DEV Community

Cover image for Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process
Be Hai Nguyen
Be Hai Nguyen

Posted on

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

In the first post, we explore some aspects of OAuth2 authentication, focusing on the /token path as illustrated in an example from the Simple OAuth2 with Password and Bearer section of the Tutorial - User Guide Security. In this subsequent post, we implement our own custom preliminary login process, leveraging the /token path. This means that both the Swagger UI Authorize button and our application's login button utilise the same server code.

🐍 Index of the Complete Series.

πŸš€ Please note, complete code for this post can be downloaded from GitHub with:

git clone -b v0.2.0 https://github.com/behai-nguyen/fastapi_learning.git
Enter fullscreen mode Exit fullscreen mode

During my research on β€œFastAPI application custom login process”, I've encountered implementations where there are two endpoints for handling authentication: the /token endpoint, as discussed in the Tutorial - User Guide Security section, and the application's own login endpoint.

πŸ’₯ This approach doesn't seem right to me. In my view, the /token endpoint should serve as the application's login endpoint as well. In this post, we introduce a preliminary custom login process with the endpoint being the /token endpoint.

The code developed in this post maintains the one-module application structure from the original example. However, we've added a login HTML page and organised the project directory structure to prepare for further code changes as we progress. The updated project layout is listed below.

-- Please note, those marked with β˜… are updated, and those marked with β˜† are new.


/home/behai/fastapi_learning/
β”œβ”€β”€ main.py β˜…
β”œβ”€β”€ pyproject.toml
β”œβ”€β”€ README.md β˜…
└── src β˜†
    └── fastapi_learning
        β”œβ”€β”€ static
        β”‚ └── styles.css
        └── templates
            β”œβ”€β”€ auth
            β”‚ └── login.html
            └── base.html
Enter fullscreen mode Exit fullscreen mode

Changes to main.py include the following:

β“΅ Lines 21 to 23: Added required imports to support HTML output.

β“Ά Lines 25 to 45: Completely refactored the fake_users_db database to slowly match the test employees MySQL database by Oracle Corporation, as utilised in the SQLAlchemy database wrapper component FastAPI example, and Update the employees table, adding new fields email and password.

β“· Lines 49 to 50: Added initialisation code to prepare support for HTML template processing.

β“Έ Lines 66 to 72: Refactored models to align with the changes in fake_users_db.

β“Ή Lines 95 to 100: Refactored the get_current_active_user(...) method to cease checking the disabled attribute of the User model, as this attribute has been removed from the model.

β“Ί Lines 120 to 123: Implemented the new /login endpoint, which simply returns the login HTML page.

πŸš€ Note that the endpoint code for the /token path, specifically the method async def login(form_data: Annotated[OAuth2PasswordRequestForm, Depends()]):, remains unchanged.

πŸ’₯ Regarding the HTML login page, please take note of the following points:

...
    <form method="POST" action="/token" id="loginForm">
        <h1 class="h3 mb-3 fw-normal">Please login</h1>

        {% if message is defined %}
            <h2>{{ message }}</h2>
        {% endif %}

        <div>
            <label for="username">Email address:</label>
            <input type="email" class="form-control" id="username" name="username" placeholder="name@example.com" required value="">
        </div>

        <div>
            <label for="password">Password:</label>
            <input type="password" class="form-control" id="password" name="password" placeholder="Password" required value="">
        </div>
        <button type="submit">Login</button>
    </form>
... 
Enter fullscreen mode Exit fullscreen mode

β“΅ The action of the login form is directed to the /token path. In other words, when the login form is submitted, it sends a POST login request to the same endpoint used by the Authorize button on the Swagger UI page.

β“Ά The names of the two login fields are username and password. This requirement is specified in the tutorial in the section titled Simple OAuth2 with Password and Bearer:

OAuth2 specifies that when using the "password flow" (that we are using) the client/user must send a username and password fields as form data.

πŸš€ Our application's login process now shares the same server code as the Swagger UI login process. We have two separate β€œclients”:

  1. http://0.0.0.0:port/docs: The Swagger UI client page.
  2. http://0.0.0.0:port/login: Our own custom login page.

On Ubuntu 22.10, run the application with the command:

(venv) ...:~/fastapi_learning$ venv/bin/uvicorn main:app --host 0.0.0.0 --port 5000
Enter fullscreen mode Exit fullscreen mode

When accessing the Swagger UI page on Windows 10 at http://192.168.0.16:5000/docs, we encounter a familiar page:

106-01.png

The GET /login path should simply return the login HTML page, while the remaining paths should function as discussed in the first post.

When accessing the application's login page on Windows 10 at http://192.168.0.16:5000/login, we are presented with our custom login page:

106-02.png

Upon logging in using one of the following credentials: behai_nguyen@hotmail.com/password or pranav.furedi.10198@gmail.com/password, we should receive a successful JSON response, as depicted in the screenshot below:

106-03.png

When attempting to log in using an invalid credential, we should receive an HTTP 400 response, which indeed occurs, as seen in the screenshots below:

106-04a.png
106-04b.png
106-04c.png

In the current implementation, the login process is incomplete, but it serves as an appropriate preliminary step nonetheless. We will conclude this post here as I don't want to make it too long... In the next post or so, we will implement stateful sessions and extend OAuth2PasswordBearer to maintain authenticated sessions. This means that after a successful login, users can access protected application routes until they choose to log out.

Thank you for reading. I hope you find the information in this post useful. Stay safe, as always.

✿✿✿

Feature image source:

🐍 Index of the Complete Series.

Top comments (0)