GitXplorerGitXplorer
u

pwned-passwords-django

public
125 stars
7 forks
1 issues

Commits

List of commits on branch trunk.
Unverified
cb0f978b4f0835893f5d11c57bf1587a820f56b8

Clean up versions in pyproject.toml.

uubernostrum committed 2 months ago
Unverified
112e409fdec59a149c6c344551a002ef42d24208

Minor modernizations.

uubernostrum committed 2 months ago
Unverified
8e9bcbb91b297aebe11123c758a84106c9e445d0

Release 5.1.1.

uubernostrum committed 2 months ago
Unverified
31fbdd04189de5df2b4defdf26bf997ed6dec886

Don't scan git history in docs spellcheck.

uubernostrum committed 2 months ago
Unverified
fb31e637b8eb11b28fef14c3b5f36c6f4277f6db

Start working on 5.1.1.

uubernostrum committed 2 months ago
Unverified
acaf8e7cb6d6a6bddd20d1d9a9357f74ba6e7d6e

Correct comment in noxfile.

uubernostrum committed 5 months ago

README

The README file for this repository.
CI status image

pwned-passwords-django provides helpers for working with the Pwned Passwords database from Have I Been Pwned in Django powered sites. Pwned Passwords is an extremely large database of passwords known to have been compromised through data breaches, and is useful as a tool for rejecting common or weak passwords.

There are three main components to this application:

All three use a secure, anonymized API which never transmits any password or its full hash to any third party.

Usage

The recommended configuration is to enable both the validator and the automatic password-checking middleware. To do this, make the following changes to your Django settings.

First, add the validator to your AUTH_PASSWORD_VALIDATORS list:

AUTH_PASSWORD_VALIDATORS = [
    # ... other password validators ...
    {
        "NAME": "pwned_passwords_django.validators.PwnedPasswordsValidator",
    },
]

Then, add the middleware to your MIDDLEWARE list:

MIDDLEWARE = [
    # .. other middlewares ...
    "pwned_passwords_django.middleware.pwned_passwords_middleware",
]

For more details, consult the full documentation.