django-axes/docs/7_architecture.rst
2019-05-01 18:28:29 +03:00

130 lines
5 KiB
ReStructuredText

.. _architecture:
Architecture
============
Axes is based on the existing Django authentication backend
architecture and framework for recognizing users and aims to be
compatible with the stock design and implementation of Django
while offering extensibility and configurability for using the
Axes authentication monitoring and logging for users of the package
as well as 3rd party package vendors such as Django REST Framework,
Django Allauth, Python Social Auth and so forth.
The development of custom 3rd party package support are active goals,
but you should check the up-to-date documentation and implementation
of Axes for current compatibility before using Axes with custom solutions
and make sure that authentication monitoring is working correctly.
This document describes the Django authentication flow
and how Axes augments it to achieve authentication and login
monitoring and lock users out on too many access attempts.
Django authentication flow
--------------------------
When a user tries to log in in Django, the login is usually performed
by running a number of authentication backends that check user login
information by calling the ``django.contrib.auth.authenticate`` function.
If an authentication backend does not approve of a user login,
it can raise a ``django.core.exceptions.PermissionDenied`` exception.
If a login fails, Django then fires a
``from django.contrib.auth.signals.user_login_failed`` signal.
If this signal raises an exception, it is propagated through the
Django middleware stack where it can be caught, or alternatively
where it can bubble up to the default Django exception handlers.
A normal login flow for Django runs as follows:
.. code-block:: text
1. Login view is called by, for example,
a user sending form data with browser.
2. django.contrib.auth.authenticate is called by
the view code to check the authentication request
for credentials and return a user object matching them.
3. AUTHENTICATION_BACKENDS are iterated over
and their authenticate methods called one-by-one.
4. An authentication backend either returns
a user object which results in that user
being logged in or returns None.
If a PermissionDenied error is raised
by any of the authentication backends
the whole request authentication flow
is aborted and signal handlers triggered.
Django authentication flow with Axes
------------------------------------
Axes monitors logins with the ``user_login_failed`` signal handler
and after login attempts exceed the given maximum, starts blocking them.
Django emits the ``user_login_failed`` signal when an authentication backend
either raises the PermissionDenied signal or alternatively no authentication backend
manages to recognize a given authentication request and return a user for it.
The blocking is done by ``AxesBackend`` which checks every request
coming through the Django authentication flow and verifies they
are not blocked, and allows the requests to go through if the check passes.
If any of the checks fails, an exception is raised which interrupts
the login process and triggers the Django login failed signal handlers.
Another exception is raised by a Axes signal handler, which is
then caught by ``AxesMiddleware`` and converted into a readable
error because the user is currently locked out of the system.
Axes implements the lockout flow as follows:
.. code-block:: text
1. Login view is called.
2. django.contrib.auth.authenticate is called.
3. AUTHENTICATION_BACKENDS are iterated over
where axes.backends.AxesBackend is the first.
4. AxesBackend checks authentication request
for lockout rules and either aborts the
authentication flow or lets the authentication
process proceed to the next configured
authentication backend in the list.
[Axes handler runs at this this stage if appropriate]
5. If the user authentication request fails due to
any reason, e.g. a lockout or wrong credentials,
Axes receives authentication failure information
via the axes.signals.handle_user_login_failed signal.
6. The selected Axes handler is run to check
the user login failure statistics and rules.
[Axes default handler implements these steps]
7. Axes logs the failure and increments the failure
counters which keep track of failure statistics.
8. AxesSignalPermissionDenied exception is raised
if appropriate and it bubbles up the middleware stack.
The exception aborts the Django authentication flow.
9. AxesMiddleware processes the exception
and returns a readable lockout message to the user.
This plugin assumes that the login views either call
the ``django.contrib.auth.authenticate`` method to log in users
or otherwise take care of notifying Axes of authentication
attempts or login failures the same way Django does.
The login flows can be customized and the Axes
authentication backend or middleware can be easily swapped.