refresh/
Refresh with tokens can be repeated (token1 -> token2 -> token3), but this chain of token stores the time that the original token (obtained with username/password credentials), as orig_iat
. You can only keep refreshing tokens up to JWT_REFRESH_EXPIRATION_DELTA
.
A typical use case might be a web app where you'd like to keep the user "logged in" the site without having to re-enter their password, or get kicked out by surprise before their token expired. Imagine they had a 1-hour token and are just at the last minute while they're still doing something. With mobile you could perhaps store the username/password to get a new token, but this is not a great idea in a browser. Each time the user loads the page, you can check if there is an existing non-expired token and if it's close to being expired, refresh it to extend their session. In other words, if a user is actively using your site, they can keep their "session" alive.
This allows for a client to request refresh tokens. These refresh tokens do not expire. They can be revoked (deleted). When a JWT has expired, it's possible to send a request with the refresh token in the header, and get back a new JWT.
Declare the app
INSTALLED_APPS = [
...,
'rest_framework_jwt.refreshtoken',
]
Run migrations
$ python manage.py migrate refreshtoken
Configure your urls to add new endpoint
from rest_framework_jwt.refreshtoken.routers import urlpatterns as jwt_urlpatterns
urlpatterns = [
url(...),
] + jwt_urlpatterns
You can include this refresh token in your JWT_RESPONSE_PAYLOAD_HANDLER
def jwt_response_payload_handler(token, user=None, request=None):
return {
'token': token,
'user': UserSerializer(user).data,
'refresh_token': user.refresh_tokens.first().key,
}
Then your user can ask a new JWT token as long as the refresh_token exists.
$ curl -X POST -H "Authorization: RefreshToken <REFRESH_TOKEN>" http://localhost:8000/delegate/
'{"token": "your_jwt_token_..."}'
In some microservice architectures, authentication is handled by a single service. Other services delegate the responsibility of confirming that a user is logged in to this authentication service. This usually means that a service will pass a JWT received from the user to the authentication service, and wait for a confirmation that the JWT is valid before returning protected resources to the user.
This setup is supported in this package using a verification endpoint. Add the following URL pattern:
url(r'^api-token-verify/', 'rest_framework_jwt.views.verify_jwt_token'),
Passing a token to the verification endpoint will return a 200 response and the token if it is valid. Otherwise, it will return a 400 Bad Request as well as an error identifying why the token was invalid.
$ curl -X POST -H "Content-Type: application/json" -d '{"token":"<EXISTING_TOKEN>"}' http://localhost:8000/api-token-verify/
There are some additional settings that you can override similar to how you'd do it with Django REST framework itself. Here are all the available defaults.
JWT_AUTH = {
'JWT_ENCODE_HANDLER':
'rest_framework_jwt.utils.jwt_encode_handler',
'JWT_DECODE_HANDLER':
'rest_framework_jwt.utils.jwt_decode_handler',
'JWT_PAYLOAD_HANDLER':
'rest_framework_jwt.utils.jwt_payload_handler',
'JWT_PAYLOAD_GET_USER_ID_HANDLER':
'rest_framework_jwt.utils.jwt_get_user_id_from_payload_handler',
'JWT_RESPONSE_PAYLOAD_HANDLER':
'rest_framework_jwt.utils.jwt_response_payload_handler',
'JWT_SECRET_KEY': settings.SECRET_KEY,
'JWT_ALGORITHM': 'HS256',
'JWT_VERIFY': True,
'JWT_VERIFY_EXPIRATION': True,
'JWT_LEEWAY': 0,
'JWT_EXPIRATION_DELTA': datetime.timedelta(seconds=300),
'JWT_AUDIENCE': None,
'JWT_ISSUER': None,
'JWT_ALLOW_REFRESH': False,
'JWT_REFRESH_EXPIRATION_DELTA': datetime.timedelta(days=7),
'JWT_AUTH_HEADER_PREFIX': 'JWT',
}
This packages uses the JSON Web Token Python implementation, PyJWT and allows to modify some of it's available options.
This is the secret key used to sign the JWT. Make sure this is safe and not shared or public.
Default is your project's settings.SECRET_KEY
.
Possible values are any of the supported algorithms for cryptographic signing in PyJWT.
Default is "HS256"
.
If the secret is wrong, it will raise a jwt.DecodeError telling you as such. You can still get at the payload by setting the JWT_VERIFY
to False
.
Default is True
.
You can turn off expiration time verification with by setting JWT_VERIFY_EXPIRATION
to False
.
Default is True
.
This allows you to validate an expiration time which is in the past but no very far. For example, if you have a JWT payload with an expiration time set to 30 seconds after creation but you know that sometimes you will process it after 30 seconds, you can set a leeway of 10 seconds in order to have some margin.
Default is 0
seconds.
This is an instance of Python's datetime.timedelta
. This will be added to datetime.utcnow()
to set the expiration time.
Default is datetime.timedelta(seconds=300)
(5 minutes).
This is a string that will be checked against the aud
field of the token, if present.
Default is None
(fail if aud
present on JWT).
This is a string that will be checked against the iss
field of the token.
Default is None
(do not check iss
on JWT).
Enable token refresh functionality. Token issued from rest_framework_jwt.views.obtain_jwt_token
will have an orig_iat
field. Default is False
Limit on token refresh, is a datetime.timedelta
instance. This is how much time after the original token that future tokens can be refreshed from.
Default is datetime.timedelta(days=7)
(7 days).
Specify a custom function to generate the token payload
If you store user_id
differently than the default payload handler does, implement this function to fetch user_id
from the payload.
Responsible for controlling the response data returned after login or refresh. Override to return a custom response such as including the serialized representation of the User.
Defaults to return the JWT token.
Example:
def jwt_response_payload_handler(token, user=None, request=None):
return {
'token': token,
'user': UserSerializer(user).data
}
Default is {'token': token}
You can modify the Authorization header value prefix that is required to be sent together with the token. The default value is JWT
. This decision was introduced in PR #4 to allow using both this package and OAuth2 in DRF.
Another common value used for tokens and Authorization headers is Bearer
.
Default is JWT
.
Right now JSONWebTokenAuthentication
assumes that the JWT will come in the header. The JWT spec does not require this (see: Making a service Call). For example, the JWT may come in the querystring. The ability to send the JWT in the querystring is needed in cases where the user cannot set the header (for example the src element in HTML).
To achieve this functionality, the user might write a custom Authentication
:
class JSONWebTokenAuthenticationQS(BaseJSONWebTokenAuthentication):
def get_jwt_value(self, request):
return request.QUERY_PARAMS.get('jwt')
It is recommended to use BaseJSONWebTokenAuthentication
, a new base class with no logic around parsing the HTTP headers.