Skip to main content

Complete Two-Factor Authentication for Django

Project description

Build Status Test Coverage PyPI

Complete Two-Factor Authentication for Django. Built on top of the one-time password framework django-otp and Django’s built-in authentication framework django.contrib.auth for providing the easiest integration into most Django projects. Inspired by the user experience of Google’s Two-Step Authentication, allowing users to authenticate through call, text messages (SMS) or by using a token generator app like Google Authenticator.

I would love to hear your feedback on this package. If you run into problems, please file an issue on GitHub, or contribute to the project by forking the repository and sending some pull requests. The package is currently translated into English, Dutch, Hebrew and Arabic. Please contribute your own language using Transifex.

Example

Test drive this app through the online example app, hosted by Heroku. It demos most features except the Twilio integration. It also includes django-user-sessions for providing Django sessions with a foreign key to the user. Although the package is optional, it provides better account security control over django.contrib.sessions.

Compatibility

Compatible with Django 1.4, 1.5 and 1.6 on Python 2.6, 2.7, 3.2 and 3.3.

Installation

Installation with pip:

$ pip install django-two-factor-auth

Add the following apps to the INSTALLED_APPS:

INSTALLED_APPS = (
    ...
    'django_otp',
    'django_otp.plugins.otp_static',
    'django_otp.plugins.otp_totp',
    'two_factor',
)

Configure a few urls:

from django.core.urlresolvers import reverse_lazy
LOGIN_URL = reverse_lazy('two_factor:login')

# this one is optional
LOGIN_REDIRECT_URL = reverse_lazy('two_factor:profile')

Add the url routes:

urlpatterns = patterns('',
    ...
    url(r'', include('two_factor.urls', 'two_factor')),
)

Be sure to remove any other login routes, otherwise the two-factor authentication might be circumvented. The admin interface should be automatically patched to use the new login method.

Settings

TWO_FACTOR_SMS_GATEWAY (default: None)

The module that should be used for sending text messages.

TWO_FACTOR_CALL_GATEWAY (default: None)

The module that should be used for making calls.

TWO_FACTOR_PATCH_ADMIN (default: True)

Whether the admin should be patched to use the two-factor authentication method. Disabling this setting would allow circumventing two-factor authentication.

Gateway two_factor.gateways.fake.Fake

Prints the tokens to the logger. You will have to set the message level of the two_factor logger to INFO for them to appear in the console. Useful for local development.

LOGGING = {
    'version': 1,
    'disable_existing_loggers': False,
    'handlers': {
        'console': {
            'level': 'DEBUG',
            'class': 'logging.StreamHandler',
        },
    },
    'loggers': {
        'two_factor': {
            'handlers': ['console'],
            'level': 'INFO',
        }
    }
}

Gateway two_factor.gateways.twilio.Twilio

Gateways for sending text message and initiating calls trough Twilio come prepackaged. All you need is your Twilio Account SID and Token, as shown in your Twilio account dashboard.

TWO_FACTOR_CALL_GATEWAY = 'two_factor.gateways.twilio.Twilio'
TWO_FACTOR_SMS_GATEWAY = 'two_factor.gateways.twilio.Twilio'
TWILIO_ACCOUNT_SID = '***'
TWILIO_AUTH_TOKEN = '***'
TWILIO_CALLER_ID = '[verified phone number]'

See Also

  • Have a look at django-user-sessions for Django sessions with a foreign key to the user. This package is also included in the demo app.

Release Notes

0.2.3

  • Two new translations: Hebrew and Arabic

0.2.2

  • Allow changing Twilio call language.

0.2.1

  • Allow overriding instructions in the template.

  • Allow customization of the redirect query parameter.

  • Faster backup token generating.

0.2.0

This is a major upgrade, as the package has been rewritten completely. Upgrade to this version with care and make backups of your database before running the South migrations. See installation instructions for installing the new version; update your template customizations and run the database migrations.

Development

This project aims for full code-coverage, this means that your code should be well-tested. Also test branches for hardened code.

Running tests

You can run the full test suite with:

make test

Or run a specific test with:

make test TARGET=tests.tests.TwilioGatewayTest

For Python compatibility, tox is used. You can run the full test suite with:

tox

Contributing

  • Fork the repository on GitHub and start hacking.

  • Run the tests.

  • Send a pull request with your changes.

  • Provide a translation using Transifex.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django-two-factor-auth-0.2.3.tar.gz (33.3 kB view details)

Uploaded Source

File details

Details for the file django-two-factor-auth-0.2.3.tar.gz.

File metadata

File hashes

Hashes for django-two-factor-auth-0.2.3.tar.gz
Algorithm Hash digest
SHA256 b46589570eb129242cdf9970f43300355b750f26ba51b6cbebf13743bda04df3
MD5 0d3360b9ee798179a95d6715607f65ad
BLAKE2b-256 0b31cb12e1ded70bde039b7a524d14601ae44419f745646799ed1e0248ec4654

See more details on using hashes here.

Provenance

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page