Authentication for django rest framework
Project description
django-rest-knox
Authentication module for Django rest auth.
Knox provides easy-to-use authentication for Django REST Framework The aim is to allow for common patterns in applications that are REST-based, with little extra effort; and to ensure that connections remain secure.
Knox authentication is token-based, similar to the TokenAuthentication
built into DRF. However, it overcomes some problems present in the
default implementation:
-
DRF tokens are limited to one per user. This does not facilitate securely signing in from multiple devices, as the token is shared. It also requires all devices to be logged out if a server-side logout is required (i.e. the token is deleted).
Knox provides one token per call to the login view - allowing each client to have its own token which is deleted on the server side when the client logs out.
Knox also provides an option for a logged-in client to remove all tokens that the server has - forcing all clients to re-authenticate.
-
DRF tokens are stored unencrypted in the database. This would allow an attacker unrestricted access to an account with a token if the database were compromised.
Knox tokens are only stored in a secure hash form (like a password). Even if the database were somehow stolen, an attacker would not be able to log in with the stolen credentials.
-
DRF tokens track their creation time, but have no inbuilt mechanism for tokens expiring. Knox tokens can have an expiry configured in the app settings (default is 10 hours.)
More information can be found in the Documentation
Run the tests locally
If you need to debug a test locally and if you have docker installed,
simply run the ./docker-run-tests.sh
script and it will run the test suite in every Python /
Django versions.
You could also simply run regular tox
in the root folder as well, but that would make testing the matrix of
Python / Django versions a bit more tricky.
Work on the documentation
Our documentation is generated by Mkdocs.
You can refer to their documentation on how to install it locally.
Another option is to use mkdocs.sh
in this repository.
It will run mkdocs in a docker container.
Running the script without any params triggers the serve
command.
The server is exposed on localhost on port 8000.
To configure the port the serve
command will be exposing the server to, you
can use the following env var:
MKDOCS_DEV_PORT="8080"
You can also pass any mkdocs
command like this:
./mkdocs build
./mkdocs --help
Check the Mkdocs documentation for more.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file django_rest_knox-5.0.2.tar.gz
.
File metadata
- Download URL: django_rest_knox-5.0.2.tar.gz
- Upload date:
- Size: 16.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | f283622bcf5d28a6a0203845c065d06c7432efa54399ae32070c61ac03af2d6f |
|
MD5 | d4183a8aa5e15f7ddd6bcc4aacb57caa |
|
BLAKE2b-256 | ba7e6ef520fbfa0cb902fe32c6f921426b1dcfa50cb2471a0ddca31ba770fa72 |
File details
Details for the file django_rest_knox-5.0.2-py3-none-any.whl
.
File metadata
- Download URL: django_rest_knox-5.0.2-py3-none-any.whl
- Upload date:
- Size: 15.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 694da5d0ad6eb3edbfd7cdc8d69c089fc074e6b0e548e00ff2750bf2fdfadb6f |
|
MD5 | 146af9b46bd7d9d09b65c6859e943a08 |
|
BLAKE2b-256 | 132909468c086fd19f34b00a9698ee9cc1864dfae8c171be140657b965577472 |