Flask-SSPI is an extension to Flask that allows you to trivially add NTLM based authentication to your website. It depends on both Flask and sspi. You can install the requirements from PyPI with pip or conda, or download them by hand.
The official copy of this documentation is available at Read the Docs.
Install the extension with one of the following commands:
pip install Flask-SSPIor using conda:
conda install -c conda-forge flask-sspi- Based on win32 so only works on Windows servers.
- Tested with Chrome and Edge browsers.
- Only NTLM authentication has been implemented, 'Negotiate' (Kerberos) has not been implemented.
You can decorate any view functions you wish to require authentication with the @authenticate decorator. To get the current user you can use g.current_user:
from flask_sspi import authenticate
from flask import g
@app.route("/protected/<path:path>")
@authenticate
def protected_view(path):
print(g.current_user)
...You can decorate any view functions you wish to require authentication with @requires_authentication. With this keyword, you need to change them to accept the authenticated user principal as their first argument:
from flask_sspi import requires_authentication
@app.route("/protected/<path:path>")
@requires_authentication
def protected_view(user, path):
...Flask-SSPI assumes that the service will be running using the hostname of the host on which the application is run. If this is not the case, you can override it by initializing the module:
from flask_sspi import init_sspi
init_sspi(app, hostname='example.com', package='NTLM')NOTE: init_sspi is optional. If used, current_user will be defined within the context of Jinja templates. You can then use:
<h1>Hello {{ current_user }}</h1>When a protected view is accessed by a client, it will check to see if the request includes authentication credentials in an Authorization header. If there are no such credentials, the application will respond immediately with a 401 Unauthorized response which includes a WWW-Authenticate header field with a value of NTLM indicating to the client that they are currently unauthorized, but that they can authenticate using Negotiate authentication.
If credentials are presented in the Authorization header, the credentials will be validated, the principal of the authenticating user will be extracted, and the protected view will be called with the extracted principal passed in as the first argument.
Once the protected view returns, a WWW-Authenticate header will be added to the response which can then be used by the client to authenticate the server. This is known as mutual authentication.
SSPI also has the ability to serve the value Negotiate from the WWW-Authenticate header. This has not been implemented but could be in the future with the help of the community.
To see a simple example, you can download the code from github. It is in the example directory.
| Decorator | Description |
|---|---|
@authenticate |
The user must have been identified. |
Impersonate |
Context class to impersonate the connecting user: The user's credentials will be used to execute the route function. Use this to access a database under the user's name per example. Important: I could not get this to work with an external database as it requires a trusted connection between the web server and the SQL database (which I don't have). It should work with a database located on the same computer. |
@requires_authentication |
Same as login_required but the user parameter needs to be specified in the arguments of the route function. user will contain the name of the logged user. Kept for backward compatibility. |
For all flask_sspi decorators, a g.current_user entry is created and accessible within the route function. Within HTML templates the variable current_user is also defined if init_sspi is used.
If you want to restrict access to a whole Blueprint, better to do it with the before_request function. Here is an example:
@blueprint.before_request
@authenticate
def before_request():
passYou may want to test your flask application offsite in a non-domain environment. To allow testing without error from flask_sspi you can issue import flask_sspi_fake before any reference to flask_sspi. flask_sspi_fake will use stubs instead of the real functions and allow the site to be tested under the credentials of the currently logged user.
- Initial implementation
- Added the authenticate decorator and the Impersonate context.
The full API reference:
See the API documentation.