Drop-in multifactor authentication subsystem for Django.
Project description
django-multifactor
A Django app that handles multifactor authentication. It supports TOTP, U2F, FIDO2 U2F (WebAuthn), Email Tokens as well as custom handlers for OTP token exchange (eg SMS plugins). This project is based on django-mfa2
, but has and will continue to diverge from it, and eventually become a complete rewrite.
FIDO2/WebAuthn is the big-ticket item for MFA. It allows the browser to interface with a myriad of biometric and secondary authentication factors.
- Security keys (Firefox 60+, Chrome 67+, Edge 18+),
- Windows Hello (Firefox 67+, Chrome 72+ , Edge) ,
- Apple's Touch ID (Chrome 70+ on Mac OS X ),
- android-safetynet (Chrome 70+)
- NFC devices using PCSC (Not Tested, but as supported in fido2)
This project targets modern stacks of Django 2.2+ and Python 3.5+.
Installation:
Install the package:
pip install django-multifactor
Add multifactor
to your settings.INSTALLED_APPS.
Add and customise the following settings block:
MULTIFACTOR = {
'LOGIN_CALLBACK': False, # False, or dotted import path to function to process after successful authentication
'RECHECK': True, # Invalidate previous authorisations at random intervals
'RECHECK_MIN': 60 * 60 * 3, # No recheks before 3 hours
'RECHECK_MAX': 60 * 60 * 6, # But within 6 hours
'FIDO_SERVER_ID': 'example.com', # Server ID for FIDO request
'FIDO_SERVER_NAME': 'Django App', # Human-readable name for FIDO request
'TOKEN_ISSUER_NAME': 'Django App', # TOTP token issuing name (to be shown in authenticator)
'U2F_APPID': 'https://example.com', # U2F request issuer
}
Add multifactor to your URLs. I suggest somewhere similar to your login URLs, or underneath them, eg:
urlpatterns = [
path('admin/multifactor/', include('multifactor.urls')),
path('admin/', admin.site.urls),
...
]
Usage
By this point any authenticated user can add a secondary factor to their account by visiting (eg) /admin/multifactor/
, but no view will require users be multi-factor authenticated. django-multifactor gives you granular control to conditionally require certain users need a secondary factor on certain views. This is accomplished through the multifactor.decorators.multifactor_protected
decorator.
from multifactor.decorators import multifactor_protected
@multifactor_protected(user_filter=None, force=False)
def my_view(request):
...
user_filter
can be a dictonary to be passed toUser.objects.filter()
to see if the current user matches these conditions. If empty or None, it will match all users.force=True
would force a user (who matcheduser_filter
) to add a secondary factor and authenticate. Ifforce=False
, users who have not yet added a multifactor token will be allowed unimpeded.
You can also wrap entire branches of your URLs using django-decorator-include
:
from decorator_include import decorator_include
from multifactor.decorators import multifactor_protected
urlpatterns = [
path('admin/multifactor/', include('multifactor.urls')),
path('admin/', decorator_include(multifactor_protected(force=True), admin.site.urls)),
...
]
TODO
- Allow custom handlers for simple OTP sending.
- Allow settings to limit what can be added.
- Allow
multifactor_protected
to require more than one secondary factor.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for django_multifactor-0.1.2-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | aebb15128d2833f557a8d33e6a574756792b8e9929e781ea475946054f3f6770 |
|
MD5 | 89c49e642efbe19eea81000978c71b50 |
|
BLAKE2b-256 | 12c03c182d6ee20f615be17d3f35287114ae3e824bf806950f690356d01e55fe |