-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: additional third party authentication provider support #591
Comments
Re Re Basically the main difference between the two solutions is that |
Yes you nailed it right there in your comment. In my case the syncing that I have setup from Auth0 to a table in Postgres is to have a user's account data from Auth0 handy. (Firstname, Lastname, Last login datetime, Total amount of logins, Last Password reset datetime) Of course this part may or may not be needed by developers. It depends on their project and needs. So I would leave the implementation user account data syncing up to the developers, because their project needs may very a lot.Just adding more context to help Nhost team with defining the right implementation for this feature. |
Hi Nhost team.
I noticed a new support for integration third party Authentication service.🎉
https://docs.nhost.io/guides/auth/jwt#external-signing
https://docs.nhost.io/guides/auth/sign-in-idtokens
But I am a bit confused now as to what route to take in order for me to simplify my current implementation.
For a couple of years now I have been using Auth0 for authentication. My Nhost project has a custom function that excepts a Auth0 JWT and returns an Nhost compatible JWT. The function validates, decodes the Auth0 JWT using my Auth0 tenant JWKS endpoint public key. And then I pass over the custom claims, roles etc over into Nhost JWT. Between Nhost Hasura and Auth0 I also sync some user data to a custom postgres table when the user is created in Auth0 and when a user logs in through Auth0.
My current implementation is working fine.
But after seeing the new Nhost features for JWT, I was thinking if I might be able to get rid of some custom solution, and instead switch to using your solutions.
Sign In with ID tokens
https://docs.nhost.io/guides/auth/sign-in-idtokens
Right now I see, google and apple are supported. Auth0 has support for id token as well. Which makes me wonder if this would work for Auth0 too.
External Signing
https://docs.nhost.io/guides/auth/jwt#external-signing
This seems simplest approach, because you can just pass the JWT from the 3d party right away in your graphql calls without an additional exchange for Nhost JWT.
But using this means that Auth service will be disabled, which is not what I would like.
In the near future I want the best of both worlds:
But at the same time not having to maintain to much custom code going forward.
So wondering if you can shed some light on what approach I should consider to build upon going forward.
The text was updated successfully, but these errors were encountered: