django-allauth


Namedjango-allauth JSON
Version 65.2.0 PyPI version JSON
download
home_pagehttps://allauth.org
SummaryIntegrated set of Django applications addressing authentication, registration, account management as well as 3rd party (social) account authentication.
upload_time2024-11-08 12:55:29
maintainerNone
docs_urlNone
authorRaymond Penners
requires_python>=3.8
licenseMIT
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            
==========================
Welcome to django-allauth!
==========================

.. image:: https://codeberg.org/allauth/allauth.org/raw/commit/da3b56390e1b18eaec09b05cd89dfa7812212dfc/content/news/2024/04/website-redesign/logo-light.png
   :target: https://allauth.org
   :align: right
   :alt: django-allauth logo
   :width: 250px


.. |ci| image:: https://img.shields.io/github/actions/workflow/status/pennersr/django-allauth/ci.yml.svg
   :target: https://github.com/pennersr/django-allauth/actions
.. |pypi| image:: https://img.shields.io/pypi/v/django-allauth
   :target: https://pypi.python.org/pypi/django-allauth
.. |cov| image:: https://img.shields.io/coverallsCoverage/github/pennersr/django-allauth
   :alt: Coverage Status
   :target: https://coveralls.io/r/pennersr/django-allauth
.. |btc| image:: https://img.shields.io/badge/bitcoin-donate-yellow
   :target: https://blockchain.info/address/1AJXuBMPHkaDCNX2rwAy34bGgs7hmrePEr
.. |liberapay| image:: https://img.shields.io/liberapay/receives/pennersr
   :target: https://en.liberapay.com/pennersr
.. |pystyle| image:: https://img.shields.io/badge/code_style-pep8-green
   :target: https://www.python.org/dev/peps/pep-0008/
.. |jsstyle| image:: https://img.shields.io/badge/code_style-standard-brightgreen
   :target: http://standardjs.com
.. |editor| image:: https://img.shields.io/badge/editor-emacs-purple
   :target: https://www.gnu.org/software/emacs/
.. |i18n| image:: https://img.shields.io/weblate/progress/allauth
   :target: https://hosted.weblate.org/projects/allauth/django-allauth/
.. |pypidl| image:: https://img.shields.io/pypi/dm/django-allauth
   :target: https://pypistats.org/packages/django-allauth
   :alt: PyPI - Downloads
.. |djangodemo| image:: https://img.shields.io/badge/%E2%96%B6_demo-Django_project-red
   :target: https://django.demo.allauth.org/
   :alt: View Django Demo
.. |reactdemo| image:: https://img.shields.io/badge/%E2%96%B6_demo-React_SPA-red
   :target: https://react.demo.allauth.org/
   :alt: View React SPA Demo

|ci| |pypi| |cov| |btc| |liberapay| |pystyle| |jsstyle| |editor| |i18n| |pypidl| |djangodemo| |reactdemo|


Integrated set of Django applications addressing authentication,
registration, account management as well as 3rd party (social) account
authentication.

Home page
  https://allauth.org/

Source code
  https://codeberg.org/allauth/django-allauth

Issue Tracker
  https://codeberg.org/allauth/django-allauth/issues

Documentation
  https://docs.allauth.org/en/latest/

Stack Overflow
  https://stackoverflow.com/questions/tagged/django-allauth

Demo
  https://django.demo.allauth.org and https://react.demo.allauth.org

Translations
  https://hosted.weblate.org/projects/allauth/django-allauth/

.. end-welcome

Rationale
=========

.. begin-rationale

Most existing Django apps that address the problem of social
authentication unfortunately focus only on one dimension - the social.
Most developers end up integrating another app in order to support authentication
flows that are locally generated.

This approach creates a development gap between local and social
authentication flows. It has remained an issue in spite of numerous common
scenarios that both require. For example, an email address passed along by an
OpenID provider may not be verified. Therefore, prior to hooking up
an OpenID account to a local account the email address must be
verified. This essentially is one of many use cases that mandate email
verification to be present in both worlds.

Integrating both is a humongous and tedious process. It is not as
simple as adding one social authentication app, and one
local account registration app to your ``INSTALLED_APPS`` list.

This inadequacy is the reason for this project's existence  -- to offer a fully
integrated authentication app that allows for both local and social
authentication, with flows that just work, beautifully!

.. end-rationale


Features
========

.. begin-features

**πŸ”‘ Comprehensive account functionality**
    Supports multiple authentication
    schemes (e.g. login by user name, or by email), as well as multiple
    strategies for account verification (ranging from none to mandatory email
    verification).

**πŸ‘₯ Social Login**
    Login using external identity providers, supporting any *Open ID Connect
    compatible* provider, many *OAuth 1.0/2.0* providers, as well as
    custom protocols such as, for example, *Telegram* authentication.

**πŸ’Ό Enterprise ready**
    Supports SAML 2.0, which is often used in a B2B context.

**πŸ•΅οΈ Battle-tested**
    The package has been out in the open since 2010. It is in use by many
    commercial companies whose business depends on it and has hence been
    subjected to various penetration testing attempts.

**⏳Rate limiting**
    When you expose an authentication-enabled web service to
    the internet, it is important to be prepared for potential brute force
    attempts. Therefore, rate limiting is enabled out of the box.

**πŸ”’ Private**
    Many sites leak information. For example, on many sites you can
    check whether someone you know has an account by input their email address
    into the password forgotten form, or trying to signup with it. We offer
    account enumeration prevention, making it impossible to tell whether or not
    somebody already has an account.

**🧩 Customizable**
    As a developer, you have the flexibility to customize the core functionality
    according to your specific requirements. By employing the adapter pattern, you
    can effortlessly introduce interventions at the desired points to deviate from
    the standard behavior. This level of customization empowers you to tailor the
    software to meet your unique needs and preferences.

**βš™οΈ Configuration**
    The required consumer keys and secrets for interacting with Facebook,
    X (Twitter) and the likes can be configured using regular settings, or, can be
    configured in the database via the Django admin. Here, optional support for
    the Django sites framework is available, which is helpful for larger
    multi-domain projects, but also allows for easy switching between a
    development (localhost) and production setup without messing with your
    settings and database.


.. end-features


Commercial Support
==================

.. begin-support

Commercial support is available. If you find certain functionality missing, or
require assistance on your project(s), please contact us: info@intenct.nl.

.. end-support

            

Raw data

            {
    "_id": null,
    "home_page": "https://allauth.org",
    "name": "django-allauth",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": null,
    "author": "Raymond Penners",
    "author_email": "raymond.penners@intenct.nl",
    "download_url": "https://files.pythonhosted.org/packages/2c/df/1db5a3d7c87df36c4258ad58502dc12971df28a3b9c1e0be2e41007a7277/django_allauth-65.2.0.tar.gz",
    "platform": null,
    "description": "\n==========================\nWelcome to django-allauth!\n==========================\n\n.. image:: https://codeberg.org/allauth/allauth.org/raw/commit/da3b56390e1b18eaec09b05cd89dfa7812212dfc/content/news/2024/04/website-redesign/logo-light.png\n   :target: https://allauth.org\n   :align: right\n   :alt: django-allauth logo\n   :width: 250px\n\n\n.. |ci| image:: https://img.shields.io/github/actions/workflow/status/pennersr/django-allauth/ci.yml.svg\n   :target: https://github.com/pennersr/django-allauth/actions\n.. |pypi| image:: https://img.shields.io/pypi/v/django-allauth\n   :target: https://pypi.python.org/pypi/django-allauth\n.. |cov| image:: https://img.shields.io/coverallsCoverage/github/pennersr/django-allauth\n   :alt: Coverage Status\n   :target: https://coveralls.io/r/pennersr/django-allauth\n.. |btc| image:: https://img.shields.io/badge/bitcoin-donate-yellow\n   :target: https://blockchain.info/address/1AJXuBMPHkaDCNX2rwAy34bGgs7hmrePEr\n.. |liberapay| image:: https://img.shields.io/liberapay/receives/pennersr\n   :target: https://en.liberapay.com/pennersr\n.. |pystyle| image:: https://img.shields.io/badge/code_style-pep8-green\n   :target: https://www.python.org/dev/peps/pep-0008/\n.. |jsstyle| image:: https://img.shields.io/badge/code_style-standard-brightgreen\n   :target: http://standardjs.com\n.. |editor| image:: https://img.shields.io/badge/editor-emacs-purple\n   :target: https://www.gnu.org/software/emacs/\n.. |i18n| image:: https://img.shields.io/weblate/progress/allauth\n   :target: https://hosted.weblate.org/projects/allauth/django-allauth/\n.. |pypidl| image:: https://img.shields.io/pypi/dm/django-allauth\n   :target: https://pypistats.org/packages/django-allauth\n   :alt: PyPI - Downloads\n.. |djangodemo| image:: https://img.shields.io/badge/%E2%96%B6_demo-Django_project-red\n   :target: https://django.demo.allauth.org/\n   :alt: View Django Demo\n.. |reactdemo| image:: https://img.shields.io/badge/%E2%96%B6_demo-React_SPA-red\n   :target: https://react.demo.allauth.org/\n   :alt: View React SPA Demo\n\n|ci| |pypi| |cov| |btc| |liberapay| |pystyle| |jsstyle| |editor| |i18n| |pypidl| |djangodemo| |reactdemo|\n\n\nIntegrated set of Django applications addressing authentication,\nregistration, account management as well as 3rd party (social) account\nauthentication.\n\nHome page\n  https://allauth.org/\n\nSource code\n  https://codeberg.org/allauth/django-allauth\n\nIssue Tracker\n  https://codeberg.org/allauth/django-allauth/issues\n\nDocumentation\n  https://docs.allauth.org/en/latest/\n\nStack Overflow\n  https://stackoverflow.com/questions/tagged/django-allauth\n\nDemo\n  https://django.demo.allauth.org and https://react.demo.allauth.org\n\nTranslations\n  https://hosted.weblate.org/projects/allauth/django-allauth/\n\n.. end-welcome\n\nRationale\n=========\n\n.. begin-rationale\n\nMost existing Django apps that address the problem of social\nauthentication unfortunately focus only on one dimension - the social.\nMost developers end up integrating another app in order to support authentication\nflows that are locally generated.\n\nThis approach creates a development gap between local and social\nauthentication flows. It has remained an issue in spite of numerous common\nscenarios that both require. For example, an email address passed along by an\nOpenID provider may not be verified. Therefore, prior to hooking up\nan OpenID account to a local account the email address must be\nverified. This essentially is one of many use cases that mandate email\nverification to be present in both worlds.\n\nIntegrating both is a humongous and tedious process. It is not as\nsimple as adding one social authentication app, and one\nlocal account registration app to your ``INSTALLED_APPS`` list.\n\nThis inadequacy is the reason for this project's existence  -- to offer a fully\nintegrated authentication app that allows for both local and social\nauthentication, with flows that just work, beautifully!\n\n.. end-rationale\n\n\nFeatures\n========\n\n.. begin-features\n\n**\ud83d\udd11 Comprehensive account functionality**\n    Supports multiple authentication\n    schemes (e.g. login by user name, or by email), as well as multiple\n    strategies for account verification (ranging from none to mandatory email\n    verification).\n\n**\ud83d\udc65 Social Login**\n    Login using external identity providers, supporting any *Open ID Connect\n    compatible* provider, many *OAuth 1.0/2.0* providers, as well as\n    custom protocols such as, for example, *Telegram* authentication.\n\n**\ud83d\udcbc Enterprise ready**\n    Supports SAML 2.0, which is often used in a B2B context.\n\n**\ud83d\udd75\ufe0f Battle-tested**\n    The package has been out in the open since 2010. It is in use by many\n    commercial companies whose business depends on it and has hence been\n    subjected to various penetration testing attempts.\n\n**\u23f3Rate limiting**\n    When you expose an authentication-enabled web service to\n    the internet, it is important to be prepared for potential brute force\n    attempts. Therefore, rate limiting is enabled out of the box.\n\n**\ud83d\udd12 Private**\n    Many sites leak information. For example, on many sites you can\n    check whether someone you know has an account by input their email address\n    into the password forgotten form, or trying to signup with it. We offer\n    account enumeration prevention, making it impossible to tell whether or not\n    somebody already has an account.\n\n**\ud83e\udde9 Customizable**\n    As a developer, you have the flexibility to customize the core functionality\n    according to your specific requirements. By employing the adapter pattern, you\n    can effortlessly introduce interventions at the desired points to deviate from\n    the standard behavior. This level of customization empowers you to tailor the\n    software to meet your unique needs and preferences.\n\n**\u2699\ufe0f Configuration**\n    The required consumer keys and secrets for interacting with Facebook,\n    X (Twitter) and the likes can be configured using regular settings, or, can be\n    configured in the database via the Django admin. Here, optional support for\n    the Django sites framework is available, which is helpful for larger\n    multi-domain projects, but also allows for easy switching between a\n    development (localhost) and production setup without messing with your\n    settings and database.\n\n\n.. end-features\n\n\nCommercial Support\n==================\n\n.. begin-support\n\nCommercial support is available. If you find certain functionality missing, or\nrequire assistance on your project(s), please contact us: info@intenct.nl.\n\n.. end-support\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Integrated set of Django applications addressing authentication, registration, account management as well as 3rd party (social) account authentication.",
    "version": "65.2.0",
    "project_urls": {
        "Changelog": "https://codeberg.org/allauth/django-allauth/src/branch/main/ChangeLog.rst",
        "Documentation": "https://docs.allauth.org/en/latest/",
        "Donate": "https://github.com/sponsors/pennersr",
        "Homepage": "https://allauth.org",
        "Source": "https://codeberg.org/allauth/django-allauth",
        "Tracker": "https://codeberg.org/allauth/django-allauth/issues"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "2cdf1db5a3d7c87df36c4258ad58502dc12971df28a3b9c1e0be2e41007a7277",
                "md5": "674b1459c4546d4b3be19065c5ca3893",
                "sha256": "0a3d7baf7beefd6fe8027316302c26ece7433cf4331a3b245d15fc9a7be68b6f"
            },
            "downloads": -1,
            "filename": "django_allauth-65.2.0.tar.gz",
            "has_sig": false,
            "md5_digest": "674b1459c4546d4b3be19065c5ca3893",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 1544072,
            "upload_time": "2024-11-08T12:55:29",
            "upload_time_iso_8601": "2024-11-08T12:55:29.970624Z",
            "url": "https://files.pythonhosted.org/packages/2c/df/1db5a3d7c87df36c4258ad58502dc12971df28a3b9c1e0be2e41007a7277/django_allauth-65.2.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-11-08 12:55:29",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "sponsors",
    "github_project": "pennersr",
    "github_not_found": true,
    "lcname": "django-allauth"
}
        
Elapsed time: 0.46838s