Adding social sign in to your Django web application using OAuth

In this tutorial, we'll build a basic Django web application using FusionAuth for an easier and safer way of handling user registration and authentication.


Updated: September 27, 2022

In this tutorial, we’ll build a basic Django web application which does user registration and authentication via FusionAuth, an authentication platform with some unique features.

If you’d like to use Django with OIDC to log your users in, see this post on using Django, OIDC and FusionAuth together.

The application itself is very simple: it will let users put in their birthdays and keep this “secret” information safe for them. With these basics in place, you’ll see how FusionAuth works and how it can extend the application to provide authentication. You can, as always, skip ahead and view the code.

What you’ll need to follow along

We’ll explain nearly everything that we use, but we expect you to have:

  • Basic Python knowledge and a Python environment set up.
  • Preferably basic Django knowledge (or knowledge of a similar web framework such as Flask).
  • Docker and Docker Compose set up as we’ll set up FusionAuth using these.

It’ll also help if you know the basics of OAuth or authentication in general.

Why FusionAuth instead of django-allauth?

Django has a mature authentication system by default, but it isn’t perfect. For example, “social login” (“log in with Google/Facebook/GitHub/Twitter” functionality) isn’t handled by Django by default. You can use the django-allauth package to add this, but now you’re already adding complexity to your project. Soon you’ll want to add more functionality, such as resetting passwords, forgotten password resets, and more.

Nearly every web app needs authentication, but setting it up is more complicated than it seems. Therefore, it’s a great time to follow the Single Responsibility Principle - instead of trying to build out your own authentication and authorization functionality, delegate this to an application whose only job is handling authentication.

Important private data goes in FusionAuth. Everything else in Django.

The image above shows how this works. Your application logic and all public information can be handled by Django. Anything sensitive, such as personally identifiable information (PII), is handled by FusionAuth.

This allows you to focus a majority of your security efforts on the FusionAuth installation. It also means that if you create more applications, they can piggy-back on your centralised authentication instead of having to re-implement authentication for each and every application that you build. You can also create a multi-tenant configuration allowing you to easily have logically separate environments for different clients.

Also, any integrations that you set up with other providers (e.g. Google for “Sign in with Google”) can be done once, instead of per application.

Installing and configuring FusionAuth with Docker Compose

There are various ways to install FusionAuth depending on your system, but the easiest way is to use Docker and Docker Compose. Instructions are here. Currently, to install and run FusionAuth you would run (again, assuming you have Docker installed).

curl -o docker-compose.yml
curl -o docker-compose.override.yml
curl -o .env
docker compose up

Note that this uses a public .env file containing hard-coded database passwords and is not suitable for production use.

Configuring FusionAuth

FusionAuth should now be running and reachable on http://localhost:9011. The first time you visit, you’ll be prompted to set up an admin user and password. Once you’ve done this, you’ll be prompted to complete three more set up steps, as shown below.

FusionAuth prompts us with the setup steps that we need to complete.

We’ll skip step #3 in this tutorial, but sending emails (to verify email addresses and do password resets) is a vital part of FusionAuth running in production, so you’ll want to do that.

Creating an Application

Click “Setup” under “Missing Application” and call your new app “Secret Birthdays”. It’ll get a Client Id and Client Secret automatically. Later, we’ll set up a Django application which will run on http://localhost:8000, so configure the Authorized URLs accordingly. You should add:

  • http://localhost:8000/dashboard to the Authorized redirect URLs
  • http://localhost:8000/ to the Authorized request origin URL
  • http://localhost:8000/ to the Logout URL

Configuring the application URLs in FusionAuth.

While you’re here, turn on “Self service registrations” which will allow our users to sign themselves up for our application.

Under the registration tab, toggle Self service registration to “Enabled”.

Turning on self-service registration in FusionAuth.

Click the Save button in the top right for your changes to take effect.

Creating an application in the Google Developers Console

In order to allow our users to sign in to our app using their Google account, you’ll need to set up a Google Cloud project and get an OAuth ID and secret. The full instructions for doing this are available here.

Use http://localhost:9011 for the authorized JavaScript origin and http://localhost:9011/oauth2/callback for the Authorized redirect URI. This will allow our FusionAuth app to talk to Google’s servers and have them authenticate users on our behalf, as shown below.

Adding authorized URLs to Google.

Note that with a sandbox application, which is created by default, you can only sign up a maximum of 100 users. For production use, you need to make sure that you have pages describing your privacy policy and get approval from Google, which you’ll be prompted to do during the setup process.

Once you’ve set up everything in the Google Console, you’ll need to complete your setup by adding Google as an identity provider to FusionAuth and copying in the Client Id and Client Secret that you received from Google. These are different values than the FusionAuth application’s Client Id and Client Secret. You can find the detailed steps for setting up Google as a third-party login via FusionAuth here.

In the next step, make sure that you have enabled the Google Identity Provider and turn on “Create registration” for your Secret Birthday’s app. You also need to specify the scopes that you allowed when setting up the app in the Google Cloud Console. Also don’t forget to hit the save button.

Enabling Google registration in our application.

Now we’ve done most of the admin. Let’s build a Django app!

Setting up Django

To get started, you should:

  • Create a virtual environment for your project
  • Activate it
  • Install Django, dateparser, and the FusionAuth Python client
  • Create the secretbirthdays Django project
  • Create the secretbirthdaysapp Django app inside this project
  • Run the initial migrations
  • Start the Django development server

The commands to complete all of the above are shown below.

python3 -m venv venv
source venv/bin/activate
pip3 install django dateparser fusionauth-client
django-admin startproject secretbirthdays
cd secretbirthdays
python3 startapp secretbirthdaysapp
python3 makemigrations
python3 migrate
python3 runserver

If all went well, the server should start successfully, as shown below.

The Django development server starting successfully.

And if you visit http://localhost:8000 in your web browser, you should see the default Django page:

The Django default home page.

Building the Secret Birthdays application

Our application will only have three pages, including the FusionAuth login page.

  1. A home page - a public page showing how many users our app has and inviting users to log in.
  2. The Log in / Sign up page (on FusionAuth) with options to use a username/password or to sign in with Google.
  3. A logged in private “dashboard” page, unique per user. This will display the user’s birthday if we have it on record, or allow them to add or change their birthday. It will also let users log out.

First, let’s tell Django that our secretbirthdaysapp is going to be the main app of our secretbirthdays project. In the secretbirthdays/ file, add path('', include('secretbirthdaysapp.urls')), to the urlpatterns array and import Django’s include() function.

The full file should look as follows.

from django.contrib import admin
from django.urls import path, include

urlpatterns = [
  path('', include('secretbirthdaysapp.urls')),

Now we can create the home page. It will look like this:

How our home page will look.

In the secretbirthdaysapp directory create a folder called templates, and a folder called secretbirthdaysapp inside that. This is a Django convention to stop templates with the same name in different apps conflicting.

Now create the file secretbirthdaysapp/templates/secretbirthdaysapp/home.html and add the following code.

    <title>My Django Application</title>
    <h1>Hi, this is a public page</h1>
    <p> There are <b>{{num_users}}</b> users signed up </p>
    <p>You can <a href="{{login_url}}">login</a> to view your private page</p>

We still need to pass the variables num_users and login_url to this template from the backend.

In secretbirthdaysapp/ import View, User, and add a HomeView to render our home page.

from django.contrib.auth.models import User
from django.shortcuts import render
from django.views.generic import View

class HomeView(View):
  def get(self, request):
    num_users = User.objects.count()
    login_url = get_login_url(request)
    return render(
      {"login_url": login_url, "num_users": num_users},

Create the file secretbirthdaysapp/ and add the following code:

from django.urls import path
from . import views

urlpatterns = [
  path('', views.HomeView.as_view(), name='home'),

Finally, register our app in the project-level file, secretbirthdays/ Add secretbirthdaysapp to INSTALLED_APPS. The full definition should look as follows.


If you fire up http://localhost:8000 in your web browser now, you should see our home page:

Our public home page.

To build the login URL (which will direct users to our FusionAuth server), we need to have some of our FusionAuth config copied across to our Django project. Specifically, we’ll need an API key and our app’s Client Id. Navigate to “Settings” and then “API Keys”, and add an API key. Add a name for the key and take note of the generated key value.

Getting the API key from FusionAuth.

For extra security, you can restrict the permissions for the key. For our app, we only need to enable the actions for /api/user/, which will let the key carry out basic actions on users. If you leave the key with no explicitly assigned permissions, it will be an all-powerful key that can control all aspects of your FusionAuth app.

Limiting the scope of the created API key.

Under Applications, click on the green magnifying glass by “Secret Birthdays” and take note of the Client Id (which is the same as the Application Id, so we use them interchangeably) and Client Secret. You need to scroll down a bit in the modal to get to the correct section.

Getting the Application ID from FusionAuth.

Now, in secretbirthdays/, add these values as variables, at the bottom of the file (you’ll need to change the random-looking strings to your own Application’s Id and API key):

FUSION_AUTH_APP_ID = "487c2a90-fb17-4d2f-9b40-12d845c66aff"
FUSION_AUTH_CLIENT_SECRET = "8Kehx7UbWSsg0aNvQb1v5sZYKLWulqCakBzhnrtV_h8"
FUSION_AUTH_API_KEY = "vVLyCEQThDw3kpqdQpv1QRHushEOaJm661whSx3ttsg"
FUSION_AUTH_BASE_URL = "http://localhost:9011"

Allowing users to sign up and log in

Now for the fun part: allowing users to sign up for our application to view their own personal dashboards.

Create a new template in secretbirthdaysapp/templates/secretbirthdaysapp/dashboard.html and add the following code.

    <title>SUPER PRIVATE INFO!!</title>
    <h1>This is private information (<a href="{% url 'logout' %}">Logout</a>)</h1>
    <p>You are logged in as {{request.user.username}}</p>
    {% if message %}
      <font color="red">
    {% endif %}
    <p>Your birthday is {{birthday}}</p>
    <p>Please enter your birthday</p>
    <form action="/dashboard" method="POST">
      {% csrf_token %}
      <input type="text" name="birthday" placeholder="When were you born">
      <input type="Submit" value="SEND">

This template still needs some variables, namely the user’s birthday (if we have it) and any messages based on their input. We also need to connect it to a URL and make the /logout URL meaningful.

Add URLs for the dashboard and to logout in the secretbirthdaysapp/ file. When you are done, the whole file should look like this:

from django.urls import path
from . import views

urlpatterns = [
  path('', views.HomeView.as_view(), name='home'),
  path('dashboard', views.DashboardView.as_view(), name='dashboard'),
  path('logout', views.LogoutView.as_view(), name='logout'),

Now we need to update the secretbirthdaysapp/ to account for these new routes. Add imports for our settings, the FusionAuthClient library, and Django’s shortcuts. Your imports section should look as follows:

from django.conf import settings
from django.contrib.auth.models import User
from django.shortcuts import render, redirect, reverse
from django.views.generic import View

from fusionauth.fusionauth_client import FusionAuthClient

Next, add the Dashboard view:

class DashboardView(View):

  def get(self, request):
    if not user_login_ok(request):
      login_url = get_login_url(request)
      return redirect(login_url)

    birthday = None
    user = None

      client = FusionAuthClient(
        settings.FUSION_AUTH_API_KEY, settings.FUSION_AUTH_BASE_URL
      r = client.retrieve_user(request.user.username)

      if r.was_successful():
        user = r.success_response
        birthday = user["user"]["birthDate"]
    except Exception as e:
      print("couldn't get user")

    return render(request, "secretbirthdaysapp/dashboard.html", {"birthday": birthday})

Here we check if the user can log in (note, this is functionality we still have to write). If everything looks okay, we retrieve the user’s birthday from FusionAuth (which it doesn’t have by default as we don’t get this information from Google or when the user registers). We then need to add the Logout view:

class LogoutView(View):

  def get(self, request, *args, **kwargs):
    redirect_url = request.build_absolute_uri("home")
    url = f"{settings.FUSION_AUTH_BASE_URL}/oauth2/logout?client_id={settings.FUSION_AUTH_APP_ID}"
    return redirect(url)

Finally, add the get_or_create user function near the top of

def get_or_create_user(user_id, request):
  user = User.objects.filter(username=user_id).first()

  if not user:
    user = User(username=user_id)

  request.user = user
  request.session['user_id'] = user_id
  return user

This looks for a Django user using FusionAuth’s user_id as the username. If it doesn’t exist, we create it and save it to the database. Note that now in our Django application we will only keep really basic User objects, with nothing but a randomly generated ID to identify them - all sensitive personal information and passwords are handled solely by FusionAuth.

We also need to build a fairly long URL to log in with FusionAuth. Add another helper function for this:

def get_login_url(request):
  redirect_url = request.build_absolute_uri(reverse("dashboard"))
  login_url = f"{settings.FUSION_AUTH_BASE_URL}/oauth2/authorize?client_id={settings.FUSION_AUTH_APP_ID}&redirect_uri={redirect_url}&response_type=code"

  login_url = login_url.format(
  return login_url

We’ll build this using variables as the components would differ between local, staging, and production setups. We tell Django where to find our FusionAuth app, which Application Id to authenticate with, and where FusionAuth should redirect the user once login is completed.

Now add a helper function to check if everything went okay with the user’s log in. This is the fairly complex OAuth dance that proves identity in several steps:

def user_login_ok(request):
  client = FusionAuthClient(

  code = request.GET.get("code")

  if not code:
    print("no code")
    return False

    redirect_url = request.build_absolute_uri(reverse("dashboard"))
    # if you are using version 1.19.x of the python library or later, use this
    r = client.exchange_o_auth_code_for_access_token(

    # if you are using version 1.18.x of the python library or earlier, use this
    #r = client.exchange_o_auth_code_for_access_token(

    if r.was_successful():
      access_token = r.success_response["access_token"]
      user_id = r.success_response["userId"]
      get_or_create_user(user_id, request)
      return user_id
      return False

  except Exception as e:

Now after the user logs in, they’ll be taken over to the FusionAuth page where they can log in or create an account (if they choose the “Login with Google” option, the login and sign up flows are the same).

The FusionAuth login and sign up page.

If it’s important to you that your login page shares a look and feel with the rest of your application, FusionAuth allows you to fully customise this page using FusionAuth themes, but doing so is left as an exercise for the reader.

After the user is directed back to the /dashboard route from FusionAuth (after logging in), they’ll bring a code with them. This is part of the Authorization Code grant process. The Django application needs to exchange that for an access token. This access token contains claims and could be used to access other protected resources. However, we won’t do so at this time.

If everything goes well, the user is allowed to see the “secret” dashboard. Of course, we still don’t actually know the user’s birthday, so we have to ask them. At the moment, we aren’t collecting the information in the form, so let’s add the post() function in our dashboard view to do that.

The private dashboard.

Allowing the user to enter their birthday

Since our Django app has a database, we could simply store the user’s birthday there. However, we should keep any sensitive data within FusionAuth, so that our Django app touches this information as little as possible. And it definitely should not store PII.

Therefore, the moment we get info from the user, Django will send it across to FusionAuth for safe-keeping.

Add import dateparser at the top of secretbirthdayapp/

Now add the following function to the DashboardAppView class in secretbirthdaysapp/

def post(self, request):

  birthday = request.POST.get("birthday")
  normalised_birthday = None
  get_or_create_user(request.session.get('user_id', None), request)

    dt = dateparser.parse(birthday)
    normalised_birthday = dt.strftime("%Y-%m-%d")
  except Exception as e:
    print("Couldn't parse birthday")

  if not normalised_birthday:
    return render(
      {"message": "Couldn't parse birthday. Please use YYYY-MM-DD"},

    client = FusionAuthClient(
    r = client.patch_user(
      request.user.username, {"user": {"birthDate": normalised_birthday}}
    if r.was_successful():
      return render(
        {"message": "Updated your birthday", "birthday": normalised_birthday,},

      return render(
        {"message": "Something went wrong"},

  except Exception as e:
    return render(
      {"message": "Something went wrong"},

Here, if the user submits a birthday, we try to parse it into a date. The dateparser module is pretty good at understanding different date formats (e.g “1 Jan 90”, “Jan 1 1990”, “1/1/1990”, etc), while FusionAuth needs the date in a specific format (“1990-01-01”). Therefore, we attempt to parse whatever the user gave us into a date, reformat it, and then send it across to FusionAuth using the patch_user function.

Now you can visit the Django app at http://localhost:8000, press the link to log in, sign up as a new user using GMail. If you used your main Google account as the “admin” FusionAuth user and want to test this using a new user, then do this through an incognito or private window and sign up with a second Google account.

Once you’ve added your birthday, you’ll be able to see it in the dashboard.

The private dashboard with the user's birthday.

If you log into the FusionAuth app as the main admin user, navigate to users, and select the user who added a birthday, you’ll also be able to see it there (with the user’s age calculated so you don’t have to do the maths yourself).

Viewing the user's birthday in FusionAuth.

Hitting the big Logout link in the Django app takes you back through FusionAuth, logs you out, and redirects you back to the home page:

Logging out back to the home page.

Where to next with Django and FusionAuth?

That’s the basics of our Django app done. The app stores sensitive information such as users’ names (from Gmail) and birthdates (that they enter in our app), but delegates all responsibility for safeguarding and validating this information to FusionAuth. Here’s the code if you want to review it.

Of course, you would need to add more interesting features to this app for it to be useful. But any operation storing private information can follow a similar pattern. You could make the app useful by allowing people to store more information, such as journal entries. Or you could allow them to store people’s names along with birthdays, and remind them to send good wishes, the day before someone’s birthday. You could create multiple tenants to further encapsulate application data. The possibilities are endless.

For a production environment, you would also need to do a bit more work in making sure FusionAuth was really safe. In our example, we used the default password provided with Docker for our database, left debug mode on, and ran FusionAuth locally, co-hosted with our Django application. For a safer setup, you would run FusionAuth on its own infrastructure, physically separate from the Django app, and take more care around production configuration and deployment. FusionAuth gives you all of the tools to do this easily.

Original Publish Date: July 14, 2020 • Last Updated: September 27, 2022

More on python

Subscribe to The FusionAuth Newsletter

A newsletter for developers covering techniques, technical guides, and the latest product innovations coming from FusionAuth.

Just dev stuff. No junk.