django-openid-auth | Mirror of https :
kandi X-RAY | django-openid-auth Summary
kandi X-RAY | django-openid-auth Summary
django-openid-auth is a Python library. django-openid-auth has no bugs, it has no vulnerabilities, it has build file available, it has a Permissive License and it has low support. You can download it from GitHub.
This package provides integration between Django’s authentication system and OpenID authentication. It also includes support for using a fixed OpenID server endpoint, which can be useful when implementing single signon systems.
This package provides integration between Django’s authentication system and OpenID authentication. It also includes support for using a fixed OpenID server endpoint, which can be useful when implementing single signon systems.
Support
Quality
Security
License
Reuse
Support
django-openid-auth has a low active ecosystem.
It has 0 star(s) with 2 fork(s). There are 1 watchers for this library.
It had no major release in the last 6 months.
There are 0 open issues and 1 have been closed. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of django-openid-auth is current.
Quality
django-openid-auth has no bugs reported.
Security
django-openid-auth has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
License
django-openid-auth is licensed under the BSD-2-Clause License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
django-openid-auth releases are not available. You will need to build from source code and install.
Build file is available. You can build the component from source.
Installation instructions, examples and code snippets are available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of django-openid-auth
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of django-openid-auth
django-openid-auth Key Features
No Key Features are available at this moment for django-openid-auth.
django-openid-auth Examples and Code Snippets
No Code Snippets are available at this moment for django-openid-auth.
Community Discussions
No Community Discussions are available at this moment for django-openid-auth.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install django-openid-auth
Install the Jan Rain Python OpenID library. It can be found at:.
Install the Jan Rain Python OpenID library. It can be found at: http://openidenabled.com/python-openid/ It can also be found in most Linux distributions packaged as "python-openid". You will need version 2.2.0 or later.
Add 'django_openid_auth' to INSTALLED_APPS for your application. At a minimum, you’ll need the following in there: INSTALLED_APPS = ( 'django.contrib.auth', 'django.contrib.contenttypes', 'django.contrib.sessions', 'django_openid_auth', )
Add 'django_auth_openid.auth.OpenIDBackend' to AUTHENTICATION_BACKENDS. This should be in addition to the default ModelBackend: AUTHENTICATION_BACKENDS = ( 'django_openid_auth.auth.OpenIDBackend', 'django.contrib.auth.backends.ModelBackend', )
To create users automatically when a new OpenID is used, add the following to the settings: OPENID_CREATE_USERS = True
To have user details updated from OpenID Simple Registration or Attribute Exchange extension data each time they log in, add the following: OPENID_UPDATE_DETAILS_FROM_SREG = True
Hook up the login URLs to your application’s urlconf with something like: urlpatterns = patterns('', ... (r'^openid/', include('django_openid_auth.urls')), ... )
Configure the LOGIN_URL and LOGIN_REDIRECT_URL appropriately for your site: LOGIN_URL = '/openid/login/' LOGIN_REDIRECT_URL = '/' This will allow pages that use the standard @login_required decorator to use the OpenID login page.
Rerun "python manage.py syncdb" to add the UserOpenID table to your database.
Install the Jan Rain Python OpenID library. It can be found at: http://openidenabled.com/python-openid/ It can also be found in most Linux distributions packaged as "python-openid". You will need version 2.2.0 or later.
Add 'django_openid_auth' to INSTALLED_APPS for your application. At a minimum, you’ll need the following in there: INSTALLED_APPS = ( 'django.contrib.auth', 'django.contrib.contenttypes', 'django.contrib.sessions', 'django_openid_auth', )
Add 'django_auth_openid.auth.OpenIDBackend' to AUTHENTICATION_BACKENDS. This should be in addition to the default ModelBackend: AUTHENTICATION_BACKENDS = ( 'django_openid_auth.auth.OpenIDBackend', 'django.contrib.auth.backends.ModelBackend', )
To create users automatically when a new OpenID is used, add the following to the settings: OPENID_CREATE_USERS = True
To have user details updated from OpenID Simple Registration or Attribute Exchange extension data each time they log in, add the following: OPENID_UPDATE_DETAILS_FROM_SREG = True
Hook up the login URLs to your application’s urlconf with something like: urlpatterns = patterns('', ... (r'^openid/', include('django_openid_auth.urls')), ... )
Configure the LOGIN_URL and LOGIN_REDIRECT_URL appropriately for your site: LOGIN_URL = '/openid/login/' LOGIN_REDIRECT_URL = '/' This will allow pages that use the standard @login_required decorator to use the OpenID login page.
Rerun "python manage.py syncdb" to add the UserOpenID table to your database.
Support
This library supports the Launchpad Teams OpenID extension. Using this feature, it is possible to map Launchpad team memberships to Django group memberships. It can be configured with:. When a user logs in, they will be added or removed from the relevant teams listed in the mapping. If you have already django-groups and want to map these groups automatically, you can use the OPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO variable in your settings.py file. If you use OPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO, the variable OPENID_LAUNCHPAD_TEAMS_MAPPING will be ignored. If you want to exclude some groups from the auto mapping, use OPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO_BLACKLIST. This variable has only an effect if OPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO is True.
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page