1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
|
flask-paranoid
==============
[](https://github.com/miguelgrinberg/flask-paranoid/actions) [](https://codecov.io/gh/miguelgrinberg/flask-paranoid)
Simple user session protection.
Quick Start
-----------
Here is a simple application that uses Flask-Paranoid to protect the user session:
```python
from flask import Flask
from flask_paranoid import Paranoid
app = Flask(__name__)
app.config['SECRET_KEY'] = 'top-secret!'
paranoid = Paranoid(app)
paranoid.redirect_view = '/'
@app.route('/')
def index():
return render_template('index.html')
```
When a client connects to this application, a "paranoid" token will be
generated according to the IP address and user agent. In all subsequent
requests, the token will be recalculated and checked against the one computed
for the first request. If the session cookie is stolen and the attacker tries
to use it from another location, the generated token will be different, and in
that case the extension will clear the session and block the request.
Resources
---------
- [Documentation](http://pythonhosted.org/Flask-Paranoid)
- [PyPI](https://pypi.python.org/pypi/flask-paranoid)
- [Change Log](https://github.com/miguelgrinberg/flask-paranoid/blob/main/CHANGES.md)
|