Invenio user management and authentication.
Project description
Invenio user management and authentication.
Features:
User and role management.
User registration, password reset/recovery and email verification.
Administration interface and CLI for managing users.
Session based authentication with session theft protection as well as “remember me” support.
Strong cryptographic password hashing with support for migrating password hashes (including Invenio v1.x) to new stronger algorithms.
Session activity tracking allowing users to e.g. logout of all devices.
Server-side session management.
JSON Web Token encoding and decoding support useful for e.g. CSRF-protection in REST APIs.
Invenio-Accounts relies on the following community packages to do all the heavy-lifting:
Further documentation is available on https://invenio-accounts.readthedocs.io/
Changes
Version 1.1.4 (released 2020-04-28)
Fixes issue with the latest WTForms v2.3.x release which now requires an extra library for email validation.
Removes Python 2 support.
Version 1.1.3 (released 2020-02-19)
Replaces Flask-CeleryExt to invenio-celery due to version incompatibilities with celery, kombu. Removes Flask-BabelExt already provided by invenio-i18n
Version 1.1.2 (released 2020-02-12)
Fixes requirements for Flask, Werkzeug and Flask-Login due to incompatibilities of latest released modules.
Version 1.1.1 (released 2019-03-10)
Fixes an issue where the HTTP headers X-Session-ID and X-User-ID are added even if the value is not known. This causes ‘None’ to be logged in Nginx, instead of simply ‘-‘.
Version 1.1.0 (released 2019-02-15)
Added support for for adding the user id and session id of the current user into the HTTP headers (X-User-ID and X-Session-ID) for upstream servers to use. For instance, this way current user/session ids can be logged by Nginx into the web server access logs. The feature is off by default and can be enabled via the ACCOUNTS_USERINFO_HEADERS configuration variable. Note: The upstream server should strip the two headers from the response returned to the client. The purpose is purely to allow upstream proxies like Nginx to log the user/session id for a specific request.
Changed token expiration from 5 days to 30 minutes for the password reset token and email confirmation token. Using the tokens will as a side-effect login in the user, which means that if the link is leaked (e.g. forwarded by the users themselves), then another person can use the link to access the account. Flask-Security v3.1.0 addresses this issue, but has not yet been released.
Fixes issue that could rehash the user password in the adminstration interface.
Version 1.0.2 (released 2018-10-31)
Added AnonymousIdentity loader to app initialisation to fix the any_user Need in Invenio-Access.
Version 1.0.1 (released 2018-05-25)
Bumped Flask-CeleryExt from v0.3.0 to v0.3.1 to fix issue with Celery version string not being parsable and thus causing problems with installing Celery.
Version 1.0.0 (released 2018-03-23)
Initial public release.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for invenio_accounts-1.1.4-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 668c299f7640574a6b390f7fa1a62162ec2187fa35529f3bb925847cdc127e37 |
|
MD5 | 2abd22902d39646e7ada852d118e7dab |
|
BLAKE2b-256 | f8d90a51d2a1584b991c1df5b112c567a6aac9e144c1ffda2ace26b0f2815869 |