Compare commits
5 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
5475a3bf87 | ||
|
|
773a16df50 | ||
|
|
85b4a25956 | ||
|
|
7415b169c9 | ||
|
|
3d8d970701 |
11
CHANGELOG.md
11
CHANGELOG.md
@@ -1,6 +1,15 @@
|
||||
# Change Log
|
||||
## 2.2.1
|
||||
## 2.4.0
|
||||
|
||||
* Fixed: issue in the 'Authorize' button don't show on Safari Mobile.
|
||||
* Upgrade to FIDO2 0.9.2, to fix issue with Windows 11.
|
||||
* Fixed: Minor Typos.
|
||||
|
||||
|
||||
## 2.3.0
|
||||
* Fixed: A missing import Thanks @AndreasDickow
|
||||
* Fixed: `MFA.html` now call `{{block.super}}` for head and content blocks, thanks @mnelson4
|
||||
* Added: #55 introduced `mfa_base.html` which will be extended by `MFA.html` for better styling
|
||||
|
||||
## 2.2.0
|
||||
* Added: MFA_REDIRECT_AFTER_REGISTRATION settings parameter
|
||||
|
||||
18
README.md
18
README.md
@@ -60,9 +60,9 @@ Depends on
|
||||
'mfa',
|
||||
'......')
|
||||
```
|
||||
1. Collect Static Files
|
||||
2. Collect Static Files
|
||||
`python manage.py collectstatic`
|
||||
1. Add the following settings to your file
|
||||
3. Add the following settings to your file
|
||||
|
||||
```python
|
||||
MFA_UNALLOWED_METHODS=() # Methods that shouldn't be allowed for the user
|
||||
@@ -95,7 +95,7 @@ Depends on
|
||||
* Starting version 1.7.0, Key owners can be specified.
|
||||
* Starting version 2.2.0
|
||||
* Added: `MFA_SUCCESS_REGISTRATION_MSG` & `MFA_REDIRECT_AFTER_REGISTRATION`
|
||||
1. Break your login function
|
||||
4. Break your login function
|
||||
|
||||
Usually your login function will check for username and password, log the user in if the username and password are correct and create the user session, to support mfa, this has to change
|
||||
|
||||
@@ -115,7 +115,7 @@ Depends on
|
||||
return log_user_in(request,username=user.username)
|
||||
#log_user_in is a function that handles creatung user session, it should be in the setting file as MFA_CALLBACK
|
||||
```
|
||||
1. Add mfa to urls.py
|
||||
5. Add mfa to urls.py
|
||||
```python
|
||||
import mfa
|
||||
import mfa.TrustedDevice
|
||||
@@ -126,13 +126,14 @@ Depends on
|
||||
'....',
|
||||
]
|
||||
```
|
||||
1. Provide `mfa_auth_base.html` in your templaes with block called 'head' and 'content'
|
||||
The template will be included during the user login.
|
||||
6. Provide `mfa_auth_base.html` in your templates with block called 'head' and 'content', The template will be included during the user login, the template shall be close to the login template.
|
||||
If you will use Email Token method, then you have to provide template named `mfa_email_token_template.html` that will content the format of the email with parameter named `user` and `otp`.
|
||||
1. To match the look and feel of your project, MFA includes `base.html` but it needs blocks named `head` & `content` to added its content to it.
|
||||
1. Somewhere in your app, add a link to 'mfa_home'
|
||||
7. To match the look and feel of your project, MFA includes `base.html` but it needs blocks named `head` & `content` to added its content to it.
|
||||
**Note:** Starting v2.3.0, a new template `mfa_base.html` is introduced, this template is used by `MFA.html` so you can control the styling better and current `mfa_base.html` extends `base.html`
|
||||
8. Somewhere in your app, add a link to 'mfa_home'
|
||||
```<li><a href="{% url 'mfa_home' %}">Security</a> </li>```
|
||||
|
||||
|
||||
For Example, See 'example' app
|
||||
|
||||
# Going Passwordless
|
||||
@@ -183,6 +184,7 @@ function some_func() {
|
||||
* [unramk](https://github.com/unramk)
|
||||
* [willingham](https://github.com/willingham)
|
||||
* [AndreasDickow](https://github.com/AndreasDickow)
|
||||
* [mnelson4](https://github.com/mnelson4)
|
||||
|
||||
|
||||
# Security contact information
|
||||
|
||||
@@ -25,7 +25,7 @@ SECRET_KEY = '#9)q!_i3@pr-^3oda(e^3$x!kq3b4f33#5l@+=+&vuz+p6gb3g'
|
||||
# SECURITY WARNING: don't run with debug turned on in production!
|
||||
DEBUG = True
|
||||
|
||||
ALLOWED_HOSTS = []
|
||||
ALLOWED_HOSTS = ['*']
|
||||
|
||||
|
||||
# Application definition
|
||||
@@ -146,5 +146,5 @@ MFA_SUCCESS_REGISTRATION_MSG="Go to Home"
|
||||
TOKEN_ISSUER_NAME="PROJECT_NAME" #TOTP Issuer name
|
||||
|
||||
U2F_APPID="https://localhost" #URL For U2F
|
||||
FIDO_SERVER_ID=u"localhost" # Server rp id for FIDO2, it the full domain of your project
|
||||
FIDO_SERVER_NAME=u"PROJECT_NAME"
|
||||
FIDO_SERVER_ID=u"local.mkalioby.com" # Server rp id for FIDO2, it the full domain of your project
|
||||
FIDO_SERVER_NAME=u"TestApp"
|
||||
|
||||
@@ -28,6 +28,7 @@
|
||||
<div class="card-header">Login</div>
|
||||
<div class="card-body">
|
||||
{% block content %}
|
||||
|
||||
{% endblock %}
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -34,16 +34,16 @@
|
||||
if (res["status"] =='OK')
|
||||
$("#res").html("<div class='alert alert-success'>Registered Successfully, <a href='{{redirect_html}}'> {{reg_success_msg}}</a></div>")
|
||||
else
|
||||
$("#res").html("<div class='alert alert-danger'>Registeration Failed as " + res["message"] + ", <a href='javascript:void(0)' onclick='begin_reg()'> try again or <a href='{% url 'mfa_home' %}'> Go to Security Home</a></div>")
|
||||
$("#res").html("<div class='alert alert-danger'>Registration Failed as " + res["message"] + ", <a href='javascript:void(0)' onclick='begin_reg()'> try again or <a href='{% url 'mfa_home' %}'> Go to Security Home</a></div>")
|
||||
|
||||
|
||||
}, function(reason) {
|
||||
$("#res").html("<div class='alert alert-danger'>Registeration Failed as " +reason +", <a href='javascript:void(0)' onclick='begin_reg()'> try again </a> or <a href='{% url 'mfa_home' %}'> Go to Security Home</a></div>")
|
||||
$("#res").html("<div class='alert alert-danger'>Registration Failed as " +reason +", <a href='javascript:void(0)' onclick='begin_reg()'> try again </a> or <a href='{% url 'mfa_home' %}'> Go to Security Home</a></div>")
|
||||
})
|
||||
}
|
||||
$(document).ready(function (){
|
||||
ua=new UAParser().getResult()
|
||||
if (ua.browser.name == "Safari")
|
||||
if (ua.browser.name == "Safari" || ua.browser.name == "Mobile Safari" )
|
||||
{
|
||||
$("#res").html("<button class='btn btn-success' onclick='begin_reg()'>Start...</button>")
|
||||
}
|
||||
|
||||
@@ -105,7 +105,7 @@
|
||||
$("#main_paragraph").html("FIDO2 must work under secure context")
|
||||
} else {
|
||||
ua=new UAParser().getResult()
|
||||
if (ua.browser.name == "Safari")
|
||||
if (ua.browser.name == "Safari" || ua.browser.name == "Mobile Safari" )
|
||||
$("#res").html("<button class='btn btn-success' onclick='authen()'>Authenticate...</button>")
|
||||
else
|
||||
authen()
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
{% extends "base.html" %}
|
||||
{% extends "mfa_base.html" %}
|
||||
{% load static %}
|
||||
{% block head %}
|
||||
{{block.super}}
|
||||
<script type="text/javascript">
|
||||
function confirmDel(id) {
|
||||
$.ajax({
|
||||
@@ -39,6 +40,7 @@
|
||||
<script src="{% static 'mfa/js/bootstrap-toggle.min.js'%}"></script>
|
||||
{% endblock %}
|
||||
{% block content %}
|
||||
{{block.super}}
|
||||
<br/>
|
||||
<br/>
|
||||
<div class="container">
|
||||
|
||||
7
mfa/templates/mfa_base.html
Normal file
7
mfa/templates/mfa_base.html
Normal file
@@ -0,0 +1,7 @@
|
||||
{% extends 'base.html' %}
|
||||
{% block head %}
|
||||
{{ block.super }}
|
||||
{% endblock %}
|
||||
{% block content %}
|
||||
{{ block.super }}
|
||||
{% endblock %}
|
||||
4
setup.py
4
setup.py
@@ -4,7 +4,7 @@ from setuptools import find_packages, setup
|
||||
|
||||
setup(
|
||||
name='django-mfa2',
|
||||
version='2.2.0',
|
||||
version='2.4.0',
|
||||
description='Allows user to add 2FA to their accounts',
|
||||
long_description=open("README.md").read(),
|
||||
long_description_content_type="text/markdown",
|
||||
@@ -24,7 +24,7 @@ setup(
|
||||
'ua-parser',
|
||||
'user-agents',
|
||||
'python-jose',
|
||||
'fido2 == 0.9.1',
|
||||
'fido2 == 0.9.2',
|
||||
'jsonLookup'
|
||||
],
|
||||
python_requires=">=3.5",
|
||||
|
||||
Reference in New Issue
Block a user