-
-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support social sign in #166
Comments
This is something I thought about, that it may come, but this would be quite far into the future, because there are a lot of other things that are way more important at this moment. But yes, this is on the "it may come" TODO list already. Edit: The problem with this is, that something like this would make a lot of Rauthy's features obsolete. If you want to build the applications behind Rauthy really secure, you want these features, but most upstream providers don't implement them properly, or each provider would really need a fully customized handler in the backend, which would be a big overhead to maintain. |
Social sign-ins are less oppositional to Rauthy’s value proposition if you think of them strictly as an onboarding tool rather than a default method of sign in. For a service like Weird, we would like to use Rauthy to eventually become our own standalone OIDC provider to compete with the IdP incumbents (Google, GitHub et.al.) in our own small way. But for first-time user registrations, it’d be a mistake to not support the “usual suspects” as a signup method, as that’s what the vast majority of people are used to, including on Weird’s competitors like linktree and biolink. The proprietary login options could be challenged post-signup; in Weird’s case we’d wait maybe 2-3 months for the user to fully commit to our service, and then pop the question:
|
Yes, for an initial registration, it would be a nice feature, that's true. Just to grab some data that already exists. If everything goes to plan, I will release v0.19.0 today with Solid OIDC support and some bugfixes. |
Just as an update for this issue. I have to do quite a bit of other work, before I can implement something like this. Some smaller things are still missing for the mandatory party and I am thinking about making Rauthy compliant with the dynamic OIDC provider spec as well. This would however be a big one, since I would need to fully support the hybrid flow + implement dynamic client registration in a way, that the DB would not get filled by bots and spammers. When this is done, I will most probably look at implementing upstream auth providers. |
Put another way is this: supporting OIDC Connect discovery? |
This has nothing to do with this issue, but yes, Rauthy exports Edit: Now I got your question. This is issue is basically meant the other way around: Using Rauthy for logging in is of course working properly with everything you might need so far. |
The first nightly version is available now for tests in the real world. Please do not use these nightly versions in a productive environment. If there are any problems which need modifications to the DB migrations, I will modify the migrations themselves instead of creating new ones to keep the whole thing clean. But if this is needed, you would get a conflict with the DB from this nightly version, because of a hash mismatch. SQLite
Postgres
I added a first template for Google Accounts as well as a reference for future templates. For the configuration, you can find a new nav entry Please provide feedback, when you have done testing, even when everything worked out fine. |
There is a new nightly image available which has been tested and verified against Github as the upstream provider. A detailed setup guide / docs will follow in the next days probably, but this is really simple. SQLite:
Postgres:
|
Support has been added in v0.22.0 |
Signing in with google, github , etc, through oidc will be highly convinient for many service instances.
The text was updated successfully, but these errors were encountered: