Complete Two-Factor Authentication for Django
Project description
Complete Two-Factor Authentication for Django. Built on top of the one-time password framework django-otp and Django’s built-in authentication framework django.contrib.auth for providing the easiest integration into most Django projects. Inspired by the user experience of Google’s Two-Step Authentication, allowing users to authenticate through call, text messages (SMS) or by using a token generator app like Google Authenticator.
I would love to hear your feedback on this package. If you run into problems, please file an issue on GitHub, or contribute to the project by forking the repository and sending some pull requests. The package is currently translated into English and Dutch, please contribute your own language on Transifex.
Example
Test drive this app through the online example app, hosted by Heroku. It demos most features except the Twilio integration.
Compatibility
Compatible with Django 1.4, 1.5 and 1.6 on Python 2.6, 2.7, 3.2 and 3.3.
Installation
Installation with pip:
$ pip install django-two-factor-auth
Add the following apps to the INSTALLED_APPS:
INSTALLED_APPS = ( ... 'django_otp', 'django_otp.plugins.otp_static', 'django_otp.plugins.otp_totp', 'two_factor', )
Configure a few urls:
from django.core.urlresolvers import reverse_lazy LOGIN_URL = reverse_lazy('two_factor:login') # this one is optional LOGIN_REDIRECT_URL = reverse_lazy('two_factor:profile')
Add the url routes:
urlpatterns = patterns('', ... url(r'', include('two_factor.urls', 'two_factor')), )
Be sure to remove any other login routes, otherwise the two-factor authentication might be circumvented. The admin interface should be automatically patched to use the new login method.
Settings
- TWO_FACTOR_SMS_GATEWAY (default: None)
The module that should be used for sending text messages.
- TWO_FACTOR_CALL_GATEWAY (default: None)
The module that should be used for making calls.
- TWO_FACTOR_PATCH_ADMIN (default: True)
Whether the admin should be patched to use the two-factor authentication method. Disabling this setting would allow circumventing two-factor authentication.
Gateway two_factor.gateways.fake.Fake
Prints the tokens to the logger. You will have to set the message level of the two_factor logger to INFO for them to appear in the console. Useful for local development.
LOGGING = { 'version': 1, 'disable_existing_loggers': False, 'handlers': { 'console': { 'level': 'DEBUG', 'class': 'logging.StreamHandler', }, }, 'loggers': { 'two_factor': { 'handlers': ['console'], 'level': 'INFO', } } }
Gateway two_factor.gateways.twilio.Twilio
Gateways for sending text message and initiating calls trough Twilio come prepackaged. All you need is your Twilio Account SID and Token, as shown in your Twilio account dashboard.
TWO_FACTOR_CALL_GATEWAY = 'two_factor.gateways.twilio.Twilio' TWO_FACTOR_SMS_GATEWAY = 'two_factor.gateways.twilio.Twilio' TWILIO_ACCOUNT_SID = '***' TWILIO_AUTH_TOKEN = '***' TWILIO_CALLER_ID = '[verified phone number]'
Release Notes
0.2.0
This is a major upgrade, as the package has been rewritten completely. Upgrade to this version with care and make backups of your database before running the South migrations. See installation instructions for installing the new version; update your template customizations and run the database migrations.
Contributing
Fork the repository on GitHub and start hacking.
Run the tests.
Send a pull request with your changes.
Provide a translation using Transifex
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Hashes for django-two-factor-auth-0.2.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | aa13658c9caba4af70218d883ede7c765ac6d592c996dbf41e966c902643a0b9 |
|
MD5 | a42a0ac6e529f8da09426ab32281a2a7 |
|
BLAKE2b-256 | aff087ef2cb3ece812655ddcb8c1b2b25fe81e2354a8698821faa3ada585b7ea |