forked from alexkuhl/django-failedloginblocker
-
Notifications
You must be signed in to change notification settings - Fork 0
A project that uses overrides the Django authentication function to track failed login attempts on a per-user basis. Will block user access after a specified number of failed logins is reached.
License
drewvolpe/django-failedloginblocker
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
A project that uses overrides the Django authentication function to track failed login attempts on a per-user basis. Code is based on BruteBuster (http://code.google.com/p/django-brutebuster/) but is simplified because of the dropped requirement of tracking IP addresses. Django-Axes is another source of inspiration (http://code.google.com/p/django-axes/). Installation 1. Add failedloginblocker to your INSTALLED_APPS list in settings.py 2. Run 'python manage.py syncdb' 3. Restart your web server, if necessary. Settings (set in settings.py if you want to override the defaults) FLB_MAX_FAILURES - Number of failures to allow before blocking logins. Default is set to 5. FLB_BLOCK_INTERVAL - The interval from the last failed attempt to determine whether the current login attempt is to count as a failure. By default, decorators.py clears the failed logins if this interval has expired. Default is set to 1440 minutes (or 1 day).
About
A project that uses overrides the Django authentication function to track failed login attempts on a per-user basis. Will block user access after a specified number of failed logins is reached.
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Languages
- Python 100.0%