Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use session to store user validation #8

Merged
merged 2 commits into from
Sep 5, 2013
Merged

Conversation

krukowski
Copy link
Contributor

Passing the user param to the verify_computer view through a url param was a security hole.

Bouke added a commit that referenced this pull request Sep 5, 2013
Use session to store user validation
@Bouke Bouke merged commit d8496f2 into jazzband:develop Sep 5, 2013
@Bouke
Copy link
Collaborator

Bouke commented Sep 5, 2013

Looks good, thanks for contributing!

@Bouke
Copy link
Collaborator

Bouke commented Sep 5, 2013

@mkruk45 What made you choose django-two-factor auth over the package django-otp, which is more feature-complete?

@krukowski
Copy link
Contributor Author

I simply hadn't found that package. Also, after looking it over a bit, it doesn't seem to provide an easy way to switch an existing app over to a system which enables users to make two-factor verification necessary to authenticate at all. It appears that for django-otp, verification is completely separate from authentication, so that use-case isn't very easily supported.

roffel added a commit to peperzaken/django-two-factor-auth that referenced this pull request Jul 3, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants