django-passkeys


Namedjango-passkeys JSON
Version 1.2.7 PyPI version JSON
download
home_pagehttps://github.com/mkalioby/django-passkeys
SummaryA Django Authentication Backend for Passkeys
upload_time2023-11-03 10:02:38
maintainer
docs_urlNone
authorMohamed El-Kalioby
requires_python>=3.7
licenseMIT
keywords
VCS
bugtrack_url
requirements cffi cryptography Django django-sslserver fido2 pycparser pytz sqlparse
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # django-passkeys

[![PyPI version](https://badge.fury.io/py/django-passkeys.svg)](https://badge.fury.io/py/django-passkeys)
[![Downloads](https://static.pepy.tech/badge/django-passkeys)](https://pepy.tech/project/django-passkeys)
[![Downloads / Month ](https://pepy.tech/badge/django-passkeys/month)](https://pepy.tech/project/django-passkeys)
[![build](https://github.com/mkalioby/django-passkeys/actions/workflows/basic_checks.yml/badge.svg)](https://github.com/mkalioby/django-passkeys/actions/workflows/basic_checks.yml)
![Coverage](https://raw.githubusercontent.com/mkalioby/django-passkeys/main/coverage.svg)

![Django Versions](https://img.shields.io/pypi/frameworkversions/django/django-passkeys)
![Python Versions](https://img.shields.io/pypi/pyversions/django-passkeys)


An extension to Django *ModelBackend* backend to support passkeys.

Passkeys is an extension to Web Authentication API that will allow the user to login to a service using another device.

This app is a slim-down version of [django-mfa2](https://github.com/mkalioby/django-mfa2)

Passkeys are now supported on 
* Apple Ecosystem (iPhone 16.0+, iPadOS 16.1, Mac OS X Ventura)
* Chromium based browsers (on PC and Laptop) allows picking up credentials from Android and iPhone/iPadOS.
* Android Credentials creation for ResidentKeys is currently in live now.

On May 3, 2023, Google allowed the use of Passkeys for the users to login, killing the password for enrolled users. 

# Installation

`pip install django-passkeys`

Currently, it support Django 2.0+, Python 3.7+

# Usage
1. in your settings.py add the application to your installed apps
   ```python
   INSTALLED_APPS=(
   '......',
   'passkeys',
   '......')
   ```
2. Collect Static Files
`python manage.py collectstatic`
3. Run migrate
`python manage.py migrate`
4. Add the following settings to your file

   ```python
    AUTHENTICATION_BACKENDS = ['passkeys.backend.PasskeyModelBackend'] # Change your authentication backend
    FIDO_SERVER_ID="localhost"      # Server rp id for FIDO2, it the full domain of your project
    FIDO_SERVER_NAME="TestApp"
    import passkeys
    KEY_ATTACHMENT = None | passkeys.Attachment.CROSS_PLATFORM | passkeys.Attachment.PLATFORM
   ```
   **Note**: Starting v1.1, `FIDO_SERVER_ID` and/or `FIDO_SERVER_NAME` can be a callable to support multi-tenants web applications, the `request` is passed to the called function.
5. Add passkeys to urls.py
   ```python 

   urls_patterns= [
   '...',
   url(r'^passkeys/', include('passkeys.urls')),
   '....',
    ]
    ```
6. To match the look and feel of your project, Passkeys includes `base.html` but it needs blocks named `head` & `content` to added its content to it.
   **Notes:** 
    
    1. You can override `PassKeys_base.html` which is used by `Passkeys.html` so you can control the styling better and current `Passkeys_base.html` extends `base.html`
    1. Currently, `PassKeys_base.html` needs JQuery and bootstrap. 

7. Somewhere in your app, add a link to 'passkeys:home'
    ```<li><a href="{% url 'passkeys:home' %}">Passkeys</a> </li>```
8. In your login view, change the authenticate call to include the request as follows
   ```python
    user=authenticate(request, username=request.POST["username"],password=request.POST["password"])
    ```

8. Finally, In your `login.html`
   * Give an id to your login form e.g 'loginForm', the id should be provided when calling `authn` function
   * Inside the form, add 
     ```html
      <input type="hidden" name="passkeys" id="passkeys"/>
      <button class="btn btn-block btn-dark" type="button" onclick="authn('loginForm')"><img src="{% static 'passkeys/imgs/FIDO-Passkey_Icon-White.png' %}" style="width: 24px"></button>
     {%include 'passkeys.js' %}
     ```
For Example, See 'example' app and look at EXAMPLE.md to see how to set it up.

# Detect if user is using passkeys
Once the backend is used, there will be a `passkey` key in request.session. 
If the user used a passkey then `request.session['passkey']['passkey']` will be True and the key information will be there like this
```python
{'passkey': True, 'name': 'Chrome', 'id': 2, 'platform': 'Chrome on Apple', 'cross_platform': False}
```
`cross_platform`: means that the user used a key from another platform so there is no key local to the device used to login e.g used an Android phone on Mac OS X or iPad.
If the user didn't use a passkey then it will be set to False
```python
{'passkey':False}
```


# Check if the user can be enrolled for a platform authenticator

If you want to check if the user can be enrolled to use a platform authenticator, you can do the following in your main page.

```html
<div id="pk" class="alert alert-info" style="display: none">Your device supports passkeys, <a href="{%url 'passkeys:enroll'%}">Enroll</a> </div>
<script type="text/javascript">
function register_pk()
    {
        $('#pk').show();
    }
{% include 'check_passkeys.js'%}
$(document).ready(check_passkey(true,register_pk))
</script>
```
check_passkey function paramters are as follows 
* `platform_authenticator`: if the service requires only a platform authenticator (e.g TouchID, Windows Hello or Android SafetyNet)
* `success_func`: function to call if a platform authenticator is found or if the user didn't login by a passkey
* `fail_func`: function to call if no platform authenticator is found (optional).


## Using Conditional UI

Conditional UI is a way for the browser to prompt the user to use the passkey to login to the system as shown in 

![conditionalUI.png](imgs%2FconditionalUI.png)

Starting version v1.2. you can use Conditional UI by adding the following to your login page

1. Add `webauthn` to autocomplete of the username field as shown below.
```html
<input name="username" placeholder="username" autocomplete="username webauthn">
```
add the following to the page js.

```js
window.onload = checkConditionalUI('loginForm');
```
where `loginForm` is name of your login form.

## Security contact information

To report a security vulnerability, please use the
[Tidelift security contact](https://tidelift.com/security).
Tidelift will coordinate the fix and disclosure.

# Contributors
* [mahmoodnasr](https://github.com/mahmoodnasr)
* [jacopsd](https://github.com/jacopsd)   
* [gasparbrogueira](https://github.com/gasparbrogueira)
* [pulse-mind](https://github.com/pulse-mind)





            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/mkalioby/django-passkeys",
    "name": "django-passkeys",
    "maintainer": "",
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": "",
    "keywords": "",
    "author": "Mohamed El-Kalioby",
    "author_email": "mkalioby@mkalioby.com",
    "download_url": "https://files.pythonhosted.org/packages/7a/43/ad8b7d4813a4e85dbc3b5e8c06a6562b5b16a94fecddbc3c9d229192fb66/django-passkeys-1.2.7.tar.gz",
    "platform": null,
    "description": "# django-passkeys\n\n[![PyPI version](https://badge.fury.io/py/django-passkeys.svg)](https://badge.fury.io/py/django-passkeys)\n[![Downloads](https://static.pepy.tech/badge/django-passkeys)](https://pepy.tech/project/django-passkeys)\n[![Downloads / Month ](https://pepy.tech/badge/django-passkeys/month)](https://pepy.tech/project/django-passkeys)\n[![build](https://github.com/mkalioby/django-passkeys/actions/workflows/basic_checks.yml/badge.svg)](https://github.com/mkalioby/django-passkeys/actions/workflows/basic_checks.yml)\n![Coverage](https://raw.githubusercontent.com/mkalioby/django-passkeys/main/coverage.svg)\n\n![Django Versions](https://img.shields.io/pypi/frameworkversions/django/django-passkeys)\n![Python Versions](https://img.shields.io/pypi/pyversions/django-passkeys)\n\n\nAn extension to Django *ModelBackend* backend to support passkeys.\n\nPasskeys is an extension to Web Authentication API that will allow the user to login to a service using another device.\n\nThis app is a slim-down version of [django-mfa2](https://github.com/mkalioby/django-mfa2)\n\nPasskeys are now supported on \n* Apple Ecosystem (iPhone 16.0+, iPadOS 16.1, Mac OS X Ventura)\n* Chromium based browsers (on PC and Laptop) allows picking up credentials from Android and iPhone/iPadOS.\n* Android Credentials creation for ResidentKeys is currently in live now.\n\nOn May 3, 2023, Google allowed the use of Passkeys for the users to login, killing the password for enrolled users. \n\n# Installation\n\n`pip install django-passkeys`\n\nCurrently, it support Django 2.0+, Python 3.7+\n\n# Usage\n1. in your settings.py add the application to your installed apps\n   ```python\n   INSTALLED_APPS=(\n   '......',\n   'passkeys',\n   '......')\n   ```\n2. Collect Static Files\n`python manage.py collectstatic`\n3. Run migrate\n`python manage.py migrate`\n4. Add the following settings to your file\n\n   ```python\n    AUTHENTICATION_BACKENDS = ['passkeys.backend.PasskeyModelBackend'] # Change your authentication backend\n    FIDO_SERVER_ID=\"localhost\"      # Server rp id for FIDO2, it the full domain of your project\n    FIDO_SERVER_NAME=\"TestApp\"\n    import passkeys\n    KEY_ATTACHMENT = None | passkeys.Attachment.CROSS_PLATFORM | passkeys.Attachment.PLATFORM\n   ```\n   **Note**: Starting v1.1, `FIDO_SERVER_ID` and/or `FIDO_SERVER_NAME` can be a callable to support multi-tenants web applications, the `request` is passed to the called function.\n5. Add passkeys to urls.py\n   ```python \n\n   urls_patterns= [\n   '...',\n   url(r'^passkeys/', include('passkeys.urls')),\n   '....',\n    ]\n    ```\n6. To match the look and feel of your project, Passkeys includes `base.html` but it needs blocks named `head` & `content` to added its content to it.\n   **Notes:** \n    \n    1. You can override `PassKeys_base.html` which is used by `Passkeys.html` so you can control the styling better and current `Passkeys_base.html` extends `base.html`\n    1. Currently, `PassKeys_base.html` needs JQuery and bootstrap. \n\n7. Somewhere in your app, add a link to 'passkeys:home'\n    ```<li><a href=\"{% url 'passkeys:home' %}\">Passkeys</a> </li>```\n8. In your login view, change the authenticate call to include the request as follows\n   ```python\n    user=authenticate(request, username=request.POST[\"username\"],password=request.POST[\"password\"])\n    ```\n\n8. Finally, In your `login.html`\n   * Give an id to your login form e.g 'loginForm', the id should be provided when calling `authn` function\n   * Inside the form, add \n     ```html\n      <input type=\"hidden\" name=\"passkeys\" id=\"passkeys\"/>\n      <button class=\"btn btn-block btn-dark\" type=\"button\" onclick=\"authn('loginForm')\"><img src=\"{% static 'passkeys/imgs/FIDO-Passkey_Icon-White.png' %}\" style=\"width: 24px\"></button>\n     {%include 'passkeys.js' %}\n     ```\nFor Example, See 'example' app and look at EXAMPLE.md to see how to set it up.\n\n# Detect if user is using passkeys\nOnce the backend is used, there will be a `passkey` key in request.session. \nIf the user used a passkey then `request.session['passkey']['passkey']` will be True and the key information will be there like this\n```python\n{'passkey': True, 'name': 'Chrome', 'id': 2, 'platform': 'Chrome on Apple', 'cross_platform': False}\n```\n`cross_platform`: means that the user used a key from another platform so there is no key local to the device used to login e.g used an Android phone on Mac OS X or iPad.\nIf the user didn't use a passkey then it will be set to False\n```python\n{'passkey':False}\n```\n\n\n# Check if the user can be enrolled for a platform authenticator\n\nIf you want to check if the user can be enrolled to use a platform authenticator, you can do the following in your main page.\n\n```html\n<div id=\"pk\" class=\"alert alert-info\" style=\"display: none\">Your device supports passkeys, <a href=\"{%url 'passkeys:enroll'%}\">Enroll</a> </div>\n<script type=\"text/javascript\">\nfunction register_pk()\n    {\n        $('#pk').show();\n    }\n{% include 'check_passkeys.js'%}\n$(document).ready(check_passkey(true,register_pk))\n</script>\n```\ncheck_passkey function paramters are as follows \n* `platform_authenticator`: if the service requires only a platform authenticator (e.g TouchID, Windows Hello or Android SafetyNet)\n* `success_func`: function to call if a platform authenticator is found or if the user didn't login by a passkey\n* `fail_func`: function to call if no platform authenticator is found (optional).\n\n\n## Using Conditional UI\n\nConditional UI is a way for the browser to prompt the user to use the passkey to login to the system as shown in \n\n![conditionalUI.png](imgs%2FconditionalUI.png)\n\nStarting version v1.2. you can use Conditional UI by adding the following to your login page\n\n1. Add `webauthn` to autocomplete of the username field as shown below.\n```html\n<input name=\"username\" placeholder=\"username\" autocomplete=\"username webauthn\">\n```\nadd the following to the page js.\n\n```js\nwindow.onload = checkConditionalUI('loginForm');\n```\nwhere `loginForm` is name of your login form.\n\n## Security contact information\n\nTo report a security vulnerability, please use the\n[Tidelift security contact](https://tidelift.com/security).\nTidelift will coordinate the fix and disclosure.\n\n# Contributors\n* [mahmoodnasr](https://github.com/mahmoodnasr)\n* [jacopsd](https://github.com/jacopsd)   \n* [gasparbrogueira](https://github.com/gasparbrogueira)\n* [pulse-mind](https://github.com/pulse-mind)\n\n\n\n\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "A Django Authentication Backend for Passkeys",
    "version": "1.2.7",
    "project_urls": {
        "Download": "https://github.com/mkalioby/django-passkeys",
        "Homepage": "https://github.com/mkalioby/django-passkeys"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "7a43ad8b7d4813a4e85dbc3b5e8c06a6562b5b16a94fecddbc3c9d229192fb66",
                "md5": "82c4cfb1ed3679fb82079fb33849981e",
                "sha256": "e82aa112b8ae20cab8765fadb471cd5379cb0a38217a243cd4c8c180a2c116d5"
            },
            "downloads": -1,
            "filename": "django-passkeys-1.2.7.tar.gz",
            "has_sig": false,
            "md5_digest": "82c4cfb1ed3679fb82079fb33849981e",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 24398,
            "upload_time": "2023-11-03T10:02:38",
            "upload_time_iso_8601": "2023-11-03T10:02:38.918590Z",
            "url": "https://files.pythonhosted.org/packages/7a/43/ad8b7d4813a4e85dbc3b5e8c06a6562b5b16a94fecddbc3c9d229192fb66/django-passkeys-1.2.7.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-11-03 10:02:38",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "mkalioby",
    "github_project": "django-passkeys",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [
        {
            "name": "cffi",
            "specs": [
                [
                    "==",
                    "1.15.1"
                ]
            ]
        },
        {
            "name": "cryptography",
            "specs": [
                [
                    "==",
                    "38.0.1"
                ]
            ]
        },
        {
            "name": "Django",
            "specs": [
                [
                    "==",
                    "2.2.28"
                ]
            ]
        },
        {
            "name": "django-sslserver",
            "specs": [
                [
                    "==",
                    "0.22"
                ]
            ]
        },
        {
            "name": "fido2",
            "specs": [
                [
                    "==",
                    "1.1.1"
                ]
            ]
        },
        {
            "name": "pycparser",
            "specs": [
                [
                    "==",
                    "2.21"
                ]
            ]
        },
        {
            "name": "pytz",
            "specs": [
                [
                    "==",
                    "2022.5"
                ]
            ]
        },
        {
            "name": "sqlparse",
            "specs": [
                [
                    "==",
                    "0.4.3"
                ]
            ]
        }
    ],
    "tox": true,
    "lcname": "django-passkeys"
}
        
Elapsed time: 0.13075s