Skip to main content

Complete Two-Factor Authentication for Django

Project description

This project is currently unmaintained. Not recommended for production use.

Django Two-Factor Authentication

Build Status Test Coverage PyPI

Complete Two-Factor Authentication for Django. Built on top of the one-time password framework django-otp and Django’s built-in authentication framework django.contrib.auth for providing the easiest integration into most Django projects. Inspired by the user experience of Google’s Two-Step Authentication, allowing users to authenticate through call, text messages (SMS), by using a token generator app like Google Authenticator or a YubiKey hardware token generator (optional).

I would love to hear your feedback on this package. If you run into problems, please file an issue on GitHub, or contribute to the project by forking the repository and sending some pull requests. The package is translated into English, Dutch and other languages. Please contribute your own language using Transifex.

Test drive this app through the online example app, hosted by Heroku. It demos most features except the Twilio integration. The example also includes django-user-sessions for providing Django sessions with a foreign key to the user. Although the package is optional, it improves account security control over django.contrib.sessions.

Compatible with all supported Django (LTS) versions. At the moment of writing that’s including 1.7 and 1.8 on Python 2.7, 3.2, 3.3 and 3.4. Documentation is available at readthedocs.org.

Installation

Installation with pip:

$ pip install django-two-factor-auth

On Django 1.8, also install django-formtools:

$ pip install django-formtools

Setup

Add the following apps to the INSTALLED_APPS:

INSTALLED_APPS = (
    ...
    'django_otp',
    'django_otp.plugins.otp_static',
    'django_otp.plugins.otp_totp',
    'two_factor',
)

Add django_otp.middleware.OTPMiddleware to MIDDLEWARE_CLASSES. It must be installed after AuthenticationMiddleware:

MIDDLEWARE_CLASSES = [
    'django.middleware.common.CommonMiddleware',
    'django.contrib.sessions.middleware.SessionMiddleware',
    'django.middleware.csrf.CsrfViewMiddleware',
    'django.contrib.auth.middleware.AuthenticationMiddleware',
    'django_otp.middleware.OTPMiddleware',
    'django.contrib.messages.middleware.MessageMiddleware',
]

Configure a few urls in settings.py:

from django.core.urlresolvers import reverse_lazy
LOGIN_URL = reverse_lazy('two_factor:login')

Add the url routes to the project in urls.py:

urlpatterns = [
    url(r'', include('two_factor.urls', 'two_factor')),
]

Be sure to remove any other login routes, otherwise the two-factor authentication might be circumvented. The admin interface should be automatically patched to use the new login method.

Support for YubiKey is disabled by default, but enabling is easy. Please refer to the documentation for instructions.

Contribute

  • Submit issues to the issue tracker on Github.

  • Fork the source code at Github.

  • Write some code and make sure it is covered with unit tests.

  • Send a pull request with your changes.

  • Provide a translation using Transifex.

Running tests

This project aims for full code-coverage, this means that your code should be well-tested. Also test branches for hardened code. You can run the full test suite with:

make test

Or run a specific test with:

make test TARGET=tests.tests.TwilioGatewayTest

For Python compatibility, tox is used. You can run the full test suite with:

tox

Releasing

The following actions are required to push a new version:

python example/manage.py makemigrations two_factor
git commit -am "Added migrations"

bumpversion [major|minor|patch]
git commit -am "Released [version]"
git tag [version]
python setup.py sdist bdist_wheel upload

See Also

Have a look at django-user-sessions for Django sessions with a foreign key to the user. This package is also included in the online example app.

License

The project is licensed under the MIT license.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django-two-factor-auth-1.3.1.tar.gz (61.4 kB view details)

Uploaded Source

Built Distribution

django_two_factor_auth-1.3.1-py2.py3-none-any.whl (141.5 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file django-two-factor-auth-1.3.1.tar.gz.

File metadata

File hashes

Hashes for django-two-factor-auth-1.3.1.tar.gz
Algorithm Hash digest
SHA256 82f47fca26f0886ca94a54fc872766a0d6f6f5ecb755ac1218590ee15dff841d
MD5 87137f445f45fbaa75b9b9df91587308
BLAKE2b-256 25c231810da8d608d4b3538909f0b62a31d3796c0c3c1f42bfc8a72e4c763c55

See more details on using hashes here.

Provenance

File details

Details for the file django_two_factor_auth-1.3.1-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for django_two_factor_auth-1.3.1-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 e4766c85c6241a685f7632cea6d2d31859e616539d634d6de402dfd108db1c01
MD5 9d8da369b2c43a7b6ddd838f9f84c2ff
BLAKE2b-256 e50cba9f3d6c77daaf691f9757477a23af000407e9ae3aa838dbcb0e2371d33e

See more details on using hashes here.

Provenance

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page