Python Kmsauth Save Abandoned

A python library for reusing KMS for your own authentication and authorization

Project README

python-kmsauth

A python library for KMS authentication and authorization

Usage

kmsauth can generate authentication tokens and validate authentication tokens. kmsauth current supports tokens in v1 or v2 format. By default, when generating tokens, it will generate tokens in v2 format. The difference between the formats is the encryption context and the username format.

Decrypting tokens requires the username and the token, so when passing this to a service, you should pass both along.

Token formats

v1:

  • username: 'my-service-name'
  • encryption context: {"to":"their-service-name","from":"my-service-name"}

v2:

  • username: '2/service/my-service-name'
  • encryption context: {"to":"their-service-name","from":"my-service-name","user_type":"service"}

Generating tokens

import kmsauth
# user to service authentication
generator = kmsauth.KMSTokenGenerator(
    # KMS key to use for authentication
    'alias/authnz-production',
    # Encryption context to use
    {
        # We're authenticating to this service
        'to':'confidant-production',
        # It's from this user
        'from':'rlane',
        # This token is for a user
        'user_type': 'user'
    },
    # Find the KMS key in this region
    'us-east-1'
)
username = generator.get_username()
token = generator.get_token()

# service to service authentication
generator = kmsauth.KMSTokenGenerator(
    # KMS key to use for authentication
    'alias/authnz-production',
    # Encryption context to use
    {
        # We're authenticating to this service
        'to':'confidant-production',
        # It's from this service
        'from':'example-production',
        # This token is for a service
        'user_type': 'service'
    },
    # Find the KMS key in this region
    'us-east-1'
)
username = generator.get_username()
token = generator.get_token()

Validating tokens

import kmsauth
validator = kmsauth.KMSTokenValidator(
    # KMS keys to use for service authentication
    ['alias/authnz-production'],
    # KMS keys to use for user authentication
    ['alias/authnz-users-production', '6655d2a8-0606-4727-a1f6-f5b6a6754377'],
    # The context of this validation (the "to" context to validate against)
    'confidant-production',
    # Find the KMS keys in this region
    'us-east-1'
)
validator.decrypt_token(username, token)

If you're extending the common KMS auth token context, you can pass extra context into the validator:

import kmsauth
validator = kmsauth.KMSTokenValidator(
    # KMS keys to use for service authentication
    ['alias/authnz-production'],
    # KMS keys to use for user authentication
    ['alias/authnz-users-production', '6655d2a8-0606-4727-a1f6-f5b6a6754377'],
    # The context of this validation (the "to" context to validate against)
    'confidant-production',
    # Find the KMS keys in this region
    'us-east-1',
    extra_context={'action': 'create_resource'}
)
validator.decrypt_token(username, token)

Note: 'to', 'from', and 'user_type' keys are not allowed to be set in extra_context.

Reporting security vulnerabilities

If you've found a vulnerability or a potential vulnerability in kmsauth please let us know at [email protected]. We'll send a confirmation email to acknowledge your report, and we'll send an additional email when we've identified the issue positively or negatively.

Getting support or asking questions

kmsauth is a component of Confidant, so discussion for it is through the same channels as Confidant. We have a mailing list for discussion, and a low volume list for announcements:

We also have an IRC channel on freenode and a Gitter channel:

Feel free to drop into either Gitter or the IRC channel for any reason, even if just to chat. It doesn't matter which one you join, the messages are sync'd between the two.

Open Source Agenda is not affiliated with "Python Kmsauth" Project. README Source: lyft/python-kmsauth
Stars
38
Open Issues
1
Last Commit
4 years ago
License
Tags

Open Source Agenda Badge

Open Source Agenda Rating