Skip to content

Mimetis/aad_fastapi

Repository files navigation

Protecting your FAST API web API with Azure AD

This package allows you to protect easily your Web API, using Azure AD.

It has been created specifically for FAST API, delivering a new middleware in the pipeline to authenticate and authorize any http requests, if needed.

Installation

To install with pip:

> python -m pip install aad_fastapi

Usage

Once configured in Azure AD (see sections below), just add an authentication middleware with the AadBearerBackend:

from aad_fastapi import (
    AadBearerBackend,
    AadUser,
    authorize,
    oauth2_scheme,
    AzureAdSettings
)

# App Registration settings for protecting all the APIs.
api_options = AzureAdSettings()
api_options.client_id = environ.get("API_CLIENT_ID")
api_options.domain = environ.get("DOMAIN")
api_options.scopes = environ.get("SCOPES")

# App Registration setting for authentication SWAGGER WEB UI AUTHENTICATION.
web_ui_client_id = environ.get("CLIENT_ID")  # Client ID
web_ui_scopes = environ.get("SCOPES")  # Client ID

# pre fill client id
swagger_ui_init_oauth = {
    "usePkceWithAuthorizationCodeGrant": "true",
    "clientId": web_ui_client_id,
    "appName": "B-ID",
    "scopes": web_ui_scopes,
}

# Create a FasAPI instance
app = FastAPI(swagger_ui_init_oauth=swagger_ui_init_oauth)

# Add the bearer middleware, protected with Api App Registration
app.add_middleware(AuthenticationMiddleware, backend=AadBearerBackend(api_options))

Once configured, you can add authentication dependency injection to your routers:

# These routers needs an authentication for all its routes using Web App Registration
app.include_router(engines.router, dependencies=[Depends(oauth2_scheme(options=api_options))])

Or directly to your web api route:

@app.get("/user")
async def user(request: Request, token=Depends(oauth2_scheme(options=api_options))):
   return request.user

It's important to have the Request object set as the first parameter for your endpoint

if you are inspecting the request.user object, you will find all the user's property retrieved from Azure AD.

You can specify scopes and / or roles, using decorators, to be checked before accessing your web api:

@app.get("/user_with_scope")
@authorize("user_impersonation")
async def user_with_scope(
    request: Request, token=Depends(oauth2_scheme(options=api_options))
):
 # code here

@app.get("/user_with_scope_and_roles")
@authorize("user_impersonation", "admin-role")
async def user_with_scope_and_roles(
    request: Request, token=Depends(oauth2_scheme(options=api_options))
):
 # code here

Role Requirements and Multiple Roles

The @authorize decorator is capable of specifying multiple roles as a list of string, which will be checked against the user's roles. If all the roles are found, the user is authorized.

To require the user to have at least one of the specified roles, you can use the role_requirement parameter with the value RoleRequirement.ANY:

@app.get("/user_with_scope_and_roles_any")
@authorize("user_impersonation", roles=["admin","superuser"], role_requirement=RoleRequirement.ANY)
async def user_with_scope_and_roles_any(
    request: Request, token=Depends(oauth2_scheme(options=api_options))
):
    # code here

NOTE: RoleRequirement.ALL is the default behavior and does not need to be specified.

Register your application within your Azure AD tenant

There are two applications to register:

  • First one will protect the Web API. It will only allows bearer token to access with the correct scope.
  • Second one will allow the user to authenticate himself and get a token to access the Web API, using the correct scope.

Register the Web API application

The Web API application does not need to allow user to authenticate. The main purpose of this application is to protect our Web API.

  1. Navigate to the Microsoft identity platform for developers App registrations page.
  2. Select New registration.
  3. In the Register an application page that appears, enter your application's registration information:
    • In the Name section, enter an application name, for example py-api.
    • Under Supported account types, select Accounts in this organizational directory only (Microsoft only - Single tenant).
    • Select Register to create the application.
  4. In the app's registration screen, find and note the Application (client) ID. You use this value in your app's configuration file(s) later in your code.
  5. Select Save to save your changes.
  6. In the app's registration screen, select the Expose an API blade to the left to open the page where you can declare the parameters to expose this app as an API for which client applications can obtain access tokens for. The first thing that we need to do is to declare the unique resource URI that the clients will be using to obtain access tokens for this API. To declare an resource URI, follow the following steps:
    • Click Set next to the Application ID URI to generate a URI that is unique for this app.
    • For this sample, we are using the domain name and the client id as theApplication ID URI (https://{domain}.onmicrosoft.com/{clientId}) by selecting Save.
  7. All APIs have to publish a minimum of one scope for the client's to obtain an access token successfully. To publish a scope, follow the following steps:
    • Select Add a scope button open the Add a scope screen and Enter the values as indicated below:
      • For Scope name, use user_impersonation.
      • Select Admins and users options for Who can consent?
      • Keep State as Enabled
      • Click on the Add scope button on the bottom to save this scope.

Register the Client application

The Client application will allow the user to authenticate, and will expose a scope to the Web Api application.

  1. Navigate to the Microsoft identity platform for developers App registrations page.
  2. Select New registration.
  3. In the Register an application page that appears, enter your application's registration information:
    • In the Name section, enter an application name that will be displayed to users, for example py-web.
    • Under Supported account types, select Accounts in this organizational directory only (Microsoft only - Single tenant).
  4. Select Register to create the application.
  5. In the app's registration screen, find and note the Application (client) ID. You use this value in your app's configuration file(s) later in your code.
  6. In the app's registration screen, select Authentication in the menu.
    • If you don't have a platform added, select Add a platform and select the Web option.
    • In the Redirect URIs | Suggested Redirect URIs for public clients (mobile, desktop) section, select http://localhost:5000/auth/oauth2-redirect
    • Select again Add a platform and select the Single-page application option.
    • In the Redirect URIs | Suggested Redirect URIs for public clients (mobile, desktop) section, select http://localhost:5000/docs/oauth2-redirect
  7. Select Save to save your changes.

Do not activate the implicit flow, as we are using the new Authorization Code Flow with PKCE (https://oauth.net/2/pkce/)

  1. In the app's registration screen, click on the Certificates & secrets blade in the left to open the page where we can generate secrets and upload certificates.

  2. In the Client secrets section, click on New client secret:

    • Type a key description (for instance sample in our sample),
    • Select one of the available key durations (In 1 year, In 2 years, or Never Expires) as per your security concerns.
    • The generated key value will be displayed when you click the Add button. Copy the generated value for use in the steps later.
    • You'll need this key later in your code's configuration files. This key value will not be displayed again, and is not retrievable by any other means, so make sure to note
  3. In the app's registration screen, click on the API permissions blade in the left to open the page where we add access to the APIs that your application needs.

    • Click the Add a permission button and then,
    • Ensure that the My APIs tab is selected.
    • In the list of APIs, select the API py-api.
    • In the Delegated permissions section, select the user_impersonation in the list.
    • Click on the Add permissions button at the bottom.

Configure Known Client Applications in the Web API application

For a middle tier Web API to be able to call a downstream Web API, the middle tier app needs to be granted the required permissions as well. However, since the middle tier cannot interact with the signed-in user, it needs to be explicitly bound to the client app in its Azure AD registration. This binding merges the permissions required by both the client and the middle tier Web API and presents it to the end user in a single consent dialog. The user then consent to this combined set of permissions.

To achieve this, you need to add the Application Id of the client app (py-web in our sample), in the Manifest of the Web API in the knownClientApplications property. Here's how:

  1. In the Azure portal, navigate to your py-api app registration, and select Expose an API section.
  2. In the textbox, fill the Client ID of the py-web application
  3. Select the authorized scope user_impersonation
  4. Click Add application

Configure the .devcontainer

Open the project in VS Code and configure correctly the .devcontainer/devcontainer.json file:

TENANT_ID={GUID} # The tenant id where you've created the application registrations
SUBSCRIPTION_ID= {GUID} # Your subscription id
DOMAIN={domain}.onmicrosoft.com # the domain name
AUTHORITY=https://login.microsoftonline.com/{tenant_id} # Authority used to login in Azure AD

# App Registration information for Web Authentication
CLIENT_ID={GUID} # This client id is the authentication client id used by the user (from `py-web` application registration)
CLIENT_SECRET= {PWD} # you 
SCOPES=https://{domain}.onmicrosoft.com/{client_id}/user_impersonation : # Scope exposed to the `py-web` application
API_URL=http://localhost:8000
VAULT_NAME={Vault Name} # Optional : Key vault used to store the secret
VAULT_SECRET_KEY={Vault key} # Optional : Key vault secret's key

# App Registration information for Api Protection
API_CLIENT_ID={GUID} # Client id for the web api protection (from `py-api` application registration)

Run the application

The solutions provides a launch.json example (in the /.vscode folder) that you can use to launch the demo.

  1. In VS Code, select the Run and Debug blade on the left pane
  2. Select the API sub menu item and click the green arrow (or hit F5)
  3. Navigate to the url http://localhost:8000/docs and test the user authentication experience

You don't need to fill the secret textbox when trying to authenticate your user, since we are using the PKCE method

About

aad fastapi bearer validation and client authentication

Resources

License

Stars

Watchers

Forks

Sponsor this project

  •  
  •  

Packages

No packages published