This repository has been archived by the owner on Sep 10, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 87
[authentication] Add RadiusToken #232
Labels
Comments
Hi Fed |
If there's an abstract model in DRF we can inherit from then yes, otherwise we can make a new one. |
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
May 24, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
May 26, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
May 26, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
May 26, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
May 26, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 7, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 7, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 7, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 7, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 14, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 14, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 14, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 24, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 29, 2019
Vivekrajput20
added a commit
to Vivekrajput20/django-freeradius
that referenced
this issue
Jun 29, 2019
nemesifier
added a commit
that referenced
this issue
Jul 5, 2019
[authentication] Add RadiusToken #232
2stacks
pushed a commit
to 2stacks/django-freeradius
that referenced
this issue
Nov 15, 2019
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
The idea of creating a temporary token to use as a password in captive portals is very handy, but now we are using the rest framework Token model to perform the authorization in freeradius, but in order to completely separate the authentication of a user on the frontend apps that consume the openwisp API and the authorization of users in the wifi service, we should introduce a new
RadiusToken
model that will be dedicated to this purpose, tokens will be disposable: they are generated during authentication of the user and once they are used (in the freeradius authorize view) they are thrown away.The text was updated successfully, but these errors were encountered: