Connecting an Authentication Provider (Part 3/3)¶
This is part 3 of our authentication series:
- Basic Authentication - Control who can access your bot
- Resource Authorization - Let users have private conversations
- Production Auth (you are here) - Add real user accounts and validate using OAuth2
In the Making Conversations Private tutorial, we added resource authorization to give users private conversations. However, we were still using hard-coded tokens for authentication, which is not secure. Now we'll replace those tokens with real user accounts using OAuth2.
We'll keep the same Auth
object and resource-level access control, but upgrade our authentication to use Supabase as our identity provider. While we use Supabase in this tutorial, the concepts apply to any OAuth2 provider. You'll learn how to:
- Replace test tokens with real JWT tokens
- Integrate with OAuth2 providers for secure user authentication
- Handle user sessions and metadata while maintaining our existing authorization logic
Requirements¶
You will need to set up a Supabase project to use its authentication server for this tutorial. You can do so here.
Background¶
OAuth2 involves three main roles:
- Authorization server: The identity provider (e.g., Supabase, Auth0, Google) that handles user authentication and issues tokens
- Application backend: Your LangGraph application. This validates tokens and serves protected resources (conversation data)
- Client application: The web or mobile app where users interact with your service
A standard OAuth2 flow works something like this:
sequenceDiagram
participant User
participant Client
participant AuthServer
participant LangGraph Backend
User->>Client: Initiate login
User->>AuthServer: Enter credentials
AuthServer->>Client: Send tokens
Client->>LangGraph Backend: Request with token
LangGraph Backend->>AuthServer: Validate token
AuthServer->>LangGraph Backend: Token valid
LangGraph Backend->>Client: Serve request (e.g., run agent or graph)
In the following example, we'll use Supabase as our auth server. The LangGraph application will provide the backend for your app, and we will write test code for the client app. Let's get started!
Setting Up Authentication Provider¶
First, let's install the required dependencies. Start in your custom-auth
directory and ensure you have the langgraph-cli
installed:
Next, we'll need to fech the URL of our auth server and the private key for authentication. Since we're using Supabase for this, we can do this in the Supabase dashboard:
- In the left sidebar, click on tī¸â Project Settings" and then click "API"
- Copy your project URL and add it to your
.env
file
.env
file
4. Finally, copy your "anon public" key and note it down. This will be used later when we set up our client code.
Implementing Token Validation¶
In the previous tutorials, we used the Auth
object to:
- Validate hard-coded tokens in the authentication tutorial
- Add resource ownership in the authorization tutorial
Now we'll upgrade our authentication to validate real JWT tokens from Supabase. The key changes will all be in the @auth.authenticate
decorated function:
- Instead of checking against a hard-coded list of tokens, we'll make an HTTP request to Supabase to validate the token
- We'll extract real user information (ID, email) from the validated token
And we'll keep our existing resource authorization logic unchanged
Let's update src/security/auth.py
to implement this:
import os
import httpx
from langgraph_sdk import Auth
auth = Auth()
# This is loaded from the `.env` file you created above
SUPABASE_URL = os.environ["SUPABASE_URL"]
SUPABASE_SERVICE_KEY = os.environ["SUPABASE_SERVICE_KEY"]
@auth.authenticate
async def get_current_user(authorization: str | None):
"""Validate JWT tokens and extract user information."""
assert authorization
scheme, token = authorization.split()
assert scheme.lower() == "bearer"
try:
# Verify token with auth provider
async with httpx.AsyncClient() as client:
response = await client.get(
f"{SUPABASE_URL}/auth/v1/user",
headers={
"Authorization": authorization,
"apiKey": SUPABASE_SERVICE_KEY,
},
)
assert response.status_code == 200
user = response.json()
return {
"identity": user["id"], # Unique user identifier
"email": user["email"],
"is_authenticated": True,
}
except Exception as e:
raise Auth.exceptions.HTTPException(status_code=401, detail=str(e))
# ... the rest is the same as before
# Keep our resource authorization from the previous tutorial
@auth.on
async def add_owner(ctx, value):
"""Make resources private to their creator using resource metadata."""
filters = {"owner": ctx.user.identity}
metadata = value.setdefault("metadata", {})
metadata.update(filters)
return filters
The most important change is that we're now validating tokens with a real authentication server. Our authentication handler has the private key for our Supabase project, which we can use to validate the user's token and extract their information.
Let's test this with a real user account!
Testing Authentication Flow¶
Let's test out our new authentication flow. You can run the following code in a file or notebook. You will need to provide:
- A valid email address
- A Supabase project URL (from above)
- A Supabase anon public key (also from above)
import os
import httpx
from getpass import getpass
from langgraph_sdk import get_client
# Get email from command line
email = getpass("Enter your email: ")
base_email = email.split("@")
password = "secure-password" # CHANGEME
email1 = f"{base_email[0]}+1@{base_email[1]}"
email2 = f"{base_email[0]}+2@{base_email[1]}"
SUPABASE_URL = os.environ.get("SUPABASE_URL")
if not SUPABASE_URL:
SUPABASE_URL = getpass("Enter your Supabase project URL: ")
# This is your PUBLIC anon key (which is safe to use client-side)
# Do NOT mistake this for the secret service role key
SUPABASE_ANON_KEY = os.environ.get("SUPABASE_ANON_KEY")
if not SUPABASE_ANON_KEY:
SUPABASE_ANON_KEY = getpass("Enter your public Supabase anon key: ")
async def sign_up(email: str, password: str):
"""Create a new user account."""
async with httpx.AsyncClient() as client:
response = await client.post(
f"{SUPABASE_URL}/auth/v1/signup",
json={"email": email, "password": password},
headers={"apiKey": SUPABASE_ANON_KEY},
)
assert response.status_code == 200
return response.json()
# Create two test users
print(f"Creating test users: {email1} and {email2}")
await sign_up(email1, password)
await sign_up(email2, password)
Then run the code.
About test emails
We'll create two test accounts by adding "+1" and "+2" to your email. For example, if you use "myemail@gmail.com", we'll create "myemail+1@gmail.com" and "myemail+2@gmail.com". All emails will be delivered to your original address.
â ī¸ Before continuing: Check your email and click both confirmation links. Supabase will will reject /login
requests until after you have confirmed your users' email.
Now let's test that users can only see their own data. Make sure the server is running (run langgraph dev
) before proceeding. The following snippet requires the "anon public" key that you copied from the Supabase dashboard while setting up the auth provider previously.
async def login(email: str, password: str):
"""Get an access token for an existing user."""
async with httpx.AsyncClient() as client:
response = await client.post(
f"{SUPABASE_URL}/auth/v1/token?grant_type=password",
json={
"email": email,
"password": password
},
headers={
"apikey": SUPABASE_ANON_KEY,
"Content-Type": "application/json"
},
)
assert response.status_code == 200
return response.json()["access_token"]
# Log in as user 1
user1_token = await login(email1, password)
user1_client = get_client(
url="http://localhost:2024", headers={"Authorization": f"Bearer {user1_token}"}
)
# Create a thread as user 1
thread = await user1_client.threads.create()
print(f"â
User 1 created thread: {thread['thread_id']}")
# Try to access without a token
unauthenticated_client = get_client(url="http://localhost:2024")
try:
await unauthenticated_client.threads.create()
print("â Unauthenticated access should fail!")
except Exception as e:
print("â
Unauthenticated access blocked:", e)
# Try to access user 1's thread as user 2
user2_token = await login(email2, password)
user2_client = get_client(
url="http://localhost:2024", headers={"Authorization": f"Bearer {user2_token}"}
)
try:
await user2_client.threads.get(thread["thread_id"])
print("â User 2 shouldn't see User 1's thread!")
except Exception as e:
print("â
User 2 blocked from User 1's thread:", e)
â
User 1 created thread: d6af3754-95df-4176-aa10-dbd8dca40f1a
â
Unauthenticated access blocked: Client error '403 Forbidden' for url 'http://localhost:2024/threads'
â
User 2 blocked from User 1's thread: Client error '404 Not Found' for url 'http://localhost:2024/threads/d6af3754-95df-4176-aa10-dbd8dca40f1a'
Perfect! Our authentication and authorization are working together: 1. Users must log in to access the bot 2. Each user can only see their own threads
All our users are managed by the Supabase auth provider, so we don't need to implement any additional user management logic.
Congratulations! đ¶
You've successfully built a production-ready authentication system for your LangGraph application! Let's review what you've accomplished:
- Set up an authentication provider (Supabase in this case)
- Added real user accounts with email/password authentication
- Integrated JWT token validation into your LangGraph server
- Implemented proper authorization to ensure users can only access their own data
- Created a foundation that's ready to handle your next authentication challenge đ
This completes our authentication tutorial series. You now have the building blocks for a secure, production-ready LangGraph application.
What's Next?¶
Now that you have production authentication, consider:
- Building a web UI with your preferred framework (see the Custom Auth template for an example)
- Learn more about the other aspects of authentication and authorization in the conceptual guide on authentication.
- Customize your handlers and setup further after reading the reference docs.