mirror of
https://gh.wpcy.net/https://github.com/WeblateOrg/weblate.git
synced 2026-05-01 03:03:39 +08:00
621 lines
18 KiB
ReStructuredText
621 lines
18 KiB
ReStructuredText
Authentication
|
|
==============
|
|
|
|
User registration
|
|
-----------------
|
|
|
|
The default setup for Weblate is to use python-social-auth, a form on the website
|
|
to handle registration of new users. After confirming their e-mail a new user can
|
|
contribute or authenticate by using one of the third party services.
|
|
|
|
You can also turn off registration of new users using
|
|
:setting:`REGISTRATION_OPEN`.
|
|
|
|
The authentication attempts are subject to :ref:`rate-limit`.
|
|
|
|
|
|
Authentication backends
|
|
-----------------------
|
|
|
|
The built-in solution of Django is used for authentication,
|
|
including various social options to do so.
|
|
Using it means you can import the user database of other Django-based projects
|
|
(see :ref:`pootle-migration`).
|
|
|
|
Django can additionally be set up to authenticate against other means too.
|
|
|
|
.. seealso::
|
|
|
|
:ref:`docker-auth` describes how to configure authentication in the official
|
|
Docker image.
|
|
|
|
Social authentication
|
|
---------------------
|
|
|
|
Thanks to :doc:`psa:index`, Weblate support authentication using many third
|
|
party services such as GitLab, Ubuntu, Fedora, etc.
|
|
|
|
Please check their documentation for generic configuration instructions
|
|
in :doc:`psa:configuration/django`.
|
|
|
|
.. note::
|
|
|
|
By default, Weblate relies on third-party authentication services to
|
|
provide a validated e-mail address. If some of the services you want to use
|
|
don't support this, please enforce e-mail validation on the Weblate side
|
|
by configuring FORCE_EMAIL_VALIDATION for them. For example:
|
|
|
|
.. code-block:: python
|
|
|
|
SOCIAL_AUTH_OPENSUSE_FORCE_EMAIL_VALIDATION = True
|
|
|
|
.. seealso:: :doc:`psa:pipeline`
|
|
|
|
Enabling individual backends is quite easy, it's just a matter of adding an entry to
|
|
the :setting:`django:AUTHENTICATION_BACKENDS` setting and possibly adding keys needed for a given
|
|
authentication method. Please note that some backends do not provide user e-mail by
|
|
default, you have to request it explicitly, otherwise Weblate will not be able
|
|
to properly credit contributions users make.
|
|
|
|
.. seealso::
|
|
|
|
:doc:`Python Social Auth backend <psa:backends/index>`
|
|
|
|
OpenID authentication
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
For OpenID-based services it's usually just a matter of enabling them. The following
|
|
section enables OpenID authentication for OpenSUSE, Fedora and Ubuntu:
|
|
|
|
.. code-block:: python
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.email.EmailAuth",
|
|
"social_core.backends.suse.OpenSUSEOpenId",
|
|
"social_core.backends.ubuntu.UbuntuOpenId",
|
|
"social_core.backends.fedora.FedoraOpenId",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
.. seealso::
|
|
|
|
:doc:`psa:backends/openid`
|
|
|
|
.. _github_auth:
|
|
|
|
GitHub authentication
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
You need to register an OAuth application on GitHub and then tell Weblate all its secrets:
|
|
|
|
.. code-block:: python
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.github.GithubOAuth2",
|
|
"social_core.backends.email.EmailAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# Social auth backends setup
|
|
SOCIAL_AUTH_GITHUB_KEY = "GitHub Client ID"
|
|
SOCIAL_AUTH_GITHUB_SECRET = "GitHub Client Secret"
|
|
SOCIAL_AUTH_GITHUB_SCOPE = ["user:email"]
|
|
|
|
The GitHub should be configured to have callback URL as
|
|
``https://example.com/accounts/complete/github/``.
|
|
|
|
.. include:: /snippets/oauth-site.rst
|
|
|
|
.. seealso::
|
|
|
|
:doc:`psa:backends/github`
|
|
|
|
.. _bitbucket_auth:
|
|
|
|
Bitbucket authentication
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
You need to register an application on Bitbucket and then tell Weblate all its secrets:
|
|
|
|
.. code-block:: python
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.bitbucket.BitbucketOAuth",
|
|
"social_core.backends.email.EmailAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# Social auth backends setup
|
|
SOCIAL_AUTH_BITBUCKET_KEY = "Bitbucket Client ID"
|
|
SOCIAL_AUTH_BITBUCKET_SECRET = "Bitbucket Client Secret"
|
|
SOCIAL_AUTH_BITBUCKET_VERIFIED_EMAILS_ONLY = True
|
|
|
|
.. include:: /snippets/oauth-site.rst
|
|
|
|
.. seealso::
|
|
|
|
:doc:`psa:backends/bitbucket`
|
|
|
|
.. _google_auth:
|
|
|
|
Google OAuth 2
|
|
~~~~~~~~~~~~~~
|
|
|
|
To use Google OAuth 2, you need to register an application on
|
|
<https://console.developers.google.com/> and enable the Google+ API.
|
|
|
|
The redirect URL is ``https://WEBLATE SERVER/accounts/complete/google-oauth2/``
|
|
|
|
.. code-block:: python
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.google.GoogleOAuth2",
|
|
"social_core.backends.email.EmailAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# Social auth backends setup
|
|
SOCIAL_AUTH_GOOGLE_OAUTH2_KEY = "Client ID"
|
|
SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET = "Client secret"
|
|
|
|
.. include:: /snippets/oauth-site.rst
|
|
|
|
.. seealso::
|
|
|
|
:doc:`psa:backends/google`
|
|
|
|
.. _facebook_auth:
|
|
|
|
Facebook OAuth 2
|
|
~~~~~~~~~~~~~~~~
|
|
|
|
As per usual with OAuth 2 services, you need to register your application with
|
|
Facebook. Once this is done, you can set up Weblate to use it:
|
|
|
|
The redirect URL is ``https://WEBLATE SERVER/accounts/complete/facebook/``
|
|
|
|
.. code-block:: python
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.facebook.FacebookOAuth2",
|
|
"social_core.backends.email.EmailAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# Social auth backends setup
|
|
SOCIAL_AUTH_FACEBOOK_KEY = "key"
|
|
SOCIAL_AUTH_FACEBOOK_SECRET = "secret"
|
|
SOCIAL_AUTH_FACEBOOK_SCOPE = ["email", "public_profile"]
|
|
|
|
.. include:: /snippets/oauth-site.rst
|
|
|
|
.. seealso::
|
|
|
|
:doc:`psa:backends/facebook`
|
|
|
|
|
|
.. _gitlab_auth:
|
|
|
|
GitLab OAuth 2
|
|
~~~~~~~~~~~~~~
|
|
|
|
For using GitLab OAuth 2, you need to register an application on
|
|
<https://gitlab.com/profile/applications>.
|
|
|
|
The redirect URL is ``https://WEBLATE SERVER/accounts/complete/gitlab/`` and
|
|
ensure you mark the `read_user` scope.
|
|
|
|
.. code-block:: python
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.gitlab.GitLabOAuth2",
|
|
"social_core.backends.email.EmailAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# Social auth backends setup
|
|
SOCIAL_AUTH_GITLAB_KEY = "Application ID"
|
|
SOCIAL_AUTH_GITLAB_SECRET = "Secret"
|
|
SOCIAL_AUTH_GITLAB_SCOPE = ["read_user"]
|
|
|
|
# If you are using your own GitLab
|
|
# SOCIAL_AUTH_GITLAB_API_URL = 'https://gitlab.example.com/'
|
|
|
|
.. include:: /snippets/oauth-site.rst
|
|
|
|
.. seealso::
|
|
|
|
:doc:`psa:backends/gitlab`
|
|
|
|
.. _azure-auth:
|
|
|
|
Microsoft Azure Active Directory
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
Weblate can be configured to use common or specific tenants for authentication.
|
|
|
|
The redirect URL is ``https://WEBLATE SERVER/accounts/complete/azuread-oauth2/``
|
|
for common and ``https://WEBLATE SERVER/accounts/complete/azuread-tenant-oauth2/``
|
|
for tenant-specific authentication.
|
|
|
|
.. code-block:: python
|
|
|
|
# Azure AD common
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.azuread.AzureADOAuth2",
|
|
"social_core.backends.email.EmailAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# OAuth2 keys
|
|
SOCIAL_AUTH_AZUREAD_OAUTH2_KEY = ""
|
|
SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET = ""
|
|
|
|
.. code-block:: python
|
|
|
|
# Azure AD Tenant
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.azuread_tenant.AzureADTenantOAuth2",
|
|
"social_core.backends.email.EmailAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# OAuth2 keys
|
|
SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY = ""
|
|
SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET = ""
|
|
# Tenant ID
|
|
SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID = ""
|
|
|
|
.. include:: /snippets/oauth-site.rst
|
|
|
|
.. seealso::
|
|
|
|
:doc:`psa:backends/azuread`
|
|
|
|
.. _slack-auth:
|
|
|
|
Slack
|
|
~~~~~
|
|
|
|
For using Slack OAuth 2, you need to register an application on
|
|
<https://api.slack.com/apps>.
|
|
|
|
The redirect URL is ``https://WEBLATE SERVER/accounts/complete/slack/``.
|
|
|
|
.. code-block:: python
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.slack.SlackOAuth2",
|
|
"social_core.backends.email.EmailAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# Social auth backends setup
|
|
SOCIAL_AUTH_SLACK_KEY = ""
|
|
SOCIAL_AUTH_SLACK_SECRET = ""
|
|
|
|
.. include:: /snippets/oauth-site.rst
|
|
|
|
.. seealso::
|
|
|
|
:doc:`psa:backends/slack`
|
|
|
|
Turning off password authentication
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
E-mail and password authentication can be turned off by removing
|
|
``social_core.backends.email.EmailAuth`` from
|
|
:setting:`django:AUTHENTICATION_BACKENDS`. Always keep
|
|
``weblate.accounts.auth.WeblateUserBackend`` there, it is needed for core
|
|
Weblate functionality.
|
|
|
|
.. tip::
|
|
|
|
You can still use password authentication for the admin interface, for users you
|
|
manually create there. Just navigate to ``/admin/``.
|
|
|
|
For example authentication using only the openSUSE Open ID provider can be achieved
|
|
using the following:
|
|
|
|
.. code-block:: python
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.suse.OpenSUSEOpenId",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
Password authentication
|
|
-----------------------
|
|
|
|
The default :file:`settings.py` comes with a reasonable set of
|
|
:setting:`django:AUTH_PASSWORD_VALIDATORS`:
|
|
|
|
* Passwords can't be too similar to your other personal info.
|
|
* Passwords must contain at least 10 characters.
|
|
* Passwords can't be a commonly used password.
|
|
* Passwords can't be entirely numeric.
|
|
* Passwords can't consist of a single character or only whitespace.
|
|
* Passwords can't match a password you have used in the past.
|
|
|
|
You can customize this setting to match your password policy.
|
|
|
|
Additionally you can also install
|
|
`django-zxcvbn-password <https://pypi.org/project/django-zxcvbn-password/>`_
|
|
which gives quite realistic estimates of password difficulty and allows rejecting
|
|
passwords below a certain threshold.
|
|
|
|
.. _saml-auth:
|
|
|
|
SAML authentication
|
|
-------------------
|
|
|
|
.. versionadded:: 4.1.1
|
|
|
|
Please follow the Python Social Auth instructions for configuration. Notable differences:
|
|
|
|
* Weblate supports single IDP which has to be called ``weblate`` in
|
|
``SOCIAL_AUTH_SAML_ENABLED_IDPS``.
|
|
* The SAML XML metadata URL is ``/accounts/metadata/saml/``.
|
|
* Following settings are automatically filled in:
|
|
``SOCIAL_AUTH_SAML_SP_ENTITY_ID``, ``SOCIAL_AUTH_SAML_TECHNICAL_CONTACT``,
|
|
``SOCIAL_AUTH_SAML_SUPPORT_CONTACT``
|
|
|
|
Example configuration:
|
|
|
|
.. code-block::
|
|
|
|
# Authentication configuration
|
|
AUTHENTICATION_BACKENDS = (
|
|
"social_core.backends.email.EmailAuth",
|
|
"social_core.backends.saml.SAMLAuth",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# Social auth backends setup
|
|
SOCIAL_AUTH_SAML_SP_PUBLIC_CERT = "-----BEGIN CERTIFICATE-----"
|
|
SOCIAL_AUTH_SAML_SP_PRIVATE_KEY = "-----BEGIN PRIVATE KEY-----"
|
|
SOCIAL_AUTH_SAML_ENABLED_IDPS = {
|
|
"weblate": {
|
|
"entity_id": "https://idp.testshib.org/idp/shibboleth",
|
|
"url": "https://idp.testshib.org/idp/profile/SAML2/Redirect/SSO",
|
|
"x509cert": "MIIEDjCCAvagAwIBAgIBADA ... 8Bbnl+ev0peYzxFyF5sQA==",
|
|
"attr_name": "full_name",
|
|
"attr_username": "username",
|
|
"attr_email": "email",
|
|
}
|
|
}
|
|
|
|
.. seealso::
|
|
|
|
:ref:`Configuring SAML in Docker <docker-saml>`,
|
|
:doc:`psa:backends/saml`
|
|
|
|
.. _ldap-auth:
|
|
|
|
LDAP authentication
|
|
-------------------
|
|
|
|
LDAP authentication can be best achieved using the `django-auth-ldap` package. You
|
|
can install it via usual means:
|
|
|
|
.. code-block:: sh
|
|
|
|
# Using PyPI
|
|
pip install django-auth-ldap>=1.3.0
|
|
|
|
# Using apt-get
|
|
apt-get install python-django-auth-ldap
|
|
|
|
.. warning::
|
|
|
|
With django-auth-ldap older than 1.3.0 the :ref:`autogroup` will not work
|
|
properly for newly created users.
|
|
|
|
.. note::
|
|
|
|
There are some incompatibilities in the Python LDAP 3.1.0 module, which might
|
|
prevent you from using that version. If you get error `AttributeError:
|
|
'module' object has no attribute '_trace_level'
|
|
<https://github.com/python-ldap/python-ldap/issues/226>`_, downgrading
|
|
python-ldap to 3.0.0 might help.
|
|
|
|
Once you have the package installed, you can hook it into the Django authentication:
|
|
|
|
.. code-block:: python
|
|
|
|
# Add LDAP backed, keep Django one if you want to be able to sign in
|
|
# even without LDAP for admin account
|
|
AUTHENTICATION_BACKENDS = (
|
|
"django_auth_ldap.backend.LDAPBackend",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# LDAP server address
|
|
AUTH_LDAP_SERVER_URI = "ldaps://ldap.example.net"
|
|
|
|
# DN to use for authentication
|
|
AUTH_LDAP_USER_DN_TEMPLATE = "cn=%(user)s,o=Example"
|
|
# Depending on your LDAP server, you might use a different DN
|
|
# like:
|
|
# AUTH_LDAP_USER_DN_TEMPLATE = 'ou=users,dc=example,dc=com'
|
|
|
|
# List of attributes to import from LDAP upon sign in
|
|
# Weblate stores full name of the user in the full_name attribute
|
|
AUTH_LDAP_USER_ATTR_MAP = {
|
|
"full_name": "name",
|
|
# Use the following if your LDAP server does not have full name
|
|
# Weblate will merge them later
|
|
# 'first_name': 'givenName',
|
|
# 'last_name': 'sn',
|
|
# Email is required for Weblate (used in VCS commits)
|
|
"email": "mail",
|
|
}
|
|
|
|
# Hide the registration form
|
|
REGISTRATION_OPEN = False
|
|
|
|
.. note::
|
|
|
|
You should remove ``'social_core.backends.email.EmailAuth'`` from the
|
|
:setting:`django:AUTHENTICATION_BACKENDS` setting, otherwise users will be able to set
|
|
their password in Weblate, and authenticate using that. Keeping
|
|
``'weblate.accounts.auth.WeblateUserBackend'`` is still needed in order to
|
|
make permissions and facilitate anonymous users. It will also allow you
|
|
to sign in using a local admin account, if you have created it (e.g. by using
|
|
:djadmin:`createadmin`).
|
|
|
|
Using bind password
|
|
~~~~~~~~~~~~~~~~~~~
|
|
|
|
If you can not use direct bind for authentication, you will need to use search,
|
|
and provide a user to bind for the search. For example:
|
|
|
|
.. code-block:: python
|
|
|
|
import ldap
|
|
from django_auth_ldap.config import LDAPSearch
|
|
|
|
AUTH_LDAP_BIND_DN = ""
|
|
AUTH_LDAP_BIND_PASSWORD = ""
|
|
AUTH_LDAP_USER_SEARCH = LDAPSearch(
|
|
"ou=users,dc=example,dc=com", ldap.SCOPE_SUBTREE, "(uid=%(user)s)"
|
|
)
|
|
|
|
Active Directory integration
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
.. code-block:: python
|
|
|
|
import ldap
|
|
from django_auth_ldap.config import LDAPSearch, NestedActiveDirectoryGroupType
|
|
|
|
AUTH_LDAP_BIND_DN = "CN=ldap,CN=Users,DC=example,DC=com"
|
|
AUTH_LDAP_BIND_PASSWORD = "password"
|
|
|
|
# User and group search objects and types
|
|
AUTH_LDAP_USER_SEARCH = LDAPSearch(
|
|
"CN=Users,DC=example,DC=com", ldap.SCOPE_SUBTREE, "(sAMAccountName=%(user)s)"
|
|
)
|
|
|
|
# Make selected group a superuser in Weblate
|
|
AUTH_LDAP_USER_FLAGS_BY_GROUP = {
|
|
# is_superuser means user has all permissions
|
|
"is_superuser": "CN=weblate_AdminUsers,OU=Groups,DC=example,DC=com",
|
|
}
|
|
|
|
# Map groups from AD to Weblate
|
|
AUTH_LDAP_GROUP_SEARCH = LDAPSearch(
|
|
"OU=Groups,DC=example,DC=com", ldap.SCOPE_SUBTREE, "(objectClass=group)"
|
|
)
|
|
AUTH_LDAP_GROUP_TYPE = NestedActiveDirectoryGroupType()
|
|
AUTH_LDAP_FIND_GROUP_PERMS = True
|
|
|
|
# Optionally enable group mirroring from LDAP to Weblate
|
|
# AUTH_LDAP_MIRROR_GROUPS = True
|
|
|
|
.. seealso::
|
|
|
|
:doc:`ldap:index`, :doc:`ldap:authentication`
|
|
|
|
|
|
.. _cas-auth:
|
|
|
|
|
|
CAS authentication
|
|
------------------
|
|
|
|
CAS authentication can be achieved using a package such as `django-cas-ng`.
|
|
|
|
Step one is disclosing the e-mail field of the user via CAS. This has to be
|
|
configured on the CAS server itself, and requires you run at least CAS v2 since
|
|
CAS v1 doesn't support attributes at all.
|
|
|
|
Step two is updating Weblate to use your CAS server and attributes.
|
|
|
|
To install `django-cas-ng`:
|
|
|
|
.. code-block:: sh
|
|
|
|
pip install django-cas-ng
|
|
|
|
Once you have the package installed you can hook it up to the Django
|
|
authentication system by modifying the :file:`settings.py` file:
|
|
|
|
.. code-block:: python
|
|
|
|
# Add CAS backed, keep the Django one if you want to be able to sign in
|
|
# even without LDAP for the admin account
|
|
AUTHENTICATION_BACKENDS = (
|
|
"django_cas_ng.backends.CASBackend",
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
# CAS server address
|
|
CAS_SERVER_URL = "https://cas.example.net/cas/"
|
|
|
|
# Add django_cas_ng somewhere in the list of INSTALLED_APPS
|
|
INSTALLED_APPS = (..., "django_cas_ng")
|
|
|
|
Finally, a signal can be used to map the e-mail field to the user object. For
|
|
this to work you have to import the signal from the `django-cas-ng` package and
|
|
connect your code with this signal. Doing this in settings file can
|
|
cause problems, therefore it's suggested to put it:
|
|
|
|
- In your app config's :py:meth:`django:django.apps.AppConfig.ready` method
|
|
- In the project's :file:`urls.py` file (when no models exist)
|
|
|
|
.. code-block:: python
|
|
|
|
from django_cas_ng.signals import cas_user_authenticated
|
|
from django.dispatch import receiver
|
|
|
|
|
|
@receiver(cas_user_authenticated)
|
|
def update_user_email_address(sender, user=None, attributes=None, **kwargs):
|
|
# If your CAS server does not always include the email attribute
|
|
# you can wrap the next two lines of code in a try/catch block.
|
|
user.email = attributes["email"]
|
|
user.save()
|
|
|
|
.. seealso::
|
|
|
|
`Django CAS NG <https://github.com/django-cas-ng/django-cas-ng>`_
|
|
|
|
Configuring third party Django authentication
|
|
---------------------------------------------
|
|
|
|
Generally any Django authentication plugin should work with Weblate. Just
|
|
follow the instructions for the plugin, just remember to keep the Weblate user backend
|
|
installed.
|
|
|
|
.. seealso::
|
|
|
|
:ref:`ldap-auth`,
|
|
:ref:`cas-auth`
|
|
|
|
Typically the installation will consist of adding an authentication backend to
|
|
:setting:`django:AUTHENTICATION_BACKENDS` and installing an authentication app (if
|
|
there is any) into :setting:`django:INSTALLED_APPS`:
|
|
|
|
.. code-block:: python
|
|
|
|
AUTHENTICATION_BACKENDS = (
|
|
# Add authentication backend here
|
|
"weblate.accounts.auth.WeblateUserBackend",
|
|
)
|
|
|
|
INSTALLED_APPS += (
|
|
# Install authentication app here
|
|
)
|