Django 1.11.x Documentationprotection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance protection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance how a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t0 码力 | 2747 页 | 2.67 MB | 1 年前3
Django 2.2.x Documentationprotection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance protection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance how a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t0 码力 | 2915 页 | 2.83 MB | 1 年前3
Django 2.1.x Documentationprotection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance protection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance how a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t0 码力 | 2790 页 | 2.71 MB | 1 年前3
Django 2.0.x Documentationprotection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance protection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance how a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t0 码力 | 2746 页 | 2.67 MB | 1 年前3
Django 1.10.x Documentationprotection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance how a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t including the redirect_field_name if it is set. Session invalidation on password change Session verification is enabled and mandatory in Django 1.10 (there’s no way to disable it) regardless of whether or0 码力 | 2538 页 | 2.59 MB | 1 年前3
Django 4.2.x Documentationprotection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Referrer policy Cross-origin opener policy Session security User-uploaded protection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Referrer policy Cross-origin opener policy Session security User-uploaded how a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t0 码力 | 3305 页 | 3.16 MB | 1 年前3
Django 4.1.x Documentationprotection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Referrer policy Cross-origin opener policy Session security User-uploaded protection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Referrer policy Cross-origin opener policy Session security User-uploaded how a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t0 码力 | 3240 页 | 3.13 MB | 1 年前3
Django 1.8.x Documentationprotection Cross site request forgery (CSRF) protection SQL injection protection Clickjacking protection SSL/HTTPS Host header validation Session security User-uploaded content Additional security topics Performance MIDDLEWARE_CLASSES. It’s included if settings.py was generated by startproject on Django ≥ 1.7. Session verification will become mandatory in Django 1.10 regardless of whether or not SessionAuthenticationMiddleware SessionAuthenticationMiddleware, any users who have not logged in and had their session updated with the verification hash will have their existing session invalidated and be required to login. Note Since get_session_auth_hash()0 码力 | 2454 页 | 2.85 MB | 1 年前3
Django 1.11.x Documentationhow a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t including the redirect_field_name if it is set. Session invalidation on password change Session verification is enabled and mandatory in Django 1.10 (there’s no way to disable it) regardless of whether or settings, if set, are used to authenticate to the SMTP server, and the EMAIL_USE_TLS and EMAIL_USE_SSL settings control whether a secure connection is used. Note: The character set of email sent with django0 码力 | 1878 页 | 6.40 MB | 1 年前3
Django 2.1.x Documentationhow a user logged in aren’t important. Unlike login(), this method skips the authentication and verification steps: inactive users (is_active=False) are permitted to login and the user’s credentials don’t settings, if set, are used to authenticate to the SMTP server, and the EMAIL_USE_TLS and EMAIL_USE_SSL settings control whether a secure connection is used. Note: The character set of email sent with django port=None, username=None, password=None, use_tls=None, fail_silently=False, use_ssl=None, time- out=None, ssl_keyfile=None, ssl_certfile=None, **kwargs) This is the default backend. Email will be sent through0 码力 | 1910 页 | 6.49 MB | 1 年前3
共 36 条
- 1
- 2
- 3
- 4













