Invenio user management and authentication.
Project description
Invenio user management and authentication.
Features:
User and role management.
User registration, password reset/recovery and email verification.
Administration interface and CLI for managing users.
Session based authentication with session theft protection support.
Strong cryptographic password hashing with support for migrating password hashes (including Invenio v1.x) to new stronger algorithms.
Session activity tracking allowing users to e.g. logout of all devices.
Server-side session management.
JSON Web Token encoding and decoding support useful for e.g. CSRF-protection in REST APIs.
Invenio-Accounts relies on the following community packages to do all the heavy-lifting:
Further documentation is available on https://invenio-accounts.readthedocs.io/
Changes
Version 1.4.9 (released 2021-12-04)
Fixed issue with account creation via CLI due to issue with changed API in Flask-WTF.
Version 1.4.8 (released 2021-10-18)
Unpin Flask requirement.
Version 1.4.7 (released 2021-10-06)
Adds celery task to remove IP addresses from user table after a specified retention period (defaults to 30 days).
Version 1.4.6 (released 2021-07-12)
Adds german translations
Version 1.4.5 (released 2021-05-21)
Removes config entrypoint.
Bump module versions.
Version 1.4.4 (released 2021-05-11)
Enables login view function overridability.
Allows to disable local login via configuration variable.
Version 1.4.3 (released 2020-12-17)
Adds theme dependent icons.
Version 1.4.2 (released 2020-12-11)
Fixes logout from security view.
Version 1.4.1 (released 2020-12-10)
Fixes styling of forgot password form in semantic ui theme.
Version 1.4.0 (released 2020-12-09)
Major: adds new Semantic UI theme.
Adds Turkish translations.
Fixes next parameter being used in the sign-up form.
Fixes issue with translation files causing translations not to be picked up.
Fixes wording from sign in to log in.
Removes password length validation during login.
Version 1.3.0 (released 2020-05-15)
Refreshes the CSRF token on login and logout.
Removes the example app.
Migrate from Flask-KVSession to Flask-KVSession-Invenio, fork of the former.
Version 1.2.2 (released 2020-05-13)
This release was removed from PyPI on 2020-05-15 due to issues with the release.
Version 1.2.1 (released 2020-04-28)
Fixes issue with the latest WTForms v2.3.x release which now requires an extra library for email validation.
Version 1.2.0 (released 2020-03-09)
Replaces Flask dependency with centrally managed invenio-base
Version 1.1.4 (released 2020-04-28)
Fixes issue with the latest WTForms v2.3.x release which now requires an extra library for email validation.
Version 1.1.3 (released 2020-02-19)
Replaces Flask-CeleryExt to invenio-celery due to version incompatibilities with celery, kombu. Removes Flask-BabelExt already provided by invenio-i18n
Version 1.1.2 (released 2020-02-12)
Fixes requirements for Flask, Werkzeug and Flask-Login due to incompatibilities of latest released modules.
Version 1.1.1 (released 2019-03-10)
Fixes an issue where the HTTP headers X-Session-ID and X-User-ID are added even if the value is not known. This causes ‘None’ to be logged in Nginx, instead of simply ‘-‘.
Version 1.1.0 (released 2019-02-15)
Added support for for adding the user id and session id of the current user into the HTTP headers (X-User-ID and X-Session-ID) for upstream servers to use. For instance, this way current user/session ids can be logged by Nginx into the web server access logs. The feature is off by default and can be enabled via the ACCOUNTS_USERINFO_HEADERS configuration variable. Note: The upstream server should strip the two headers from the response returned to the client. The purpose is purely to allow upstream proxies like Nginx to log the user/session id for a specific request.
Changed token expiration from 5 days to 30 minutes for the password reset token and email confirmation token. Using the tokens will as a side-effect login in the user, which means that if the link is leaked (e.g. forwarded by the users themselves), then another person can use the link to access the account. Flask-Security v3.1.0 addresses this issue, but has not yet been released.
Fixes issue that could rehash the user password in the adminstration interface.
Version 1.0.2 (released 2018-10-31)
Added AnonymousIdentity loader to app initialisation to fix the any_user Need in Invenio-Access.
Version 1.0.1 (released 2018-05-25)
Bumped Flask-CeleryExt from v0.3.0 to v0.3.1 to fix issue with Celery version string not being parsable and thus causing problems with installing Celery.
Version 1.0.0 (released 2018-03-23)
Initial public release.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for invenio-accounts-2.0.0.dev2.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | e5c919e3b78388e62c7d52378d338049041aabb5749dd548c475229154cf2388 |
|
MD5 | 87459ee4800b8e2d93121e2ce3fb6262 |
|
BLAKE2b-256 | 018c67bc9ec9a102aeb9bcb933bfde0438e2743c8df16218811f92d13cef1a56 |
Hashes for invenio_accounts-2.0.0.dev2-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | e71851ff4a03ccc8c4ee2453dbdbcc8f218b9e78c7b55389e35e04437bb36834 |
|
MD5 | 1c798d322992de5c56c3c24ccc533289 |
|
BLAKE2b-256 | 6a97c706177aa2088e589c682419349227adcb6c5272cfe8628ca76798af6ef8 |