GitXplorerGitXplorer
u

pwned-passwords-django

public
125 stars
7 forks
1 issues

Commits

List of commits on branch trunk.
Unverified
c764c68261660635e46a8e068e3409b7c931de65

Update pre-commit hooks.

uubernostrum committed 5 months ago
Unverified
8ad8a68c242e2b5480fbbf8e8b3bcec3a6b90941

Release 5.1.0.

uubernostrum committed 5 months ago
Unverified
49b7b96badcd02c398f305baaed4af6d2687440d

Begin testing against Django 5.1.

uubernostrum committed 5 months ago
Unverified
97a0c4b670f5449b016409b4fdb7bc018df6e9a9

Release 5.0.0.

uubernostrum committed 8 months ago
Unverified
435511d3ce71662eaa87ef310430fe085785c1e9

Expand/reorganize documentation.

uubernostrum committed 8 months ago
Unverified
a32d7f60d2efdc59bac413ef94e3068b898db4dd

Fix formatting in docs header.

uubernostrum committed 8 months ago

README

The README file for this repository.
CI status image

pwned-passwords-django provides helpers for working with the Pwned Passwords database from Have I Been Pwned in Django powered sites. Pwned Passwords is an extremely large database of passwords known to have been compromised through data breaches, and is useful as a tool for rejecting common or weak passwords.

There are three main components to this application:

All three use a secure, anonymized API which never transmits any password or its full hash to any third party.

Usage

The recommended configuration is to enable both the validator and the automatic password-checking middleware. To do this, make the following changes to your Django settings.

First, add the validator to your AUTH_PASSWORD_VALIDATORS list:

AUTH_PASSWORD_VALIDATORS = [
    # ... other password validators ...
    {
        "NAME": "pwned_passwords_django.validators.PwnedPasswordsValidator",
    },
]

Then, add the middleware to your MIDDLEWARE list:

MIDDLEWARE = [
    # .. other middlewares ...
    "pwned_passwords_django.middleware.pwned_passwords_middleware",
]

For more details, consult the full documentation.