Name | django-allauth JSON |
Version |
65.2.0
JSON |
| download |
home_page | https://allauth.org |
Summary | Integrated set of Django applications addressing authentication, registration, account management as well as 3rd party (social) account authentication. |
upload_time | 2024-11-08 12:55:29 |
maintainer | None |
docs_url | None |
author | Raymond Penners |
requires_python | >=3.8 |
license | MIT |
keywords |
|
VCS |
|
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
==========================
Welcome to django-allauth!
==========================
.. image:: https://codeberg.org/allauth/allauth.org/raw/commit/da3b56390e1b18eaec09b05cd89dfa7812212dfc/content/news/2024/04/website-redesign/logo-light.png
:target: https://allauth.org
:align: right
:alt: django-allauth logo
:width: 250px
.. |ci| image:: https://img.shields.io/github/actions/workflow/status/pennersr/django-allauth/ci.yml.svg
:target: https://github.com/pennersr/django-allauth/actions
.. |pypi| image:: https://img.shields.io/pypi/v/django-allauth
:target: https://pypi.python.org/pypi/django-allauth
.. |cov| image:: https://img.shields.io/coverallsCoverage/github/pennersr/django-allauth
:alt: Coverage Status
:target: https://coveralls.io/r/pennersr/django-allauth
.. |btc| image:: https://img.shields.io/badge/bitcoin-donate-yellow
:target: https://blockchain.info/address/1AJXuBMPHkaDCNX2rwAy34bGgs7hmrePEr
.. |liberapay| image:: https://img.shields.io/liberapay/receives/pennersr
:target: https://en.liberapay.com/pennersr
.. |pystyle| image:: https://img.shields.io/badge/code_style-pep8-green
:target: https://www.python.org/dev/peps/pep-0008/
.. |jsstyle| image:: https://img.shields.io/badge/code_style-standard-brightgreen
:target: http://standardjs.com
.. |editor| image:: https://img.shields.io/badge/editor-emacs-purple
:target: https://www.gnu.org/software/emacs/
.. |i18n| image:: https://img.shields.io/weblate/progress/allauth
:target: https://hosted.weblate.org/projects/allauth/django-allauth/
.. |pypidl| image:: https://img.shields.io/pypi/dm/django-allauth
:target: https://pypistats.org/packages/django-allauth
:alt: PyPI - Downloads
.. |djangodemo| image:: https://img.shields.io/badge/%E2%96%B6_demo-Django_project-red
:target: https://django.demo.allauth.org/
:alt: View Django Demo
.. |reactdemo| image:: https://img.shields.io/badge/%E2%96%B6_demo-React_SPA-red
:target: https://react.demo.allauth.org/
:alt: View React SPA Demo
|ci| |pypi| |cov| |btc| |liberapay| |pystyle| |jsstyle| |editor| |i18n| |pypidl| |djangodemo| |reactdemo|
Integrated set of Django applications addressing authentication,
registration, account management as well as 3rd party (social) account
authentication.
Home page
https://allauth.org/
Source code
https://codeberg.org/allauth/django-allauth
Issue Tracker
https://codeberg.org/allauth/django-allauth/issues
Documentation
https://docs.allauth.org/en/latest/
Stack Overflow
https://stackoverflow.com/questions/tagged/django-allauth
Demo
https://django.demo.allauth.org and https://react.demo.allauth.org
Translations
https://hosted.weblate.org/projects/allauth/django-allauth/
.. end-welcome
Rationale
=========
.. begin-rationale
Most existing Django apps that address the problem of social
authentication unfortunately focus only on one dimension - the social.
Most developers end up integrating another app in order to support authentication
flows that are locally generated.
This approach creates a development gap between local and social
authentication flows. It has remained an issue in spite of numerous common
scenarios that both require. For example, an email address passed along by an
OpenID provider may not be verified. Therefore, prior to hooking up
an OpenID account to a local account the email address must be
verified. This essentially is one of many use cases that mandate email
verification to be present in both worlds.
Integrating both is a humongous and tedious process. It is not as
simple as adding one social authentication app, and one
local account registration app to your ``INSTALLED_APPS`` list.
This inadequacy is the reason for this project's existence -- to offer a fully
integrated authentication app that allows for both local and social
authentication, with flows that just work, beautifully!
.. end-rationale
Features
========
.. begin-features
**π Comprehensive account functionality**
Supports multiple authentication
schemes (e.g. login by user name, or by email), as well as multiple
strategies for account verification (ranging from none to mandatory email
verification).
**π₯ Social Login**
Login using external identity providers, supporting any *Open ID Connect
compatible* provider, many *OAuth 1.0/2.0* providers, as well as
custom protocols such as, for example, *Telegram* authentication.
**πΌ Enterprise ready**
Supports SAML 2.0, which is often used in a B2B context.
**π΅οΈ Battle-tested**
The package has been out in the open since 2010. It is in use by many
commercial companies whose business depends on it and has hence been
subjected to various penetration testing attempts.
**β³Rate limiting**
When you expose an authentication-enabled web service to
the internet, it is important to be prepared for potential brute force
attempts. Therefore, rate limiting is enabled out of the box.
**π Private**
Many sites leak information. For example, on many sites you can
check whether someone you know has an account by input their email address
into the password forgotten form, or trying to signup with it. We offer
account enumeration prevention, making it impossible to tell whether or not
somebody already has an account.
**𧩠Customizable**
As a developer, you have the flexibility to customize the core functionality
according to your specific requirements. By employing the adapter pattern, you
can effortlessly introduce interventions at the desired points to deviate from
the standard behavior. This level of customization empowers you to tailor the
software to meet your unique needs and preferences.
**βοΈ Configuration**
The required consumer keys and secrets for interacting with Facebook,
X (Twitter) and the likes can be configured using regular settings, or, can be
configured in the database via the Django admin. Here, optional support for
the Django sites framework is available, which is helpful for larger
multi-domain projects, but also allows for easy switching between a
development (localhost) and production setup without messing with your
settings and database.
.. end-features
Commercial Support
==================
.. begin-support
Commercial support is available. If you find certain functionality missing, or
require assistance on your project(s), please contact us: info@intenct.nl.
.. end-support
Raw data
{
"_id": null,
"home_page": "https://allauth.org",
"name": "django-allauth",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": null,
"keywords": null,
"author": "Raymond Penners",
"author_email": "raymond.penners@intenct.nl",
"download_url": "https://files.pythonhosted.org/packages/2c/df/1db5a3d7c87df36c4258ad58502dc12971df28a3b9c1e0be2e41007a7277/django_allauth-65.2.0.tar.gz",
"platform": null,
"description": "\n==========================\nWelcome to django-allauth!\n==========================\n\n.. image:: https://codeberg.org/allauth/allauth.org/raw/commit/da3b56390e1b18eaec09b05cd89dfa7812212dfc/content/news/2024/04/website-redesign/logo-light.png\n :target: https://allauth.org\n :align: right\n :alt: django-allauth logo\n :width: 250px\n\n\n.. |ci| image:: https://img.shields.io/github/actions/workflow/status/pennersr/django-allauth/ci.yml.svg\n :target: https://github.com/pennersr/django-allauth/actions\n.. |pypi| image:: https://img.shields.io/pypi/v/django-allauth\n :target: https://pypi.python.org/pypi/django-allauth\n.. |cov| image:: https://img.shields.io/coverallsCoverage/github/pennersr/django-allauth\n :alt: Coverage Status\n :target: https://coveralls.io/r/pennersr/django-allauth\n.. |btc| image:: https://img.shields.io/badge/bitcoin-donate-yellow\n :target: https://blockchain.info/address/1AJXuBMPHkaDCNX2rwAy34bGgs7hmrePEr\n.. |liberapay| image:: https://img.shields.io/liberapay/receives/pennersr\n :target: https://en.liberapay.com/pennersr\n.. |pystyle| image:: https://img.shields.io/badge/code_style-pep8-green\n :target: https://www.python.org/dev/peps/pep-0008/\n.. |jsstyle| image:: https://img.shields.io/badge/code_style-standard-brightgreen\n :target: http://standardjs.com\n.. |editor| image:: https://img.shields.io/badge/editor-emacs-purple\n :target: https://www.gnu.org/software/emacs/\n.. |i18n| image:: https://img.shields.io/weblate/progress/allauth\n :target: https://hosted.weblate.org/projects/allauth/django-allauth/\n.. |pypidl| image:: https://img.shields.io/pypi/dm/django-allauth\n :target: https://pypistats.org/packages/django-allauth\n :alt: PyPI - Downloads\n.. |djangodemo| image:: https://img.shields.io/badge/%E2%96%B6_demo-Django_project-red\n :target: https://django.demo.allauth.org/\n :alt: View Django Demo\n.. |reactdemo| image:: https://img.shields.io/badge/%E2%96%B6_demo-React_SPA-red\n :target: https://react.demo.allauth.org/\n :alt: View React SPA Demo\n\n|ci| |pypi| |cov| |btc| |liberapay| |pystyle| |jsstyle| |editor| |i18n| |pypidl| |djangodemo| |reactdemo|\n\n\nIntegrated set of Django applications addressing authentication,\nregistration, account management as well as 3rd party (social) account\nauthentication.\n\nHome page\n https://allauth.org/\n\nSource code\n https://codeberg.org/allauth/django-allauth\n\nIssue Tracker\n https://codeberg.org/allauth/django-allauth/issues\n\nDocumentation\n https://docs.allauth.org/en/latest/\n\nStack Overflow\n https://stackoverflow.com/questions/tagged/django-allauth\n\nDemo\n https://django.demo.allauth.org and https://react.demo.allauth.org\n\nTranslations\n https://hosted.weblate.org/projects/allauth/django-allauth/\n\n.. end-welcome\n\nRationale\n=========\n\n.. begin-rationale\n\nMost existing Django apps that address the problem of social\nauthentication unfortunately focus only on one dimension - the social.\nMost developers end up integrating another app in order to support authentication\nflows that are locally generated.\n\nThis approach creates a development gap between local and social\nauthentication flows. It has remained an issue in spite of numerous common\nscenarios that both require. For example, an email address passed along by an\nOpenID provider may not be verified. Therefore, prior to hooking up\nan OpenID account to a local account the email address must be\nverified. This essentially is one of many use cases that mandate email\nverification to be present in both worlds.\n\nIntegrating both is a humongous and tedious process. It is not as\nsimple as adding one social authentication app, and one\nlocal account registration app to your ``INSTALLED_APPS`` list.\n\nThis inadequacy is the reason for this project's existence -- to offer a fully\nintegrated authentication app that allows for both local and social\nauthentication, with flows that just work, beautifully!\n\n.. end-rationale\n\n\nFeatures\n========\n\n.. begin-features\n\n**\ud83d\udd11 Comprehensive account functionality**\n Supports multiple authentication\n schemes (e.g. login by user name, or by email), as well as multiple\n strategies for account verification (ranging from none to mandatory email\n verification).\n\n**\ud83d\udc65 Social Login**\n Login using external identity providers, supporting any *Open ID Connect\n compatible* provider, many *OAuth 1.0/2.0* providers, as well as\n custom protocols such as, for example, *Telegram* authentication.\n\n**\ud83d\udcbc Enterprise ready**\n Supports SAML 2.0, which is often used in a B2B context.\n\n**\ud83d\udd75\ufe0f Battle-tested**\n The package has been out in the open since 2010. It is in use by many\n commercial companies whose business depends on it and has hence been\n subjected to various penetration testing attempts.\n\n**\u23f3Rate limiting**\n When you expose an authentication-enabled web service to\n the internet, it is important to be prepared for potential brute force\n attempts. Therefore, rate limiting is enabled out of the box.\n\n**\ud83d\udd12 Private**\n Many sites leak information. For example, on many sites you can\n check whether someone you know has an account by input their email address\n into the password forgotten form, or trying to signup with it. We offer\n account enumeration prevention, making it impossible to tell whether or not\n somebody already has an account.\n\n**\ud83e\udde9 Customizable**\n As a developer, you have the flexibility to customize the core functionality\n according to your specific requirements. By employing the adapter pattern, you\n can effortlessly introduce interventions at the desired points to deviate from\n the standard behavior. This level of customization empowers you to tailor the\n software to meet your unique needs and preferences.\n\n**\u2699\ufe0f Configuration**\n The required consumer keys and secrets for interacting with Facebook,\n X (Twitter) and the likes can be configured using regular settings, or, can be\n configured in the database via the Django admin. Here, optional support for\n the Django sites framework is available, which is helpful for larger\n multi-domain projects, but also allows for easy switching between a\n development (localhost) and production setup without messing with your\n settings and database.\n\n\n.. end-features\n\n\nCommercial Support\n==================\n\n.. begin-support\n\nCommercial support is available. If you find certain functionality missing, or\nrequire assistance on your project(s), please contact us: info@intenct.nl.\n\n.. end-support\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "Integrated set of Django applications addressing authentication, registration, account management as well as 3rd party (social) account authentication.",
"version": "65.2.0",
"project_urls": {
"Changelog": "https://codeberg.org/allauth/django-allauth/src/branch/main/ChangeLog.rst",
"Documentation": "https://docs.allauth.org/en/latest/",
"Donate": "https://github.com/sponsors/pennersr",
"Homepage": "https://allauth.org",
"Source": "https://codeberg.org/allauth/django-allauth",
"Tracker": "https://codeberg.org/allauth/django-allauth/issues"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "2cdf1db5a3d7c87df36c4258ad58502dc12971df28a3b9c1e0be2e41007a7277",
"md5": "674b1459c4546d4b3be19065c5ca3893",
"sha256": "0a3d7baf7beefd6fe8027316302c26ece7433cf4331a3b245d15fc9a7be68b6f"
},
"downloads": -1,
"filename": "django_allauth-65.2.0.tar.gz",
"has_sig": false,
"md5_digest": "674b1459c4546d4b3be19065c5ca3893",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 1544072,
"upload_time": "2024-11-08T12:55:29",
"upload_time_iso_8601": "2024-11-08T12:55:29.970624Z",
"url": "https://files.pythonhosted.org/packages/2c/df/1db5a3d7c87df36c4258ad58502dc12971df28a3b9c1e0be2e41007a7277/django_allauth-65.2.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-11-08 12:55:29",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "sponsors",
"github_project": "pennersr",
"github_not_found": true,
"lcname": "django-allauth"
}