Skip to main content

URL-based authentication, an application that provides one-click login via specially crafted URLs

Project description

Introduction

django-sesame provides one-click login for your Django project. It uses specially crafted URLs containing an authentication token, for example: https://example.com/?url_auth_token=AAAAARchl18CIQUlImmbV9q7PZk%3A89AEU34b0JLSrkT8Ty2RPISio5

It’s useful if you want to share private content without requiring your visitors to remember a username and a password or to go through an authentication process involving a third-party.

django-sesame is tested with:

  • Django 1.11 (LTS) and 2.0.

  • all supported Python versions.

It requires django.contrib.auth. It’s compatible with custom user models. It uses django.contrib.session when it’s available.

Technically, django-sesame can provide stateless authenticated navigation without django.contrib.sessions, provided all internal links include the authentication token, but that increases the security issues explained below.

django-sesame is released under the BSD license, like Django itself.

A few words about security

Before using django-sesame in your project, you should review the following advice carefully.

The major security weakness in django-sesame is a direct consequence of the feature it implements: whoever obtains an authentication token will be able to log in to your website. URLs end up in countless insecure places: emails, referer headers, proxy logs, browser history, etc. You can’t avoid that. So use django-sesame only for mundane things.

If a data leak would affect you in non-trivial ways, don’t use this library. You have been warned.

Otherwise, a reasonable attempt has been made to provide a secure solution. django-sesame uses Django’s signing framework to create signed tokens.

Tokens are tied to the primary key and the password of the corresponding user. Changing the password invalidates the token. When the authentication backend uses salted passwords — that’s been the default in Django for a long time — the token is invalidated even if the new password is identical to the old one.

By default, tokens never expire. If you want them to expire after a given amount of time, set the SESAME_MAX_AGE setting to a duration in seconds. Then each token will contain the time it was generated at and django-sesame will check if it’s still valid at each login attempt.

How to

  1. Add sesame.backends.ModelBackend to AUTHENTICATION_BACKENDS:

    AUTHENTICATION_BACKENDS += ['sesame.backends.ModelBackend']
  2. Add sesame.middleware.AuthenticationMiddleware to MIDDLEWARE:

    MIDDLEWARE += ['sesame.middleware.AuthenticationMiddleware']
  3. Generate authentication tokens with sesame.get_query_string(user).

That’s all!

Generating URLs

django-sesame provides two functions to generate authenticated URLs.

  1. sesame.utils.get_query_string(user) returns a complete query string that you can append to any URL to enable one-click login.

  2. sesame.utils.get_parameters(user) returns a dictionary of GET parameters to add to the query string, if you’re already building one.

Share resulting URLs with your users while ensuring adequate confidentiality.

By default, the URL parameter is called url_auth_token. You can set the SESAME_TOKEN_NAME setting to a shorter name that doesn’t conflict with query string parameters used by your application.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django-sesame-1.3.tar.gz (7.3 kB view details)

Uploaded Source

Built Distribution

django_sesame-1.3-py2.py3-none-any.whl (11.5 kB view details)

Uploaded Python 2Python 3

File details

Details for the file django-sesame-1.3.tar.gz.

File metadata

  • Download URL: django-sesame-1.3.tar.gz
  • Upload date:
  • Size: 7.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for django-sesame-1.3.tar.gz
Algorithm Hash digest
SHA256 10391e973627da3e45f6ea5ff073685efb11d30567aaf40c1daa8d1313ab842f
MD5 33a19b7823520ad6e332288aeb308678
BLAKE2b-256 0ea8b1e580cc656be6a0288d7e82135f496c06f2fdce4f20041b525cd2ebb12a

See more details on using hashes here.

File details

Details for the file django_sesame-1.3-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for django_sesame-1.3-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 022079bc36edec3f3e427a5490a92261d2583d4b629220728c1de02f6cccd2d2
MD5 2449f0c95278f3d9c71e1b654b50931a
BLAKE2b-256 664762a370d26db571969d9ae83bbfa41e9232a58ec6644a811e94aecd8196c1

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page