skip to navigation
skip to content

Not Logged In

django-pci-auth 0.0.6

PCI-compliant authentication application for Django 1.4+. Uses "best of" existing libraries then fills in the gaps.


Django 1.4+ with SSL only


Currently this application validates password fields via un-encrypted AJAX communication, use with SSL only! In the future this application may encrypt its AJAX communication via some JavaScript encryption library TBD.

This library integrates the current Django "best of" PCI auth libraries into a single application then fills in the gaps. Filling in the gaps involves making decisions for you e.g.:

And adding additional functionality e.g.:

  • Database models to persist event data e.g. lockouts (See: docs/MODELS.rst).
  • Additional recently_used validator for django-passwords.


  • Stronger password hashing that allows for selection of hashing algorithm scrypt, bcrypt, PBKDF2, etc. via [1]
  • Checking for strong passwords with a default length setting overrideable in [2]
  • Integrate strong passwords into Django Admin.
  • Lock out account for n minutes after x failed log-in attempts. [3]
  • Set inactivity timeouts.
  • Generate event/email when lock-out occurs.
  • Set flags disallowing certain accounts to be locked out.
  • Log every log-on and explicit log-out (not necessary to log timed out log-ins).
  • Track last four passwords and do not allow re-use. [4]
  • Force password reset after X amount of time.
  • Provide JavaScript to check for strong passwords inline. [5]


Before you use this library in your applications you may wish to demo its functionality. To do so, follow these steps:

$ virtualenv .
$ bin/pip install django-pci-auth
$ bin/ syncdb --settings=django_pci_auth.settings
$ bin/ runserver --settings=django_pci_auth.settings



Stronger password hashing

This is a built-in feature in Django 1.4+. Documented here for convenience:

    # From
    # "[redacted] This means that Django will use the first hash in the list
    # to store all passwords, but will support checking passwords stored with
    # the rest of the hashes in the list. If you remove a hash from the list
    # it will no longer be supported.

Password Reuse

How many old passwords will you store? This feature will prevent users from using the same passwords over and over again; it will keep the last OLD_PASSWORD_STORAGE_NUM number of passwords around and remove anything older. E.g.:



Feature overview (via index view)

Password length enforcement (with AJAX validation)

Failed login attempts log

Recently used password log


This software is licensed under the same BSD license that Django itself is licensed under. See: LICENSE.


[1]This feature is included with Django 1.4+
[2]This feature is provided by django-passwords
[3]This feature is provided by django-axes


0.0.6 (2012-12-05)

  • Add a note re: SSL [aclark]

0.0.5 (2012-12-04)

  • Feature complete [aclark]

0.0.4 (2012-11-28)

  • Pre-release, includes most features promised. [aclark]
File Type Py Version Uploaded on Size (md5) Source 2012-12-05 311KB
  • Downloads (All Versions):
  • 6 downloads in the last day
  • 82 downloads in the last week
  • 497 downloads in the last month