Skip to main content

Two factor authentication for Wagtail

Project description

This Django app adds two factor authentication to Wagtail. Behind the scenes it use django-otp which supports Time-based One-Time Passwords (TOTP). This allows you to use various apps like Authy, Google Authenticator, or 1Password.

All credits go to the original developer/s, I have just made newer release of the package that support Wagtail >= 6.0.

You can checkout the original repo here

Installation

pip install wagtail-2fa-new

Then add the following lines to the INSTALLED_APPS list in your Django settings:

INSTALLED_APPS = [
    # ...
    'wagtail_2fa',
    'django_otp',
    'django_otp.plugins.otp_totp',
    # ...
]

Next add the required middleware to the MIDDLEWARE. It should come after the AuthenticationMiddleware:

MIDDLEWARE = [
    # .. other middleware
    # 'django.contrib.auth.middleware.AuthenticationMiddleware',

    'wagtail_2fa.middleware.VerifyUserMiddleware',

    # 'wagtail.core.middleware.SiteMiddleware',
    # .. other middleware
]

Migrate your database:

python manage.py migrate

Settings

The following settings are available (Set via your Django settings):

  • WAGTAIL_2FA_REQUIRED (default False): When set to True all staff, superuser and other users with access to the Wagtail Admin site are forced to login using two factor authentication.

  • WAGTAIL_2FA_OTP_TOTP_NAME (default: False): The issuer name to identify which site is which in your authenticator app. If not set and WAGTAIL_SITE_NAME is defined it uses this. sets OTP_TOTP_ISSUER under the hood.

Making 2FA optional

With the default VerifyUserMiddleware middleware, 2FA is enabled for every user. To make 2FA optional, use the VerifyUserPermissionsMiddleware middleware instead.

To do so, use the VerifyUserPermissionsMiddleware middleware instead of the VerifyUserMiddleware in your Django settings:

MIDDLEWARE = [
    # ...
    # 'wagtail_2fa.middleware.VerifyUserMiddleware',
    'wagtail_2fa.middleware.VerifyUserPermissionsMiddleware',
    # ...
]

When this middleware is used, a checkbox is added to the group permissions and 2FA can be enabled or disabled per group.

2FA is always enabled for superusers, regardless of the middleware used.

Sandbox

First create a new virtualenv with Python 3.8 and activate it. Then run the following commands:

make sandbox

You can then visit http://localhost:8000/admin/ and login with the following credentials:

  • E-mail: superuser@example.com

  • Password: testing

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wagtail_2fa_new-1.8.0.tar.gz (19.6 kB view details)

Uploaded Source

Built Distribution

wagtail_2fa_new-1.8.0-py3-none-any.whl (24.4 kB view details)

Uploaded Python 3

File details

Details for the file wagtail_2fa_new-1.8.0.tar.gz.

File metadata

  • Download URL: wagtail_2fa_new-1.8.0.tar.gz
  • Upload date:
  • Size: 19.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.11.9

File hashes

Hashes for wagtail_2fa_new-1.8.0.tar.gz
Algorithm Hash digest
SHA256 887ab719f17389ea17ad5ad4212e8b4a42a18c6f9eafcda358c20a8362e127d2
MD5 768f64ec8dab8a05904710890dfee6e2
BLAKE2b-256 591c6bb0606ab1440ed5d7ce48a4af5c99a82255eae057e2d5aa5a8874b0cb66

See more details on using hashes here.

File details

Details for the file wagtail_2fa_new-1.8.0-py3-none-any.whl.

File metadata

File hashes

Hashes for wagtail_2fa_new-1.8.0-py3-none-any.whl
Algorithm Hash digest
SHA256 e7b8f6e035d85783b48699561f4277ae892a6b571d86cae3f19d7c77ec75a1cb
MD5 655352c438aa585d8a0ba6dc2f19629c
BLAKE2b-256 07fc5e28db7c6904e8b236b6c541277c156a47586bbd9e0ba87817b393350ca3

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page