
Product
Introducing Webhook Events for Alert Changes
Add real-time Socket webhook events to your workflows to automatically receive software supply chain alert changes in real time.
propelauth-django-rest-framework
Advanced tools
A Django Rest Framework library for managing authentication, backed by PropelAuth.
PropelAuth makes it easy to add authentication and authorization to your B2B/multi-tenant application.
Your frontend gets a beautiful, safe, and customizable login screen. Your backend gets easy authorization with just a few lines of code. You get an easy-to-use dashboard to config and manage everything.
pip install propelauth-django-rest-framework
init_auth performs a one-time initialization of the library.
It will verify your api_key is correct and fetch the metadata needed to verify access tokens in IsUserAuthenticated and AllowAny.
from propelauth_django_rest_framework import init_auth
auth = init_auth("YOUR_AUTH_URL", "YOUR_API_KEY")
Protecting an API route is as simple as adding a Django permission to the route.
None of the Django permissions make a external request to PropelAuth. They all are verified locally using the access token provided in the request, making it very fast.
A Django permission that will verify the request was made by a valid user.
If a valid access token is provided, it will set request.propelauth_user to be a User Class.
If not, the request is rejected with a 401 status code. While not required, you can use the RequiredRequest Class to get full type support.
from propelauth_django_rest_framework import init_auth, RequiredRequest
auth = init_auth("YOUR_AUTH_URL", "YOUR_API_KEY")
@api_view(['GET'])
@permission_classes([auth.IsUserAuthenticated])
def whoami(request: RequiredRequest):
return HttpResponse(request.propelauth_user.user_id)
class WhoAmIView(APIView):
permission_classes = [auth.IsUserAuthenticated]
def get(self, request: RequiredRequest):
return HttpResponse(request.propelauth_user.user_id)
Similar to IsUserAuthenticated, except if an access token is missing or invalid, the request is allowed to continue, but request.propelauth_user will be None. While not required, you can use the OptionalRequest Class to get full type support.
from propelauth_django_rest_framework import OptionalRequest
class OptionalUserView(APIView):
permission_classes = [auth.AllowAny]
def get(self, request: OptionalRequest):
if request.propelauth_user is None:
return HttpResponse("none")
return HttpResponse(request.propelauth_user.user_id)
You can also verify which organizations the user is in, and which roles and permissions they have in each organization all through the User Class.
Verify that the request was made by a valid user and that the user is a member of the specified organization. This can be done using the User Class.
from propelauth_django_rest_framework import RequiredRequest
@api_view(['GET'])
@permission_classes([auth.IsUserAuthenticated])
def org_membership(request: RequiredRequest, org_id):
org = request.propelauth_user.get_org(org_id)
if org is None:
# return 403 error
return Response(f"You are in org {org.org_name}")
Similar to checking org membership, but will also verify that the user has a specific Role in the organization. This can be done using either the User or OrgMemberInfo classes.
A user has a Role within an organization. By default, the available roles are Owner, Admin, or Member, but these can be configured. These roles are also hierarchical, so Owner > Admin > Member.
## Assuming a Role structure of Owner => Admin => Member
@api_view(['GET'])
@permission_classes([auth.IsUserAuthenticated])
def org_owner(request: RequiredRequest, org_id):
org = request.propelauth_user.get_org(org_id)
if (org is None) or (org.user_is_role("Owner") == False):
# return 403 error
return Response(f"You are an Owner in org {org.org_name}")
Similar to checking org membership, but will also verify that the user has the specified permission in the organization. This can be done using either the User or OrgMemberInfo classes.
Permissions are arbitrary strings associated with a role. For example, can_view_billing, ProductA::CanCreate, and ReadOnly are all valid permissions.
You can create these permissions in the PropelAuth dashboard.
@api_view(['GET'])
@permission_classes([auth.IsUserAuthenticated])
def org_billing(request: RequiredRequest, org_id):
org = request.propelauth_user.get_org(org_id)
if (org is None) or (org.user_has_permission("can_view_billing") == False):
# return 403 error
return Response(f"You can view billing information for org {org.org_name}")
You can also use the library to call the PropelAuth APIs directly, allowing you to fetch users, create orgs, and a lot more. See the API Reference for more information.
from propelauth_django_rest_framework import init_auth
auth = init_auth("YOUR_AUTH_URL", "YOUR_API_KEY")
magic_link = auth.create_magic_link(email="test@example.com")
Feel free to reach out at support@propelauth.com
FAQs
A library for managing authentication in Django Rest Framework
We found that propelauth-django-rest-framework demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Add real-time Socket webhook events to your workflows to automatically receive software supply chain alert changes in real time.

Security News
ENISA has become a CVE Program Root, giving the EU a central authority for coordinating vulnerability reporting, disclosure, and cross-border response.

Product
Socket now scans OpenVSX extensions, giving teams early detection of risky behaviors, hidden capabilities, and supply chain threats in developer tools.