Secure authentication by TOTP, SMS, Codes & Question
Project description
Demo installation:
$ sudo apt-get install -y redis-server
$ pip install virtualenvwrapper
$ source /usr/local/bin/virtualenvwrapper.sh
$ mkvirtualenv django-secure-auth
$ git clone https://github.com/gotlium/django-secure-auth.git
$ cd django-secure-auth
$ pip install -r requirements.txt
$ python setup.py develop
$ cd demo
$ pip install -r requirements.txt
$ python manage.py syncdb --noinput
$ python manage.py migrate
$ wget http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz
$ gunzip GeoLiteCity.dat.gz
$ mkdir -p /usr/share/geoip/; mv GeoLiteCity.dat /usr/share/geoip/
Open settings:
$ vim demo/settings.py
Replace Twilio credentials in AUTH_SMS_BACKEND_AUTH to your demo account settings or change SMS_FORCE to False.
Run Redis server and Celery daemon(or remove ‘djcelery’ from INSTALLED_APPS):
$ make run_redis
$ make run_celery
Run test server:
$ make run_server
Now you can open https://127.0.0.1:8000/accounts/register/ and register new account and setup all available authentication methods.
Note: activation link will be output to console.
Screenshots
Compatibility
Python: 2.6, 2.7
Django: 1.4.x, 1.5.x, 1.6.x
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
django-secure-auth-1.2.2.tar.gz
(44.2 kB
view hashes)
Built Distribution
Close
Hashes for django_secure_auth-1.2.2-py2-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2e431d17f4af6406afb8d6188b8b2d4fdc8a56c04ba1ec4cee729e5d413807fb |
|
MD5 | 8c0916b265872aa9f9bcc3d988a2e258 |
|
BLAKE2b-256 | 6fc312652e46640a6512a626c58644f016ae6670f3e82083deacfe25fb51f3e3 |