Flexible authentication for web, mobile, desktop and hybrid apps. It can be used for 1fa, 2fa and mfa cases.
Project description
Django Multifactor Authentication
Flexible authentication for web, mobile, desktop and hybrid apps. It can be used for 1fa, 2fa and mfa cases. Easily configurable and extendable with new authentication methods or services. Authenticaton scenarios, called flows, are based on identifiers and secrets, which can be used or not used in multiple combinations:
- username, email, phone, ...
- password, passcode (one-time pass or token), hardcode (device or card id), ...
Full list of supported services and corresponding identifiers:
- Phone (as Sms)
- Google Authenticator
- Microsoft Authenticator
- Authy, andOTP, etc
- Yubikey (soon)
- ...add yours
and service providers:
- Twilio
- Vonage (Nexmo)
- Amazon SNS (soon)
- ...add yours
Usage
The package creates custom user model, that could be used as is or as inherited. General priniciples for custom user models in Django are respected (how it works).
Base settings (required):
AUTH_USER_MODEL = 'multauth.User'
AUTHENTICATION_BACKENDS = (
'multauth.backends.ModelBackend',
# ...etc
)
MULTAUTH_FLOWS = (
# pattern: ('identifier', 'secret1', 'secret2', ...)
('phone', 'hardcode', 'passcode'),
('email', 'password', 'passcode'),
('username', 'password'),
# ...etc
)
The flows mean that user could be authenticated with any of these sets of crendials, ie set of identfier and secrets. For example, this one: ('email', 'password', 'passcode',). Number of flows could be any, but in most cases only one or two are used.
Extra settings (optional):
(see built-in services, providers and templates)
MULTAUTH_SERVICES = [
'multauth.services.UsernameService',
'multauth.services.EmailService',
'multauth.services.PhoneService',
] # by default
MULTAUTH_DEBUG = True # False by default
MULTAUTH_PASSCODE_LENGTH = 6 # size in digits
MULTAUTH_PASSCODE_EXPIRY = 3600 # time in seconds
MULTAUTH_PASSCODE_SERVICE = 'multauth.services.PhoneService' # by default
MULTAUTH_SERVICE_EMAIL_PROVIDER = 'multauth.providers.MailProvider' # by default
MULTAUTH_SERVICE_PHONE_PROVIDER = 'multauth.providers.TwilioProvider' # by default
MULTAUTH_SERVICE_EMAIL_TEMPLATE_NAME = 'custom'
MULTAUTH_SERVICE_EMAIL_VERIFICATION_VIEWNAME = 'custom'
MULTAUTH_SERVICE_PHONE_TEMPLATE_NAME = 'custom'
Provider specific settings (could be required):
MULTAUTH_PROVIDER_TWILIO_ACCOUNT_SID = 'SID'
MULTAUTH_PROVIDER_TWILIO_AUTH_TOKEN = 'TOKEN'
MULTAUTH_PROVIDER_TWILIO_CALLER_ID = 'CALLER_ID' # '+15005550006'
MULTAUTH_PROVIDER_VONAGE_API_KEY = 'KEY'
MULTAUTH_PROVIDER_VONAGE_API_SECRET = 'SECRET'
MULTAUTH_PROVIDER_VONAGE_BRAND_NAME = 'BRAND_NAME' # 'Vonage APIs'
Usage more
Custom use cases and how to config or code them.
APIs
Package contains full set of rest api endpoints, but it's optional. To activate it, djangorestframework>=3.10.3 should be installed and the urls be included:
urlpatterns = [
path(r'^', include('multauth.api.urls')),
]
User activation
Users are set as "active" on creation. This behavior is not managed by settings for now (check for further updates).
Services verification
By default all services are set as "confirmed" on creation. To change this behavior extra settings should be added, for example:
MULTAUTH_SERVICE_EMAIL_CONFIRMED = False
MULTAUTH_SERVICE_PHONE_CONFIRMED = False
...
Non-comfirmed services will automatically be called for verification (token/key to be sent) on creation or idenfier updates. To invoke verification manually, call api endpoints:
multauth:signup-verification
or model methods:
user.verifyfor all non-confirmed servicesuser.verify_emailfor emailuser.verify_phonefor phone- ...
And to complete verification process call api endpoints:
multauth:signup-verification-phoneto post the tokenmultauth:signup-verification-emailto post the tokenmultauth:signup-verification-email-keyas a classic in-email link to pass the key- ...
or model methods:
user.verify_phone_tokenuser.verify_email_tokenuser.verify_email_key- ...
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file django-multifactor-authentication-2.0.1.tar.gz.
File metadata
- Download URL: django-multifactor-authentication-2.0.1.tar.gz
- Upload date:
- Size: 25.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/49.2.0 requests-toolbelt/0.9.1 tqdm/4.54.0 CPython/3.8.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
83a32e1e8f2a794fe341f109825c3259d567297aea06452c78cf1a6c27df23b2
|
|
| MD5 |
330caf71bc95226f9b238ba2879ec3f4
|
|
| BLAKE2b-256 |
25e816388bf3c2b7d7a8e5fb3d86cd32a390c9f4de604a3a74b7efe5bd9f743f
|
File details
Details for the file django_multifactor_authentication-2.0.1-py3-none-any.whl.
File metadata
- Download URL: django_multifactor_authentication-2.0.1-py3-none-any.whl
- Upload date:
- Size: 73.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/49.2.0 requests-toolbelt/0.9.1 tqdm/4.54.0 CPython/3.8.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
13aa7cf63b263e1853d57302a4f3aa04bed8155f8e1819ba30710f378ab88a3d
|
|
| MD5 |
08c2b816f321c24758bc031be74fb019
|
|
| BLAKE2b-256 |
67d44cfe360c677509c137e4255e98572be31d128a0fdab76b24e3b22c8bd8f2
|