2005-10-22 08:12:56 +08:00
|
|
|
=============================
|
|
|
|
User authentication in Django
|
|
|
|
=============================
|
|
|
|
|
|
|
|
Django comes with a user authentication system. It handles user accounts,
|
|
|
|
groups, permissions and cookie-based user sessions. This document explains how
|
|
|
|
things work.
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Overview
|
|
|
|
========
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
The auth system consists of:
|
|
|
|
|
|
|
|
* Users
|
|
|
|
* Permissions: Binary (yes/no) flags designating whether a user may perform
|
|
|
|
a certain task.
|
|
|
|
* Groups: A generic way of applying labels and permissions to more than one
|
|
|
|
user.
|
|
|
|
* Messages: A simple way to queue messages for given users.
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Installation
|
|
|
|
============
|
|
|
|
|
|
|
|
Authentication support is bundled as a Django application in
|
|
|
|
``django.contrib.auth``. To install it, do the following:
|
|
|
|
|
|
|
|
1. Put ``'django.contrib.auth'`` in your ``INSTALLED_APPS`` setting.
|
|
|
|
2. Run the command ``manage.py syncdb``.
|
|
|
|
|
|
|
|
Note that the default ``settings.py`` file created by
|
|
|
|
``django-admin.py startproject`` includes ``'django.contrib.auth'`` in
|
|
|
|
``INSTALLED_APPS`` for convenience. If your ``INSTALLED_APPS`` already contains
|
|
|
|
``'django.contrib.auth'``, feel free to run ``manage.py syncdb`` again; you
|
|
|
|
can run that command as many times as you'd like, and each time it'll only
|
|
|
|
install what's needed.
|
|
|
|
|
|
|
|
The ``syncdb`` command creates the necessary database tables, creates
|
|
|
|
permission objects for all installed apps that need 'em, and prompts you to
|
2006-05-05 11:08:29 +08:00
|
|
|
create a superuser account the first time you run it.
|
2006-05-02 09:31:56 +08:00
|
|
|
|
|
|
|
Once you've taken those steps, that's it.
|
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
Users
|
|
|
|
=====
|
|
|
|
|
|
|
|
Users are represented by a standard Django model, which lives in
|
2006-05-02 09:31:56 +08:00
|
|
|
`django/contrib/auth/models.py`_.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
.. _django/contrib/auth/models.py: http://code.djangoproject.com/browser/django/trunk/django/contrib/auth/models.py
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
API reference
|
|
|
|
-------------
|
|
|
|
|
|
|
|
Fields
|
|
|
|
~~~~~~
|
|
|
|
|
|
|
|
``User`` objects have the following fields:
|
|
|
|
|
|
|
|
* ``username`` -- Required. 30 characters or fewer. Alphanumeric characters
|
|
|
|
only (letters, digits and underscores).
|
|
|
|
* ``first_name`` -- Optional. 30 characters or fewer.
|
|
|
|
* ``last_name`` -- Optional. 30 characters or fewer.
|
|
|
|
* ``email`` -- Optional. E-mail address.
|
2005-11-21 11:33:22 +08:00
|
|
|
* ``password`` -- Required. A hash of, and metadata about, the password.
|
|
|
|
(Django doesn't store the raw password.) Raw passwords can be arbitrarily
|
|
|
|
long and can contain any character. See the "Passwords" section below.
|
2005-10-22 08:12:56 +08:00
|
|
|
* ``is_staff`` -- Boolean. Designates whether this user can access the
|
|
|
|
admin site.
|
2006-09-29 21:37:58 +08:00
|
|
|
* ``is_active`` -- Boolean. Designates whether this account can be used
|
|
|
|
to log in. Set this flag to ``False`` instead of deleting accounts.
|
2005-11-21 00:35:44 +08:00
|
|
|
* ``is_superuser`` -- Boolean. Designates that this user has all permissions
|
|
|
|
without explicitly assigning them.
|
2005-10-22 08:18:39 +08:00
|
|
|
* ``last_login`` -- A datetime of the user's last login. Is set to the
|
|
|
|
current date/time by default.
|
2005-10-22 08:12:56 +08:00
|
|
|
* ``date_joined`` -- A datetime designating when the account was created.
|
2005-10-22 08:18:39 +08:00
|
|
|
Is set to the current date/time by default when the account is created.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
Methods
|
|
|
|
~~~~~~~
|
|
|
|
|
|
|
|
``User`` objects have two many-to-many fields: ``groups`` and
|
2006-05-02 09:31:56 +08:00
|
|
|
``user_permissions``. ``User`` objects can access their related
|
|
|
|
objects in the same way as any other `Django model`_::
|
|
|
|
|
2006-09-12 02:32:45 +08:00
|
|
|
myuser.groups = [group_list]
|
|
|
|
myuser.groups.add(group, group,...)
|
|
|
|
myuser.groups.remove(group, group,...)
|
|
|
|
myuser.groups.clear()
|
|
|
|
myuser.permissions = [permission_list]
|
|
|
|
myuser.permissions.add(permission, permission, ...)
|
|
|
|
myuser.permissions.remove(permission, permission, ...]
|
|
|
|
myuser.permissions.clear()
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
In addition to those automatic API methods, ``User`` objects have the following
|
2006-05-02 09:31:56 +08:00
|
|
|
custom methods:
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
* ``is_anonymous()`` -- Always returns ``False``. This is a way of
|
2006-07-19 10:09:26 +08:00
|
|
|
differentiating ``User`` and ``AnonymousUser`` objects. Generally, you
|
|
|
|
should prefer using ``is_authenticated()`` to this method.
|
|
|
|
|
|
|
|
* ``is_authenticated()`` -- Always returns ``True``. This is a way to
|
2006-09-30 09:21:03 +08:00
|
|
|
tell if the user has been authenticated. This does not imply any
|
|
|
|
permissions, and doesn't check if the user is active - it only indicates
|
|
|
|
that the user has provided a valid username and password.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
* ``get_full_name()`` -- Returns the ``first_name`` plus the ``last_name``,
|
|
|
|
with a space in between.
|
|
|
|
|
|
|
|
* ``set_password(raw_password)`` -- Sets the user's password to the given
|
2006-05-02 09:31:56 +08:00
|
|
|
raw string, taking care of the password hashing. Doesn't save the
|
|
|
|
``User`` object.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
* ``check_password(raw_password)`` -- Returns ``True`` if the given raw
|
2006-05-02 09:31:56 +08:00
|
|
|
string is the correct password for the user. (This takes care of the
|
|
|
|
password hashing in making the comparison.)
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
* ``get_group_permissions()`` -- Returns a list of permission strings that
|
|
|
|
the user has, through his/her groups.
|
|
|
|
|
|
|
|
* ``get_all_permissions()`` -- Returns a list of permission strings that
|
|
|
|
the user has, both through group and user permissions.
|
|
|
|
|
|
|
|
* ``has_perm(perm)`` -- Returns ``True`` if the user has the specified
|
2005-11-21 00:35:44 +08:00
|
|
|
permission, where perm is in the format ``"package.codename"``.
|
2006-09-30 09:21:03 +08:00
|
|
|
If the user is inactive, this method will always return ``False``.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
* ``has_perms(perm_list)`` -- Returns ``True`` if the user has each of the
|
2005-11-21 00:35:44 +08:00
|
|
|
specified permissions, where each perm is in the format
|
2006-09-30 09:21:03 +08:00
|
|
|
``"package.codename"``. If the user is inactive, this method will
|
|
|
|
always return ``False``.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
* ``has_module_perms(package_name)`` -- Returns ``True`` if the user has
|
|
|
|
any permissions in the given package (the Django app label).
|
2006-09-30 09:21:03 +08:00
|
|
|
If the user is inactive, this method will always return ``False``.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
* ``get_and_delete_messages()`` -- Returns a list of ``Message`` objects in
|
|
|
|
the user's queue and deletes the messages from the queue.
|
|
|
|
|
|
|
|
* ``email_user(subject, message, from_email=None)`` -- Sends an e-mail to
|
|
|
|
the user. If ``from_email`` is ``None``, Django uses the
|
|
|
|
`DEFAULT_FROM_EMAIL`_ setting.
|
|
|
|
|
|
|
|
* ``get_profile()`` -- Returns a site-specific profile for this user.
|
2006-05-02 09:31:56 +08:00
|
|
|
Raises ``django.contrib.auth.models.SiteProfileNotAvailable`` if the current site
|
2005-10-22 08:12:56 +08:00
|
|
|
doesn't allow profiles.
|
|
|
|
|
|
|
|
.. _Django model: http://www.djangoproject.com/documentation/model_api/
|
|
|
|
.. _DEFAULT_FROM_EMAIL: http://www.djangoproject.com/documentation/settings/#default-from-email
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Manager functions
|
|
|
|
~~~~~~~~~~~~~~~~~
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
The ``User`` model has a custom manager that has the following helper functions:
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
* ``create_user(username, email, password)`` -- Creates, saves and returns
|
|
|
|
a ``User``. The ``username``, ``email`` and ``password`` are set as
|
|
|
|
given, and the ``User`` gets ``is_active=True``.
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
See _`Creating users` for example usage.
|
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
* ``make_random_password(length=10, allowed_chars='abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789')``
|
2006-05-02 09:31:56 +08:00
|
|
|
Returns a random password with the given length and given string of
|
2005-10-22 08:12:56 +08:00
|
|
|
allowed characters. (Note that the default value of ``allowed_chars``
|
|
|
|
doesn't contain ``"I"`` or letters that look like it, to avoid user
|
|
|
|
confusion.
|
|
|
|
|
|
|
|
Basic usage
|
|
|
|
-----------
|
|
|
|
|
|
|
|
Creating users
|
|
|
|
~~~~~~~~~~~~~~
|
|
|
|
|
2006-03-29 05:37:59 +08:00
|
|
|
The most basic way to create users is to use the ``create_user`` helper
|
|
|
|
function that comes with Django::
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
>>> from django.contrib.auth.models import User
|
|
|
|
>>> user = User.objects.create_user('john', 'lennon@thebeatles.com', 'johnpassword')
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
# At this point, user is a User object ready to be saved
|
|
|
|
# to the database. You can continue to change its attributes
|
|
|
|
# if you want to change other fields.
|
2006-03-29 05:37:59 +08:00
|
|
|
>>> user.is_staff = True
|
|
|
|
>>> user.save()
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
Changing passwords
|
|
|
|
~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Change a password with ``set_password()``::
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
>>> from django.contrib.auth.models import User
|
|
|
|
>>> u = User.objects.get(username__exact='john')
|
2005-10-22 08:12:56 +08:00
|
|
|
>>> u.set_password('new password')
|
|
|
|
>>> u.save()
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Don't set the ``password`` attribute directly unless you know what you're
|
|
|
|
doing. This is explained in the next section.
|
2006-03-29 05:37:59 +08:00
|
|
|
|
2005-11-21 11:33:22 +08:00
|
|
|
Passwords
|
|
|
|
---------
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
The ``password`` attribute of a ``User`` object is a string in this format::
|
2005-11-21 11:33:22 +08:00
|
|
|
|
|
|
|
hashtype$salt$hash
|
|
|
|
|
|
|
|
That's hashtype, salt and hash, separated by the dollar-sign character.
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Hashtype is either ``sha1`` (default) or ``md5`` -- the algorithm used to
|
|
|
|
perform a one-way hash of the password. Salt is a random string used to salt
|
|
|
|
the raw password to create the hash.
|
2005-11-21 11:33:22 +08:00
|
|
|
|
|
|
|
For example::
|
|
|
|
|
|
|
|
sha1$a1976$a36cc8cbf81742a8fb52e221aaeab48ed7f58ab4
|
|
|
|
|
|
|
|
The ``User.set_password()`` and ``User.check_password()`` functions handle
|
|
|
|
the setting and checking of these values behind the scenes.
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Previous Django versions, such as 0.90, used simple MD5 hashes without password
|
|
|
|
salts. For backwards compatibility, those are still supported; they'll be
|
|
|
|
converted automatically to the new style the first time ``check_password()``
|
|
|
|
works correctly for a given user.
|
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
Anonymous users
|
|
|
|
---------------
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
``django.contrib.auth.models.AnonymousUser`` is a class that implements
|
2006-05-15 19:33:17 +08:00
|
|
|
the ``django.contrib.auth.models.User`` interface, with these differences:
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2005-11-14 07:33:05 +08:00
|
|
|
* ``id`` is always ``None``.
|
2005-10-22 08:12:56 +08:00
|
|
|
* ``is_anonymous()`` returns ``True`` instead of ``False``.
|
2006-07-19 10:09:26 +08:00
|
|
|
* ``is_authenticated()`` returns ``False`` instead of ``True``.
|
2005-10-22 08:12:56 +08:00
|
|
|
* ``has_perm()`` always returns ``False``.
|
2006-05-02 09:31:56 +08:00
|
|
|
* ``set_password()``, ``check_password()``, ``save()``, ``delete()``,
|
|
|
|
``set_groups()`` and ``set_permissions()`` raise ``NotImplementedError``.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
In practice, you probably won't need to use ``AnonymousUser`` objects on your
|
|
|
|
own, but they're used by Web requests, as explained in the next section.
|
|
|
|
|
2006-05-05 11:08:29 +08:00
|
|
|
Creating superusers
|
|
|
|
-------------------
|
|
|
|
|
|
|
|
``manage.py syncdb`` prompts you to create a superuser the first time you run
|
|
|
|
it after adding ``'django.contrib.auth'`` to your ``INSTALLED_APPS``. But if
|
|
|
|
you need to create a superuser after that via the command line, you can use the
|
|
|
|
``create_superuser.py`` utility. Just run this command::
|
|
|
|
|
|
|
|
python /path/to/django/contrib/auth/create_superuser.py
|
|
|
|
|
|
|
|
Make sure to substitute ``/path/to/`` with the path to the Django codebase on
|
|
|
|
your filesystem.
|
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
Authentication in Web requests
|
|
|
|
==============================
|
|
|
|
|
|
|
|
Until now, this document has dealt with the low-level APIs for manipulating
|
2006-05-02 09:31:56 +08:00
|
|
|
authentication-related objects. On a higher level, Django can hook this
|
2005-10-22 08:12:56 +08:00
|
|
|
authentication framework into its system of `request objects`_.
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
First, install the ``SessionMiddleware`` and ``AuthenticationMiddleware``
|
|
|
|
middlewares by adding them to your ``MIDDLEWARE_CLASSES`` setting. See the
|
|
|
|
`session documentation`_ for more information.
|
|
|
|
|
|
|
|
Once you have those middlewares installed, you'll be able to access
|
|
|
|
``request.user`` in views. ``request.user`` will give you a ``User`` object
|
2005-10-22 08:12:56 +08:00
|
|
|
representing the currently logged-in user. If a user isn't currently logged in,
|
|
|
|
``request.user`` will be set to an instance of ``AnonymousUser`` (see the
|
2006-07-19 10:09:26 +08:00
|
|
|
previous section). You can tell them apart with ``is_authenticated()``, like so::
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-07-19 10:09:26 +08:00
|
|
|
if request.user.is_authenticated():
|
|
|
|
# Do something for authenticated users.
|
2005-10-22 08:12:56 +08:00
|
|
|
else:
|
2006-07-19 10:09:26 +08:00
|
|
|
# Do something for anonymous users.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
.. _request objects: http://www.djangoproject.com/documentation/request_response/#httprequest-objects
|
2005-11-09 02:45:03 +08:00
|
|
|
.. _session documentation: http://www.djangoproject.com/documentation/sessions/
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-02-10 23:27:36 +08:00
|
|
|
How to log a user in
|
2006-02-10 23:28:31 +08:00
|
|
|
--------------------
|
2006-02-10 23:27:36 +08:00
|
|
|
|
2006-07-03 10:12:24 +08:00
|
|
|
Django provides two functions in ``django.contrib.auth``: ``authenticate()``
|
|
|
|
and ``login()``.
|
2006-06-29 00:37:02 +08:00
|
|
|
|
2006-07-03 10:12:24 +08:00
|
|
|
To authenticate a given username and password, use ``authenticate()``. It
|
|
|
|
takes two keyword arguments, ``username`` and ``password``, and it returns
|
|
|
|
a ``User`` object if the password is valid for the given username. If the
|
|
|
|
password is invalid, ``authenticate()`` returns ``None``. Example::
|
|
|
|
|
|
|
|
from django.contrib.auth import authenticate
|
|
|
|
user = authenticate(username='john', password='secret')
|
2006-06-29 00:37:02 +08:00
|
|
|
if user is not None:
|
2006-09-30 09:21:03 +08:00
|
|
|
if user.is_active:
|
|
|
|
print "You provided a correct username and password!"
|
|
|
|
else:
|
|
|
|
print "Your account has been disabled!"
|
2006-07-03 10:12:24 +08:00
|
|
|
else:
|
|
|
|
print "Your username and password were incorrect."
|
|
|
|
|
|
|
|
To log a user in, in a view, use ``login()``. It takes an ``HttpRequest``
|
|
|
|
object and a ``User`` object. ``login()`` saves the user's ID in the session,
|
|
|
|
using Django's session framework, so, as mentioned above, you'll need to make
|
|
|
|
sure to have the session middleware installed.
|
|
|
|
|
|
|
|
This example shows how you might use both ``authenticate()`` and ``login()``::
|
|
|
|
|
|
|
|
from django.contrib.auth import authenticate, login
|
|
|
|
|
|
|
|
def my_view(request):
|
|
|
|
username = request.POST['username']
|
|
|
|
password = request.POST['password']
|
|
|
|
user = authenticate(username=username, password=password)
|
|
|
|
if user is not None:
|
2006-09-30 09:21:03 +08:00
|
|
|
if user.is_active:
|
|
|
|
login(request, user)
|
|
|
|
# Redirect to a success page.
|
|
|
|
else:
|
|
|
|
# Return a 'disabled account' error message
|
2006-07-03 10:12:24 +08:00
|
|
|
else:
|
2006-09-30 09:21:03 +08:00
|
|
|
# Return a 'invalid login' error message.
|
2006-07-03 10:12:24 +08:00
|
|
|
|
|
|
|
How to log a user out
|
|
|
|
---------------------
|
|
|
|
|
|
|
|
To log out a user who has been logged in via ``django.contrib.auth.login()``,
|
|
|
|
use ``django.contrib.auth.logout()`` within your view. It takes an
|
|
|
|
``HttpRequest`` object and has no return value. Example::
|
|
|
|
|
|
|
|
from django.contrib.auth import logout
|
2006-06-29 00:37:02 +08:00
|
|
|
|
2006-07-03 10:12:24 +08:00
|
|
|
def logout_view(request):
|
|
|
|
logout(request)
|
|
|
|
# Redirect to a success page.
|
2006-02-10 23:27:36 +08:00
|
|
|
|
2006-07-03 10:12:24 +08:00
|
|
|
Note that ``logout()`` doesn't throw any errors if the user wasn't logged in.
|
2006-02-10 23:27:36 +08:00
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
Limiting access to logged-in users
|
|
|
|
----------------------------------
|
|
|
|
|
|
|
|
The raw way
|
|
|
|
~~~~~~~~~~~
|
|
|
|
|
|
|
|
The simple, raw way to limit access to pages is to check
|
2006-07-19 10:09:26 +08:00
|
|
|
``request.user.is_authenticated()`` and either redirect to a login page::
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.http import HttpResponseRedirect
|
2005-10-22 08:18:39 +08:00
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
def my_view(request):
|
2006-07-19 10:09:26 +08:00
|
|
|
if not request.user.is_authenticated():
|
2005-10-22 08:12:56 +08:00
|
|
|
return HttpResponseRedirect('/login/?next=%s' % request.path)
|
|
|
|
# ...
|
|
|
|
|
2005-10-22 08:18:39 +08:00
|
|
|
...or display an error message::
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
def my_view(request):
|
2006-07-19 10:09:26 +08:00
|
|
|
if not request.user.is_authenticated():
|
2006-05-02 09:31:56 +08:00
|
|
|
return render_to_response('myapp/login_error.html')
|
2005-10-22 08:12:56 +08:00
|
|
|
# ...
|
|
|
|
|
|
|
|
The login_required decorator
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
As a shortcut, you can use the convenient ``login_required`` decorator::
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.contrib.auth.decorators import login_required
|
2005-10-22 08:18:39 +08:00
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
def my_view(request):
|
|
|
|
# ...
|
|
|
|
my_view = login_required(my_view)
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Here's an equivalent example, using the more compact decorator syntax
|
|
|
|
introduced in Python 2.4::
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.contrib.auth.decorators import login_required
|
2005-10-22 08:18:39 +08:00
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
@login_required
|
|
|
|
def my_view(request):
|
|
|
|
# ...
|
|
|
|
|
|
|
|
``login_required`` does the following:
|
|
|
|
|
|
|
|
* If the user isn't logged in, redirect to ``/accounts/login/``, passing
|
|
|
|
the current absolute URL in the query string as ``next``. For example:
|
|
|
|
``/accounts/login/?next=/polls/3/``.
|
|
|
|
* If the user is logged in, execute the view normally. The view code is
|
|
|
|
free to assume the user is logged in.
|
|
|
|
|
2006-05-22 10:46:55 +08:00
|
|
|
Note that you'll need to map the appropriate Django view to ``/accounts/login/``.
|
|
|
|
To do this, add the following line to your URLconf::
|
|
|
|
|
|
|
|
(r'^accounts/login/$', 'django.contrib.auth.views.login'),
|
|
|
|
|
|
|
|
Here's what ``django.contrib.auth.views.login`` does::
|
|
|
|
|
|
|
|
* If called via ``GET``, it displays a login form that POSTs to the same
|
|
|
|
URL. More on this in a bit.
|
|
|
|
|
|
|
|
* If called via ``POST``, it tries to log the user in. If login is
|
|
|
|
successful, the view redirects to the URL specified in ``next``. If
|
|
|
|
``next`` isn't provided, it redirects to ``/accounts/profile/`` (which is
|
|
|
|
currently hard-coded). If login isn't successful, it redisplays the login
|
|
|
|
form.
|
|
|
|
|
|
|
|
It's your responsibility to provide the login form in a template called
|
2006-06-06 13:16:05 +08:00
|
|
|
``registration/login.html`` by default. This template gets passed three
|
|
|
|
template context variables:
|
2006-05-22 10:46:55 +08:00
|
|
|
|
|
|
|
* ``form``: A ``FormWrapper`` object representing the login form. See the
|
|
|
|
`forms documentation`_ for more on ``FormWrapper`` objects.
|
|
|
|
* ``next``: The URL to redirect to after successful login. This may contain
|
|
|
|
a query string, too.
|
|
|
|
* ``site_name``: The name of the current ``Site``, according to the
|
2006-05-22 12:48:44 +08:00
|
|
|
``SITE_ID`` setting. See the `site framework docs`_.
|
2006-05-22 10:46:55 +08:00
|
|
|
|
2006-06-06 13:16:05 +08:00
|
|
|
If you'd prefer not to call the template ``registration/login.html``, you can
|
|
|
|
pass the ``template_name`` parameter via the extra arguments to the view in
|
|
|
|
your URLconf. For example, this URLconf line would use ``myapp/login.html``
|
|
|
|
instead::
|
|
|
|
|
|
|
|
(r'^accounts/login/$', 'django.contrib.auth.views.login', {'template_name': 'myapp/login.html'}),
|
|
|
|
|
2006-05-22 10:46:55 +08:00
|
|
|
Here's a sample ``registration/login.html`` template you can use as a starting
|
|
|
|
point. It assumes you have a ``base.html`` template that defines a ``content``
|
|
|
|
block::
|
|
|
|
|
|
|
|
{% extends "base.html" %}
|
|
|
|
|
|
|
|
{% block content %}
|
|
|
|
|
|
|
|
{% if form.has_errors %}
|
|
|
|
<p>Your username and password didn't match. Please try again.</p>
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
<form method="post" action=".">
|
|
|
|
<table>
|
|
|
|
<tr><td><label for="id_username">Username:</label></td><td>{{ form.username }}</td></tr>
|
|
|
|
<tr><td><label for="id_password">Password:</label></td><td>{{ form.password }}</td></tr>
|
|
|
|
</table>
|
|
|
|
|
|
|
|
<input type="submit" value="login" />
|
|
|
|
<input type="hidden" name="next" value="{{ next }}" />
|
|
|
|
</form>
|
|
|
|
|
|
|
|
{% endblock %}
|
|
|
|
|
|
|
|
.. _forms documentation: http://www.djangoproject.com/documentation/forms/
|
2006-05-22 12:48:44 +08:00
|
|
|
.. _site framework docs: http://www.djangoproject.com/documentation/sites/
|
2006-05-22 10:46:55 +08:00
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
Limiting access to logged-in users that pass a test
|
|
|
|
---------------------------------------------------
|
|
|
|
|
2005-11-09 02:45:03 +08:00
|
|
|
To limit access based on certain permissions or some other test, you'd do
|
|
|
|
essentially the same thing as described in the previous section.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
The simple way is to run your test on ``request.user`` in the view directly.
|
|
|
|
For example, this view checks to make sure the user is logged in and has the
|
|
|
|
permission ``polls.can_vote``::
|
|
|
|
|
|
|
|
def my_view(request):
|
2006-07-19 10:09:26 +08:00
|
|
|
if not (request.user.is_authenticated() and request.user.has_perm('polls.can_vote')):
|
2005-10-22 08:12:56 +08:00
|
|
|
return HttpResponse("You can't vote in this poll.")
|
|
|
|
# ...
|
|
|
|
|
|
|
|
As a shortcut, you can use the convenient ``user_passes_test`` decorator::
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.contrib.auth.decorators import user_passes_test
|
2005-10-22 08:18:39 +08:00
|
|
|
|
2005-11-21 00:35:44 +08:00
|
|
|
def my_view(request):
|
|
|
|
# ...
|
2005-11-26 15:02:59 +08:00
|
|
|
my_view = user_passes_test(lambda u: u.has_perm('polls.can_vote'))(my_view)
|
2005-11-21 00:35:44 +08:00
|
|
|
|
2006-09-26 01:33:17 +08:00
|
|
|
We're using this particular test as a relatively simple example. However, if
|
|
|
|
you just want to test whether a permission is available to a user, you can use
|
|
|
|
the ``permission_required()`` decorator, described later in this document.
|
2006-09-22 09:44:28 +08:00
|
|
|
|
2005-11-21 00:35:44 +08:00
|
|
|
Here's the same thing, using Python 2.4's decorator syntax::
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.contrib.auth.decorators import user_passes_test
|
2005-11-21 00:35:44 +08:00
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
@user_passes_test(lambda u: u.has_perm('polls.can_vote'))
|
|
|
|
def my_view(request):
|
|
|
|
# ...
|
|
|
|
|
|
|
|
``user_passes_test`` takes a required argument: a callable that takes a
|
|
|
|
``User`` object and returns ``True`` if the user is allowed to view the page.
|
2005-10-22 08:18:39 +08:00
|
|
|
Note that ``user_passes_test`` does not automatically check that the ``User``
|
|
|
|
is not anonymous.
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-01-11 08:11:29 +08:00
|
|
|
``user_passes_test()`` takes an optional ``login_url`` argument, which lets you
|
|
|
|
specify the URL for your login page (``/accounts/login/`` by default).
|
2005-11-26 15:20:07 +08:00
|
|
|
|
|
|
|
Example in Python 2.3 syntax::
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.contrib.auth.decorators import user_passes_test
|
2005-11-26 15:20:07 +08:00
|
|
|
|
|
|
|
def my_view(request):
|
|
|
|
# ...
|
|
|
|
my_view = user_passes_test(lambda u: u.has_perm('polls.can_vote'), login_url='/login/')(my_view)
|
|
|
|
|
|
|
|
Example in Python 2.4 syntax::
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.contrib.auth.decorators import user_passes_test
|
2005-11-26 15:20:07 +08:00
|
|
|
|
|
|
|
@user_passes_test(lambda u: u.has_perm('polls.can_vote'), login_url='/login/')
|
|
|
|
def my_view(request):
|
|
|
|
# ...
|
|
|
|
|
2006-09-22 09:44:28 +08:00
|
|
|
The permission_required decorator
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
2006-09-26 01:33:17 +08:00
|
|
|
**New in Django development version**
|
|
|
|
|
|
|
|
It's a relatively common task to check whether a user has a particular
|
|
|
|
permission. For that reason, Django provides a shortcut for that case: the
|
|
|
|
``permission_required()`` decorator. Using this decorator, the earlier example
|
|
|
|
can be written as::
|
2006-09-22 09:44:28 +08:00
|
|
|
|
|
|
|
from django.contrib.auth.decorators import permission_required
|
2006-09-26 01:33:17 +08:00
|
|
|
|
2006-09-22 09:44:28 +08:00
|
|
|
def my_view(request):
|
|
|
|
# ...
|
|
|
|
my_view = permission_required('polls.can_vote')(my_view)
|
|
|
|
|
|
|
|
Note that ``permission_required()`` also takes an optional ``login_url``
|
2006-09-26 01:33:17 +08:00
|
|
|
parameter. Example::
|
|
|
|
|
|
|
|
from django.contrib.auth.decorators import permission_required
|
|
|
|
|
|
|
|
def my_view(request):
|
|
|
|
# ...
|
|
|
|
my_view = permission_required('polls.can_vote', login_url='/loginpage/')(my_view)
|
|
|
|
|
|
|
|
As in the ``login_required`` decorator, ``login_url`` defaults to
|
|
|
|
``'/accounts/login/'``.
|
2006-09-22 09:44:28 +08:00
|
|
|
|
2005-11-13 12:48:52 +08:00
|
|
|
Limiting access to generic views
|
|
|
|
--------------------------------
|
|
|
|
|
|
|
|
To limit access to a `generic view`_, write a thin wrapper around the view,
|
|
|
|
and point your URLconf to your wrapper instead of the generic view itself.
|
|
|
|
For example::
|
|
|
|
|
|
|
|
from django.views.generic.date_based import object_detail
|
|
|
|
|
|
|
|
@login_required
|
|
|
|
def limited_object_detail(*args, **kwargs):
|
|
|
|
return object_detail(*args, **kwargs)
|
|
|
|
|
|
|
|
.. _generic view: http://www.djangoproject.com/documentation/generic_views/
|
|
|
|
|
2005-11-09 02:45:03 +08:00
|
|
|
Permissions
|
|
|
|
===========
|
|
|
|
|
|
|
|
Django comes with a simple permissions system. It provides a way to assign
|
|
|
|
permissions to specific users and groups of users.
|
|
|
|
|
|
|
|
It's used by the Django admin site, but you're welcome to use it in your own
|
|
|
|
code.
|
|
|
|
|
|
|
|
The Django admin site uses permissions as follows:
|
|
|
|
|
|
|
|
* Access to view the "add" form and add an object is limited to users with
|
|
|
|
the "add" permission for that type of object.
|
|
|
|
* Access to view the change list, view the "change" form and change an
|
|
|
|
object is limited to users with the "change" permission for that type of
|
|
|
|
object.
|
|
|
|
* Access to delete an object is limited to users with the "delete"
|
|
|
|
permission for that type of object.
|
|
|
|
|
|
|
|
Permissions are set globally per type of object, not per specific object
|
|
|
|
instance. For example, it's possible to say "Mary may change news stories," but
|
|
|
|
it's not currently possible to say "Mary may change news stories, but only the
|
|
|
|
ones she created herself" or "Mary may only change news stories that have a
|
2006-05-02 09:31:56 +08:00
|
|
|
certain status, publication date or ID." The latter functionality is something
|
2005-11-09 02:45:03 +08:00
|
|
|
Django developers are currently discussing.
|
|
|
|
|
|
|
|
Default permissions
|
|
|
|
-------------------
|
|
|
|
|
|
|
|
Three basic permissions -- add, create and delete -- are automatically created
|
2006-05-02 09:31:56 +08:00
|
|
|
for each Django model that has a ``class Admin`` set. Behind the scenes, these
|
|
|
|
permissions are added to the ``auth_permission`` database table when you run
|
|
|
|
``manage.py syncdb``.
|
|
|
|
|
|
|
|
Note that if your model doesn't have ``class Admin`` set when you run
|
|
|
|
``syncdb``, the permissions won't be created. If you initialize your database
|
|
|
|
and add ``class Admin`` to models after the fact, you'll need to run
|
2006-05-15 19:33:17 +08:00
|
|
|
``manage.py syncdb`` again. It will create any missing permissions for
|
2006-05-02 09:31:56 +08:00
|
|
|
all of your installed apps.
|
2005-11-09 02:45:03 +08:00
|
|
|
|
|
|
|
Custom permissions
|
|
|
|
------------------
|
|
|
|
|
|
|
|
To create custom permissions for a given model object, use the ``permissions``
|
2006-05-02 09:31:56 +08:00
|
|
|
`model Meta attribute`_.
|
2005-11-09 02:45:03 +08:00
|
|
|
|
|
|
|
This example model creates three custom permissions::
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
class USCitizen(models.Model):
|
2005-11-09 02:45:03 +08:00
|
|
|
# ...
|
2006-05-02 09:31:56 +08:00
|
|
|
class Meta:
|
2005-11-09 02:45:03 +08:00
|
|
|
permissions = (
|
|
|
|
("can_drive", "Can drive"),
|
|
|
|
("can_vote", "Can vote in elections"),
|
|
|
|
("can_drink", "Can drink alcohol"),
|
|
|
|
)
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
The only thing this does is create those extra permissions when you run
|
|
|
|
``syncdb``.
|
|
|
|
|
|
|
|
.. _model Meta attribute: http://www.djangoproject.com/documentation/model_api/#meta-options
|
2005-11-09 02:45:03 +08:00
|
|
|
|
|
|
|
API reference
|
|
|
|
-------------
|
|
|
|
|
|
|
|
Just like users, permissions are implemented in a Django model that lives in
|
2006-05-02 09:31:56 +08:00
|
|
|
`django/contrib/auth/models.py`_.
|
|
|
|
|
|
|
|
.. _django/contrib/auth/models.py: http://code.djangoproject.com/browser/django/trunk/django/contrib/auth/models.py
|
2005-11-09 02:45:03 +08:00
|
|
|
|
|
|
|
Fields
|
|
|
|
~~~~~~
|
|
|
|
|
|
|
|
``Permission`` objects have the following fields:
|
|
|
|
|
|
|
|
* ``name`` -- Required. 50 characters or fewer. Example: ``'Can vote'``.
|
2006-05-02 09:31:56 +08:00
|
|
|
* ``content_type`` -- Required. A reference to the ``django_content_type``
|
|
|
|
database table, which contains a record for each installed Django model.
|
2005-11-09 02:45:03 +08:00
|
|
|
* ``codename`` -- Required. 100 characters or fewer. Example: ``'can_vote'``.
|
|
|
|
|
|
|
|
Methods
|
|
|
|
~~~~~~~
|
|
|
|
|
|
|
|
``Permission`` objects have the standard data-access methods like any other
|
2006-05-15 19:33:17 +08:00
|
|
|
`Django model`_.
|
2005-11-09 02:45:03 +08:00
|
|
|
|
|
|
|
Authentication data in templates
|
|
|
|
================================
|
|
|
|
|
|
|
|
The currently logged-in user and his/her permissions are made available in the
|
2006-05-02 09:31:56 +08:00
|
|
|
`template context`_ when you use ``RequestContext``.
|
2005-11-09 02:45:03 +08:00
|
|
|
|
2005-12-24 12:39:59 +08:00
|
|
|
.. admonition:: Technicality
|
|
|
|
|
|
|
|
Technically, these variables are only made available in the template context
|
2006-05-02 09:31:56 +08:00
|
|
|
if you use ``RequestContext`` *and* your ``TEMPLATE_CONTEXT_PROCESSORS``
|
2005-12-24 12:39:59 +08:00
|
|
|
setting contains ``"django.core.context_processors.auth"``, which is default.
|
2006-05-02 09:31:56 +08:00
|
|
|
For more, see the `RequestContext docs`_.
|
2005-12-24 12:39:59 +08:00
|
|
|
|
2006-06-29 11:57:01 +08:00
|
|
|
.. _RequestContext docs: http://www.djangoproject.com/documentation/templates_python/#subclassing-context-requestcontext
|
2005-12-24 12:39:59 +08:00
|
|
|
|
2005-11-09 02:45:03 +08:00
|
|
|
Users
|
|
|
|
-----
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
The currently logged-in user, either a ``User`` instance or an``AnonymousUser``
|
2005-11-09 02:45:03 +08:00
|
|
|
instance, is stored in the template variable ``{{ user }}``::
|
2005-10-22 08:12:56 +08:00
|
|
|
|
2006-07-19 10:09:26 +08:00
|
|
|
{% if user.is_authenticated %}
|
2006-09-26 01:33:17 +08:00
|
|
|
<p>Welcome, {{ user.username }}. Thanks for logging in.</p>
|
2005-11-09 02:45:03 +08:00
|
|
|
{% else %}
|
2006-07-19 10:09:26 +08:00
|
|
|
<p>Welcome, new user. Please log in.</p>
|
2005-11-09 02:45:03 +08:00
|
|
|
{% endif %}
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
Permissions
|
2005-11-09 02:45:03 +08:00
|
|
|
-----------
|
|
|
|
|
|
|
|
The currently logged-in user's permissions are stored in the template variable
|
2005-12-24 12:39:59 +08:00
|
|
|
``{{ perms }}``. This is an instance of ``django.core.context_processors.PermWrapper``,
|
2005-11-09 02:45:03 +08:00
|
|
|
which is a template-friendly proxy of permissions.
|
|
|
|
|
|
|
|
In the ``{{ perms }}`` object, single-attribute lookup is a proxy to
|
|
|
|
``User.has_module_perms``. This example would display ``True`` if the logged-in
|
|
|
|
user had any permissions in the ``foo`` app::
|
|
|
|
|
|
|
|
{{ perms.foo }}
|
|
|
|
|
|
|
|
Two-level-attribute lookup is a proxy to ``User.has_perm``. This example would
|
|
|
|
display ``True`` if the logged-in user had the permission ``foo.can_vote``::
|
|
|
|
|
|
|
|
{{ perms.foo.can_vote }}
|
|
|
|
|
|
|
|
Thus, you can check permissions in template ``{% if %}`` statements::
|
|
|
|
|
|
|
|
{% if perms.foo %}
|
|
|
|
<p>You have permission to do something in the foo app.</p>
|
|
|
|
{% if perms.foo.can_vote %}
|
|
|
|
<p>You can vote!</p>
|
|
|
|
{% endif %}
|
|
|
|
{% if perms.foo.can_drive %}
|
|
|
|
<p>You can drive!</p>
|
|
|
|
{% endif %}
|
|
|
|
{% else %}
|
|
|
|
<p>You don't have permission to do anything in the foo app.</p>
|
|
|
|
{% endif %}
|
|
|
|
|
2005-11-13 02:15:26 +08:00
|
|
|
.. _template context: http://www.djangoproject.com/documentation/templates_python/
|
2005-10-22 08:12:56 +08:00
|
|
|
|
|
|
|
Groups
|
|
|
|
======
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Groups are a generic way of categorizing users so you can apply permissions, or
|
|
|
|
some other label, to those users. A user can belong to any number of groups.
|
2005-11-09 02:45:03 +08:00
|
|
|
|
|
|
|
A user in a group automatically has the permissions granted to that group. For
|
|
|
|
example, if the group ``Site editors`` has the permission
|
|
|
|
``can_edit_home_page``, any user in that group will have that permission.
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Beyond permissions, groups are a convenient way to categorize users to give
|
|
|
|
them some label, or extended functionality. For example, you could create a
|
|
|
|
group ``'Special users'``, and you could write code that could, say, give them
|
|
|
|
access to a members-only portion of your site, or send them members-only e-mail
|
|
|
|
messages.
|
2005-11-09 02:45:03 +08:00
|
|
|
|
2005-10-22 08:12:56 +08:00
|
|
|
Messages
|
|
|
|
========
|
2005-11-09 02:45:03 +08:00
|
|
|
|
|
|
|
The message system is a lightweight way to queue messages for given users.
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
A message is associated with a ``User``. There's no concept of expiration or
|
2005-11-09 02:45:03 +08:00
|
|
|
timestamps.
|
|
|
|
|
|
|
|
Messages are used by the Django admin after successful actions. For example,
|
|
|
|
``"The poll Foo was created successfully."`` is a message.
|
|
|
|
|
2006-09-22 20:53:51 +08:00
|
|
|
The API is simple:
|
2005-11-09 02:45:03 +08:00
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
* To create a new message, use
|
|
|
|
``user_obj.message_set.create(message='message_text')``.
|
|
|
|
* To retrieve/delete messages, use ``user_obj.get_and_delete_messages()``,
|
2005-11-09 02:45:03 +08:00
|
|
|
which returns a list of ``Message`` objects in the user's queue (if any)
|
|
|
|
and deletes the messages from the queue.
|
|
|
|
|
|
|
|
In this example view, the system saves a message for the user after creating
|
|
|
|
a playlist::
|
|
|
|
|
|
|
|
def create_playlist(request, songs):
|
|
|
|
# Create the playlist with the given songs.
|
|
|
|
# ...
|
2006-05-02 09:31:56 +08:00
|
|
|
request.user.message_set.create(message="Your playlist was added successfully.")
|
|
|
|
return render_to_response("playlists/create.html",
|
|
|
|
context_instance=RequestContext(request))
|
2005-11-09 02:45:03 +08:00
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
When you use ``RequestContext``, the currently logged-in user and his/her
|
2005-11-09 02:45:03 +08:00
|
|
|
messages are made available in the `template context`_ as the template variable
|
|
|
|
``{{ messages }}``. Here's an example of template code that displays messages::
|
|
|
|
|
|
|
|
{% if messages %}
|
|
|
|
<ul>
|
|
|
|
{% for message in messages %}
|
|
|
|
<li>{{ message.message }}</li>
|
|
|
|
{% endfor %}
|
|
|
|
</ul>
|
|
|
|
{% endif %}
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
Note that ``RequestContext`` calls ``get_and_delete_messages`` behind the
|
2005-11-09 02:45:03 +08:00
|
|
|
scenes, so any messages will be deleted even if you don't display them.
|
2005-11-10 02:07:06 +08:00
|
|
|
|
|
|
|
Finally, note that this messages framework only works with users in the user
|
|
|
|
database. To send messages to anonymous users, use the `session framework`_.
|
|
|
|
|
|
|
|
.. _session framework: http://www.djangoproject.com/documentation/sessions/
|
2006-06-29 00:37:02 +08:00
|
|
|
|
2006-07-02 23:24:49 +08:00
|
|
|
Other authentication sources
|
2006-06-29 00:37:02 +08:00
|
|
|
============================
|
|
|
|
|
2006-07-03 10:12:24 +08:00
|
|
|
The authentication that comes with Django is good enough for most common cases,
|
|
|
|
but you may have the need to hook into another authentication source -- that
|
|
|
|
is, another source of usernames and passwords or authentication methods.
|
2006-06-29 00:37:02 +08:00
|
|
|
|
2006-07-03 10:12:24 +08:00
|
|
|
For example, your company may already have an LDAP setup that stores a username
|
|
|
|
and password for every employee. It'd be a hassle for both the network
|
|
|
|
administrator and the users themselves if users had separate accounts in LDAP
|
|
|
|
and the Django-based applications.
|
2006-06-29 00:37:02 +08:00
|
|
|
|
2006-07-03 10:12:24 +08:00
|
|
|
So, to handle situations like this, the Django authentication system lets you
|
|
|
|
plug in another authentication sources. You can override Django's default
|
|
|
|
database-based scheme, or you can use the default system in tandem with other
|
|
|
|
systems.
|
|
|
|
|
|
|
|
Specifying authentication backends
|
|
|
|
----------------------------------
|
|
|
|
|
|
|
|
Behind the scenes, Django maintains a list of "authentication backends" that it
|
|
|
|
checks for authentication. When somebody calls
|
|
|
|
``django.contrib.auth.authenticate()`` -- as described in "How to log a user in"
|
|
|
|
above -- Django tries authenticating across all of its authentication backends.
|
|
|
|
If the first authentication method fails, Django tries the second one, and so
|
|
|
|
on, until all backends have been attempted.
|
|
|
|
|
|
|
|
The list of authentication backends to use is specified in the
|
|
|
|
``AUTHENTICATION_BACKENDS`` setting. This should be a tuple of Python path
|
|
|
|
names that point to Python classes that know how to authenticate. These classes
|
|
|
|
can be anywhere on your Python path.
|
|
|
|
|
|
|
|
By default, ``AUTHENTICATION_BACKENDS`` is set to::
|
|
|
|
|
|
|
|
('django.contrib.auth.backends.ModelBackend',)
|
|
|
|
|
|
|
|
That's the basic authentication scheme that checks the Django users database.
|
|
|
|
|
|
|
|
The order of ``AUTHENTICATION_BACKENDS`` matters, so if the same username and
|
|
|
|
password is valid in multiple backends, Django will stop processing at the
|
|
|
|
first positive match.
|
2006-06-29 00:37:02 +08:00
|
|
|
|
|
|
|
Writing an authentication backend
|
|
|
|
---------------------------------
|
|
|
|
|
2006-07-02 23:24:49 +08:00
|
|
|
An authentication backend is a class that implements two methods:
|
2006-07-03 10:12:24 +08:00
|
|
|
``get_user(id)`` and ``authenticate(**credentials)``.
|
|
|
|
|
|
|
|
The ``get_user`` method takes an ``id`` -- which could be a username, database
|
|
|
|
ID or whatever -- and returns a ``User`` object.
|
|
|
|
|
|
|
|
The ``authenticate`` method takes credentials as keyword arguments. Most of
|
|
|
|
the time, it'll just look like this::
|
2006-06-29 00:37:02 +08:00
|
|
|
|
|
|
|
class MyBackend:
|
|
|
|
def authenticate(username=None, password=None):
|
2006-07-03 10:12:24 +08:00
|
|
|
# Check the username/password and return a User.
|
2006-06-29 00:37:02 +08:00
|
|
|
|
2006-07-02 23:24:49 +08:00
|
|
|
But it could also authenticate a token, like so::
|
2006-06-29 00:37:02 +08:00
|
|
|
|
|
|
|
class MyBackend:
|
|
|
|
def authenticate(token=None):
|
2006-07-03 10:12:24 +08:00
|
|
|
# Check the token and return a User.
|
2006-06-29 00:37:02 +08:00
|
|
|
|
2006-07-03 10:12:24 +08:00
|
|
|
Either way, ``authenticate`` should check the credentials it gets, and it
|
|
|
|
should return a ``User`` object that matches those credentials, if the
|
|
|
|
credentials are valid. If they're not valid, it should return ``None``.
|
2006-06-29 00:37:02 +08:00
|
|
|
|
2006-07-02 23:24:49 +08:00
|
|
|
The Django admin system is tightly coupled to the Django ``User`` object
|
|
|
|
described at the beginning of this document. For now, the best way to deal with
|
|
|
|
this is to create a Django ``User`` object for each user that exists for your
|
2006-07-03 10:12:24 +08:00
|
|
|
backend (e.g., in your LDAP directory, your external SQL database, etc.) You
|
|
|
|
can either write a script to do this in advance, or your ``authenticate``
|
|
|
|
method can do it the first time a user logs in.
|
2006-07-02 23:24:49 +08:00
|
|
|
|
|
|
|
Here's an example backend that authenticates against a username and password
|
|
|
|
variable defined in your ``settings.py`` file and creates a Django ``User``
|
|
|
|
object the first time a user authenticates::
|
2006-06-29 00:37:02 +08:00
|
|
|
|
|
|
|
from django.conf import settings
|
|
|
|
from django.contrib.auth.models import User, check_password
|
|
|
|
|
|
|
|
class SettingsBackend:
|
|
|
|
"""
|
2006-07-03 10:12:24 +08:00
|
|
|
Authenticate against the settings ADMIN_LOGIN and ADMIN_PASSWORD.
|
|
|
|
|
|
|
|
Use the login name, and a hash of the password. For example:
|
2006-06-29 00:37:02 +08:00
|
|
|
|
|
|
|
ADMIN_LOGIN = 'admin'
|
|
|
|
ADMIN_PASSWORD = 'sha1$4e987$afbcf42e21bd417fb71db8c66b321e9fc33051de'
|
|
|
|
"""
|
|
|
|
def authenticate(self, username=None, password=None):
|
|
|
|
login_valid = (settings.ADMIN_LOGIN == username)
|
|
|
|
pwd_valid = check_password(password, settings.ADMIN_PASSWORD)
|
|
|
|
if login_valid and pwd_valid:
|
|
|
|
try:
|
|
|
|
user = User.objects.get(username=username)
|
|
|
|
except User.DoesNotExist:
|
2006-07-02 23:24:49 +08:00
|
|
|
# Create a new user. Note that we can set password
|
|
|
|
# to anything, because it won't be checked; the password
|
|
|
|
# from settings.py will.
|
2006-06-29 00:37:02 +08:00
|
|
|
user = User(username=username, password='get from settings.py')
|
|
|
|
user.is_staff = True
|
|
|
|
user.is_superuser = True
|
|
|
|
user.save()
|
|
|
|
return user
|
|
|
|
return None
|
|
|
|
|
|
|
|
def get_user(self, user_id):
|
|
|
|
try:
|
|
|
|
return User.objects.get(pk=user_id)
|
|
|
|
except User.DoesNotExist:
|
|
|
|
return None
|