https://supertokens.com/ logo
Docs
Join the conversationJoin Discord
Channels
community
contributing
general
github-activity
info
introductions
new-releases
random
security
support-questions
welcome-0xdelusion
welcome-aj-ya
welcome-aleksandrc
welcome-alpinjs
welcome-amberlamps1
welcome-andrew-rodriguez
welcome-ankit-choudhary
welcome-anthony-stod-custodio
welcome-call-in
welcome-chwalbox
welcome-claybiokiller
welcome-co7e
welcome-cosmoecwsa
welcome-devdag
welcome-dinso
welcome-drebotelho
welcome-elio
welcome-ernest
welcome-foxbarrington
welcome-fromscratch
welcome-galto4ir
welcome-goetzum
welcome-hay-kot
welcome-himanshu-kukreja
welcome-hossambarakat
welcome-ichikawakazuto
welcome-jahir9991
welcome-jamesl
welcome-jerry123424
welcome-john-oliver
welcome-jonas-alexanderson
welcome-jxyz
welcome-kelvinwop
welcome-kraz
welcome-lancekey
welcome-leoo
welcome-lukeacollins
welcome-m-j-mon
welcome-malik-khoja
welcome-marco
welcome-mardadi
welcome-meshguy
welcome-metamorph
welcome-mike-tectu
welcome-mirzok
welcome-mozomig
welcome-naberyou66_
welcome-nacer
welcome-namratha
welcome-naveenkumar
welcome-nightlight
welcome-nischith
welcome-notankit
welcome-olawumi
welcome-pavan-kumar-reddy-n
welcome-pineappaul
welcome-poothebear
welcome-rick
welcome-samuel-qosenergy
welcome-samuelstroschein
welcome-shubhamgoel23
welcome-shubhamkaushal
welcome-sidebar
welcome-surajsli
welcome-suyash_
welcome-syntaxerror
welcome-tauno
welcome-tauno
welcome-tawnoz
welcome-teclali
welcome-tls
welcome-turbosepp
welcome-vikram_shadow
welcome-yann
Powered by Linen
general
  • r

    rp

    07/10/2020, 2:37 PM
    See Cognito's advice as well: https://aws.amazon.com/blogs/mobile/understanding-amazon-cognito-user-pool-oauth-2-0-grants/#:~:text=Authorization%20code%20grant,it%20for%20the%20desired%20tokens.
  • r

    rp

    07/10/2020, 2:37 PM
    "The authorization code grant is the preferred method for authorizing end users. Instead of directly providing user pool tokens to an end user upon authentication, an authorization code is provided. This code is then sent to a custom application that can exchange it for the desired tokens. Because the tokens are never exposed directly to an end user, they are less likely to become compromised."
  • r

    rp

    07/10/2020, 2:37 PM
    So it all comes down to how much you care about your user's security.
  • r

    rp

    07/10/2020, 2:38 PM
    What is your service name? So that I have better context of this conversaiton.
  • u

    user

    07/10/2020, 2:38 PM
    https://authress.io
  • u

    user

    07/10/2020, 2:38 PM
    I'm not sure that really helps
  • r

    rp

    07/10/2020, 2:38 PM
    Ah I see.
  • u

    user

    07/10/2020, 2:39 PM
    It sounds like the suggestion is to have a specific service running just to integrate with Auth0, and once we did that we would integrate with super tokens. But honestly I really dislike the idea of writing the service in the first place
  • r

    rp

    07/10/2020, 2:40 PM
    > I really dislike the idea of writing the service in the first place Integration with Auth0? Integration with supertokens? or both?
  • u

    user

    07/10/2020, 2:40 PM
    integration with Auth0
  • r

    rp

    07/10/2020, 2:40 PM
    I mean we too need to do that hahaha
  • u

    user

    07/10/2020, 2:41 PM
    we are using the access tokens generated by the user to access our services
  • r

    rp

    07/10/2020, 2:41 PM
    cause it's all linked.. Auth0 for login + user managenent session layer authorisation layer
  • r

    rp

    07/10/2020, 2:41 PM
    > we are using the access tokens generated by the user to access our services Why?
  • u

    user

    07/10/2020, 2:42 PM
    why not?
  • u

    user

    07/10/2020, 2:42 PM
    it's easy to do that
  • r

    rp

    07/10/2020, 2:42 PM
    Shouldn't u be issuing an access token for that user to access your service
  • u

    user

    07/10/2020, 2:42 PM
    what do you mean, auth0 issued the token for the user, that's the auth for our service
  • r

    rp

    07/10/2020, 2:43 PM
    I see. So if tomorrow Auth0 decides to change their token structure, you too have to make a change?
  • r

    rp

    07/10/2020, 2:43 PM
    And if someone is not using Auth0 etc.. how do they use your service?
  • u

    user

    07/10/2020, 2:43 PM
    our service supports any provider that is OIDC complaint
  • u

    user

    07/10/2020, 2:44 PM
    so sure we support any standard, and if that standard changes, yes we would have to make a change, but that hasn't been hard so far
  • u

    user

    07/10/2020, 2:44 PM
    I'm not sure Auth0 could change in a meaningful way that would impact us, could you talk more about that?
  • r

    rp

    07/10/2020, 2:44 PM
    No i mean if you are supporting a standard, that is OK
  • r

    rp

    07/10/2020, 2:44 PM
    So you have to tell your customer to give you the OIDC token issued by their login provider.
  • u

    user

    07/10/2020, 2:45 PM
    yes
  • r

    rp

    07/10/2020, 2:45 PM
    And store that in the session information
  • r

    rp

    07/10/2020, 2:45 PM
    we are not a login provider. We just do sessions
  • r

    rp

    07/10/2020, 2:46 PM
    1) So their login provider wil give them an OIDC token 2) They identify the user from that token on thier backend 3) They create a session using that user's userID and store the OIDC token in the session 4) To use authress, they extract the OIDC token from the session token on each API and use authress using that OIDC token as usual.
  • r

    rp

    07/10/2020, 2:47 PM
    So you don't have to make any integrations with SuperTokens.
Powered by Linen
Title
r

rp

07/10/2020, 2:47 PM
So you don't have to make any integrations with SuperTokens.
View count: 2