Authentication

This documentation explains the main mechanism of authentication.

Overview

Main host mechanisms are located in apps.auth. Login is internally based on a token authentication: each user session is associated to a token.

There is a common access point, auth which can be used to log out, but to log in, each authentication mechanism use its own endpoint (auth_db and auth_xmpp so far). This way each endpoint can use its own schema validation while the common endpoint can be called for logout, allowing several auth mechanisms to be running at the same time.

Adding a new authentication mechanism

Adding a new authentication mechanism is done by creating a new endpoint extending the basic service. The new endpoint should be named auth_XXX where XXX is a short name for the new mechanism.

The auth module provide the base features, with main service.

class apps.auth.service.AuthService(datasource=None, backend=None)
authenticate(document)

Authenticate user according to credentials

Parameters:documents – credentials for this authentication mechanism
Returns:authenticated user
Raise:CredentialsAuthError if authentication is invalid
on_deleted(doc)

Runs on delete of a session

Parameters:doc – A deleted auth doc AKA a session
Returns:
update_session(updates=None)

Update current session with given data.

Parameters:updates – updates to be made

To implement its authentication mechanism, a module need to override the authenticate method.

When creating a service based on AuthService, the authentication module must use the auth datasource instead of its own endpoint name. This allow several auth methods to use the same session system and to logout from auth common endpoint.

Special case: auth_db

auth_db is used for the basic database login/password authentication. In some cases it may be desirable to replace this mechanism (e.g. this is the case with LDAP). This is done by using the same endpoint name, and avoiding the import of apps.auth.db module. The login/pass default login interface in the client will then stay unchanged.

Other uses of apps.auth

Following functions can be used:

apps.auth.get_user(required=False)

Get user authenticated for current request.

Parameters:required (boolean) – if True and there is no user it will raise an error
apps.auth.get_user_id(required=False)

Get authenticated user id.

Parameters:required (boolean) – if True and there is no user it will raise an error
apps.auth.is_current_user_admin(required=False)

Test if current user is administrator.

Parameters:required – raise an error if required and there is no user context

Superdesk OAuth

Superdesk OAuth support

New in version 1.9.

There is oauth resource for authenticating users by email. Email must be provided by trusted identity service, eg. Google.

The authentication flow with js client is:

  • Client opens server api url in a new window,.
  • There is a redirect to auth provider (eg. Google).
  • Once authenticated user is redirected back to server api url.
  • There user email from auth provider is used to authenticate user.
  • Template is rendered with session data which sends message to parent window and popup is closed.
superdesk.auth.auth_user(email)

Authenticate user via email.

This will create new session for user and render template with session data which is used by client to setup authentication.

Parameters:email – user email address

Superdesk Google OAuth

Superdesk Google Authentication

New in version 1.8.

You can use Google for authentication, first you have to create credentials in Google API console:

  • set your client URL as Authorized JavaScript origins:

    https://example.com
    
  • set server URL + /api/login/google_authorized as Authorized redirect URIs:

    https://example.com/api/login/google_authorized
    

Once configured you will find there Client ID and Client secret, use both to populate Google OAuth Settings.

Changed in version 1.9: There is no need to configure client, it reads config from server now.

Changed in version 1.9: Login url is /api/login/google_authorized instead of /login/google_authorized.

Superdesk SAML Auth