Skip to main content

Complete Two-Factor Authentication for Django

Project description

Build Status Test Coverage PyPI

Complete Two-Factor Authentication for Django. Built on top of the one-time password framework django-otp and Django’s built-in authentication framework django.contrib.auth for providing the easiest integration into most Django projects. Inspired by the user experience of Google’s Two-Step Authentication, allowing users to authenticate through call, text messages (SMS), by using a token generator app like Google Authenticator or a YubiKey hardware token generator (optional).

I would love to hear your feedback on this package. If you run into problems, please file an issue on GitHub, or contribute to the project by forking the repository and sending some pull requests. The package is currently translated into English, Dutch, Hebrew and Arabic. Please contribute your own language using Transifex.

Test drive this app through the online example app, hosted by Heroku. It demos most features except the Twilio integration. The example also includes django-user-sessions for providing Django sessions with a foreign key to the user. Although the package is optional, it improves account security control over django.contrib.sessions.

Compatible with Django 1.4, 1.5, 1.6 and 1.7 on Python 2.6, 2.7, 3.2, 3.3 and 3.4. Documentation is available at readthedocs.org.

Installation

Installation with pip:

$ pip install django-two-factor-auth

Add the following apps to the INSTALLED_APPS:

INSTALLED_APPS = (
    ...
    'django_otp',
    'django_otp.plugins.otp_static',
    'django_otp.plugins.otp_totp',
    'two_factor',
)

Add django_otp.middleware.OTPMiddleware to MIDDLEWARE_CLASSES. It must be installed after AuthenticationMiddleware:

MIDDLEWARE_CLASSES = [
    'django.middleware.common.CommonMiddleware',
    'django.contrib.sessions.middleware.SessionMiddleware',
    'django.middleware.csrf.CsrfViewMiddleware',
    'django.contrib.auth.middleware.AuthenticationMiddleware',
    'django_otp.middleware.OTPMiddleware',
    'django.contrib.messages.middleware.MessageMiddleware',
]

Configure a few urls:

from django.core.urlresolvers import reverse_lazy
LOGIN_URL = reverse_lazy('two_factor:login')

Add the url routes:

urlpatterns = patterns('',
    ...
    url(r'', include('two_factor.urls', 'two_factor')),
)

Be sure to remove any other login routes, otherwise the two-factor authentication might be circumvented. The admin interface should be automatically patched to use the new login method.

Support for YubiKey is disabled by default, but enabling is easy. Please refer to the documentation for instructions.

Contribute

  • Submit issues to the issue tracker on Github

  • Fork the source code at Github

  • Run the tests.

  • Send a pull request with your changes.

  • Provide a translation using Transifex.

Running tests

This project aims for full code-coverage, this means that your code should be well-tested. Also test branches for hardened code. You can run the full test suite with:

make test

Or run a specific test with:

make test TARGET=tests.tests.TwilioGatewayTest

For Python compatibility, tox is used. You can run the full test suite with:

tox

Releasing

The following actions are required to push a new version:

bumpversion [major|minor|patch] git commit -am “Released [version]” git tag [version] python setup.py sdist upload python setup.py bdist upload

See Also

Have a look at django-user-sessions for Django sessions with a foreign key to the user. This package is also included in the online example app.

License

The project is licensed under the MIT license.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django-two-factor-auth-1.1.0.tar.gz (63.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

django_two_factor_auth-1.1.0-py2.py3-none-any.whl (136.6 kB view details)

Uploaded Python 2Python 3

File details

Details for the file django-two-factor-auth-1.1.0.tar.gz.

File metadata

File hashes

Hashes for django-two-factor-auth-1.1.0.tar.gz
Algorithm Hash digest
SHA256 bf8dd0037e35bceb1aaf286c8f88c456e9bd5edcd773d0d88a3b6ae26e0e9841
MD5 b1f72daedea78bff6368192973dd97aa
BLAKE2b-256 d14b7c0a153c4c53cbee5577f2d11312ef8182faa3b15b4381c8c32da5050b94

See more details on using hashes here.

File details

Details for the file django_two_factor_auth-1.1.0-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for django_two_factor_auth-1.1.0-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 8906dffb86461522f0e26034e0b3aa0008ac3a7e1ea0e778a88b9fc4a1f399f4
MD5 b42526635c2467a9dfc4e31f625a2958
BLAKE2b-256 d6bc94352c9d03424866b48d0bb31f794f1a0afe062b77d889ab98e506524494

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page