Easy and secure implementation of Azure Entra ID (previously AD) for your FastAPI APIs 🔒 B2C, single- and multi-tenant support.
MIT License
Bot releases are visible (Hide)
Published by JonasKs 2 months ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/5.0.0...5.0.1
InvalidAuth
now takes detail AND request object. ( #200 @JonasKs ) Users should be explicit and use InvalidAuthHttp or InvalidAuthWebSocket if they use this class. Example:-raise InvalidAuth(detail="Missing admin role")
+raise InvalidAuthHttp(detail="Missing admin role") # for HTTP requests
+raise InvalidAuthWebSocket(detail="Missing admin role") # for WebSocket requests
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.4.0...5.0.0
Published by JonasKs 3 months ago
This is a release candidate of 5.0.0.
InvalidAuth
now takes detail AND request object. ( #200 @JonasKs ) Users should be explicit and use InvalidAuthHttp or InvalidAuthWebSocket if they use this class. Example:-raise InvalidAuth(detail="Missing admin role")
+raise InvalidAuthHttp(detail="Missing admin role") # for HTTP requests
+raise InvalidAuthWebSocket(detail="Missing admin role") # for WebSocket requests
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.4.0...5.0.0-rc0
Published by JonasKs 5 months ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.3.1...4.4.0
Published by JonasKs 8 months ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.3.0...4.3.1
Published by JonasKs 12 months ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.2.1...4.3.1
Published by JonasKs about 1 year ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.2.0...4.2.1
Published by JonasKs about 1 year ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.1.3...4.2.0
Published by JonasKs over 1 year ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.1.2...4.1.3
Published by JonasKs over 1 year ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.1.1...4.1.2
Published by JonasKs over 1 year ago
scp
for access token by @enadeau in https://github.com/Intility/fastapi-azure-auth/pull/133
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.1.0...4.1.1
Published by JonasKs over 1 year ago
All claims have now been added to the user object.
Thank you so much, both of you 😊
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.0.0...4.1.0
Published by JonasKs over 1 year ago
Single- and multi-tenant applications now have a default setting that denies guest users access to the APIs. The documentation has been updated, please read it if you'd like to override this setting, or have different settings for different endpoints.
Note: B2C tenants allow guest users by default, as all users will be guest users.
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/3.5.1...4.0.0
Published by JonasKs almost 2 years ago
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/3.5.0...3.5.1
Published by JonasKs over 2 years ago
Features:
B2CMultiTenantAuthorizationCodeBearer
class which simplifies a multi-tenant B2C setup. ( #93 @kristiqntashev )Fix:
tid
optional in the User model to support tokens sent from a B2C single-tenant ( #96 @marcinplatek )Github actions:
Published by JonasKs over 2 years ago
Features
Published by JonasKs over 2 years ago
Features
openid_config_url
in AzureAuthorizationCodeBearerBase to add support for B2C tenants. ( #48 @robteeuwen and @JonasKs )python-jose
to load JWK, instead of x5c
-keys loaded with cryptography
. This add support for B2C tenants ( #48 @robteeuwen and @JonasKs )Other
Published by JonasKs over 2 years ago
Fixes
cryptography
version requirement, adding support for cryptography
version 36, and future major bumps. ( @JonasKs, 63868904e9c7c2f3da31cdeefebec4884da402b4)Published by JonasKs over 2 years ago
Bugfix
collections.abc.Callable
, so this typing import has been changed to typing.Callable
( @ravaszf and @JonasKs #50 )Published by JonasKs almost 3 years ago
Features
auto_error
flag/setting. When set to False
an invalid token will return None
instead of raising exception. ( @bkmetzler and @JonasKs #44 )