django-kaminarimon
(or just kaminarimon) is a library for integrating
kerberos authentication and ldap authorization into a Django/DRF application.
While users can independently choose to integrate one or the other, it is designed to use both and use JWTs as interface for client<->server auth.
Set kaminarimon.auth.KerberosAuthentication
as either:
REST_FRAMEWORK["DEFAULT_AUTHENTICATION_CLASSES"]
- Individually at the view level
This will require the client to send a request with the header
Authorization: Negotiate <token>
which will initiate the SPNEGO protocol.
If the client does not send the aforementioned header when requesting a view
that requires Kerberos authentication, the WWW-Authenticate
is sent back to
the client, signaling that it should use SPNEGO protocol for authentication.
Tip
By default the host or service principal will use the service's FQDN, but it
can be overridden by setting the KRB5_HOSTNAME
environment variable.
Note
A lot of the behavior of this authentication backend is currently hardcoded to only work with Red Hat systems.
Note
Anonymous user access to the LDAP server is required for querying user information.
Warning
Usage of LDAP authorization on its own withour Kerberos authentication is discouraged as it only handles authorization, it does not actually perform any sort of authentication of the user against the LDAP server, i.e. it simply loads the user's groups from the LDAP server.
Simply add the kaminarimon.backend.LDAPRemoteUser
to the
AUTHENTICATION_BACKENDS
django setting.
Required settings:
AUTH_LDAP_SERVER_URI
-- URI to the LDAP serverPUBLIC_READ_GROUPS
-- List of names of groups that, if the user is a member of, grant access to the application.SERVICE_MANAGE_GROUP
-- Group that denotes a user as staff and/or superuser.
The same settings, warnings, notes and tips for the previous sections apply.
Ensure kaminarimon.backend.LDAPRemoteUser
is in AUTHENTICATION_BACKENDS
,
and add kaminarimon.views.krb5_obtain_token_pair_view
to your urls.py
,
it is through this view that clients will obtain access and refresh JWT.
In order to protect other views with such authentication tokens, simply mark the
authentication method as rest_framework_simplejwt.authentication.JWTAuthentication
or similar as, or set it globally using DEFAULT_AUTHENTICATION_CLASSES
.
If your service will be used by browser-based applications and security of tokens
is a concern, you can add kaminarimon.views.refresh_token
to your
urls.py
, this view will accept a cookie set by
kaminarimon.views.krb5_obtain_token_pair_view
in order to provide a fresh
access token without requiring the client to store/handle the refresh token.
The cookie is by default httpOnly, secure and sameSite=Strict.
cd tests/
podman compose -f docker-compose.yml up -d
pytest .