All Questions
Tagged with pythonauthentication
12 questions
0votes
0answers
258views
store strings in db with asymmetric encryption for a python app keeping the data secure
I'm designing an app that receives sensitive data input from a user and that data needs to be saved securely in a database. As far as I understand it needs asymmetric encryption but since this app has ...
15votes
3answers
3kviews
Does python's pip provide cryptographic authentication and integrity validation?
Does python's pip package manager cryptographically validate its payload's authentication and integrity for all packages after downloading them and before installing them? I see a lot of guides ...
3votes
1answer
3kviews
Proper implementation of JWT authentication in mobile app
I'm building a mobile app that connects to a Python Flask API and backend. Currently, I am using JWTs for authentication. The expiration of the token is set to be 6 months in advance. The thing ...
1vote
0answers
390views
Is it secure to start a NTLM handshake not knowing if the server supports it?
I am writing a program in Python using the requests-ntlm library. That library adds support for NTLM in regular requests: import requests from requests_ntlm import HttpNtlmAuth requests.get("http://...
0votes
1answer
796views
django-python3-ldap Does TLS Encrypt AD Passwords When Site is Hosted on http
I have implemented django-python3-ldap and integrated AD with my Django project. The project will be hosted on IIS as an intranet site that is served solely over http. I am deciding between using this ...
0votes
1answer
378views
Authenticating services with PKI (pycrypto)
so I'm trying to solve an issue at work. We have a popular key value store which does security via tokens. The kv store issues a specific token which dictates which clients can query which keys. I ...
5votes
1answer
2kviews
How to to make a file private by securing the url that only authenticated users can see
I was wondering if there is a way to secure an image or a file to be hidden when it is not authenticated. Suppose there is an image in my website which can only be seen if that user is authenticated. ...
6votes
1answer
2kviews
Unusual design aspects of AWS HMAC-based authentication, v4
I am designing a RESTful API in python. I want to use HMAC authentication. I could not find any suitable HMAC libraries, so I am rolling my own. However I want to use a well-known standard such as AWS ...
5votes
1answer
6kviews
Using client certificates for website authentication
I was wondering if there currently exists a Content Management System that supports PKI and client certificates for website authentication instead of username/passwords. If not, what's a good place to ...
2votes
1answer
237views
After having confirmed a computer is infected by a Botnet.
And having found a server IP that is controlling it. How can I find out the log-in credentials this client uses to log in to a IRC channel / server webpage / control panel. I have found out a python ...
-3votes
1answer
1kviews
What are some good user login/authentication libraries or protocols to use with Python on Google App Engine? [closed]
I've read elsewhere (http://forums.udacity.com/questions/6028436/bcrypt-not-suitable-for-pythongae) that bcrypt is not suitable for use on Google App Engine. What are some good ways to create a user ...
3votes
3answers
3kviews
Proper Linux user authentication through PAM aware applications
Currently I'm building an authentication system using Linux PAM for a python daemon process. It will need to authenticate remote users from a variety of front-ends against the local user list. (...