Tool and Usage
|Latest release||2.0.0a1 |
Why this tool?
You may need to send some data to untrusted environments. To do this safely, the data needs to be signed. The receiver can check if the signature is correct, while the sender is the only one who can create the appropriate signature.
How it works
This toolkit uses HMAC and SHA1 for signing as default. The implementation is based upon the work of the Django signing module with some changes. For example it also supports JSON Web Signatures (JWS).
Usage and audience
itsdangerous is commonly used for application security or data integrity. Target users for this tool are developers.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 1000 GitHub stars
- + The source code of this software is available
Supported operating systems
Itsdangerous is known to work on all platforms.
This tool page was updated at . Found an improvement? Help the community by submitting an update.