react-native-auth0-battery
v1.0.3
Published
React Native toolkit for Auth0 API
Downloads
6
Maintainers
Readme
react-native-auth0
React Native toolkit for Auth0 API
Requirements
React Native 0.26+
Installation
Install react-native-auth0
using npm
npm install react-native-auth0 --save
Or via yarn
yarn add react-native-auth0
then you need to link the native module in react-native-auth0
react-native link react-native-auth0
Configuration
This section is for those that want to use WebAuth, if you dont need it just ignore this section.
Android
In the file android/src/app/AndroidManifest.xml
you must make sure the main activity of the app has launch mode value of singleTask
and that it has the following intent filter
<intent-filter>
<action android:name="android.intent.action.VIEW" />
<category android:name="android.intent.category.DEFAULT" />
<category android:name="android.intent.category.BROWSABLE" />
<data
android:host="YOUR_AUTH0_DOMAIN"
android:pathPrefix="/android/${applicationId}/callback"
android:scheme="${applicationId}" />
</intent-filter>
So if you have samples.auth0.com
as your Auth0 domain you would have the following activity configuration:
<activity
android:name=".MainActivity"
android:label="@string/app_name"
android:launchMode="singleTask"
android:configChanges="keyboard|keyboardHidden|orientation|screenSize"
android:windowSoftInputMode="adjustResize">
<intent-filter>
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
</intent-filter>
<intent-filter>
<action android:name="android.intent.action.VIEW" />
<category android:name="android.intent.category.DEFAULT" />
<category android:name="android.intent.category.BROWSABLE" />
<data
android:host="samples.auth0.com"
android:pathPrefix="/android/${applicationId}/callback"
android:scheme="${applicationId}" />
</intent-filter>
</activity>
For more info please read react native docs
iOS
Inside the ios
folder find the file AppDelegate.[swift|m]
add the following to it
#import <React/RCTLinkingManager.h>
- (BOOL)application:(UIApplication *)application openURL:(NSURL *)url
sourceApplication:(NSString *)sourceApplication annotation:(id)annotation
{
return [RCTLinkingManager application:application openURL:url
sourceApplication:sourceApplication annotation:annotation];
}
Then in your Info.plist
file, find the value of the entry of CFBundleIdentifier
, e.g.
<key>CFBundleIdentifier</key>
<string>org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)</string>
and then register a URL type entry using the value of CFBundleIdentifier
as the value of CFBundleURLSchemes
<key>CFBundleURLTypes</key>
<array>
<dict>
<key>CFBundleTypeRole</key>
<string>None</string>
<key>CFBundleURLName</key>
<string>auth0</string>
<key>CFBundleURLSchemes</key>
<array>
<string>org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)</string>
</array>
</dict>
</array>
The value
org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)
is the default for apps created with RN cli, you will probably have a different value.
For more info please read react native docs
Usage
import Auth0 from 'react-native-auth0';
const auth0 = new Auth0({ domain: '{YOUR_AUTH0_DOMAIN}', clientId: '{YOUR_CLIENT_ID}' });
WebAuth
auth0
.webAuth
.authorize({scope: 'openid email', audience: 'https://{YOUR_AUTH0_DOMAIN}/userinfo'})
.then(credentials => console.log(credentials))
.catch(error => console.log(error));
This snippet sets the
audience
to ensure OIDC compliant responses, this can also be achieved by enabling the OIDC Conformant switch in your Auth0 dashboard underClient / Settings / Advanced OAuth
. For more information please check this documentation.
Authentication API
Login with Password Realm Grant
auth0
.auth
.passwordRealm({username: "[email protected]", password: "password", realm: "myconnection"})
.then(console.log)
.catch(console.error);
Get user information using user's access_token
auth0
.auth
.userInfo({token: 'user access_token'})
.then(console.log)
.catch(console.error);
Getting new access token with refresh token
auth0
.auth
.refreshToken({refreshToken: 'user refresh_token'})
.then(console.log)
.catch(console.error);
Create user in database connection
auth0
.auth
.createUser({email: '[email protected]', username: 'username', pasword: 'password', connection: 'myconnection'})
.then(console.log)
.catch(console.error);
Management API (Users)
Patch user with user_metadata
auth0
.users('user token')
.patchUser({id: 'user_id', metadata: {'first_name': 'John', 'last_name': 'Doe'}})
.then(console.log)
.catch(console.error);
Get full user profile
auth0
.users('user token')
.getUser({id: "user_id"})
.then(console.log)
.catch(console.error);
For more info please check our generated documentation
What is Auth0?
Auth0 helps you to:
- Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
- Add authentication through more traditional username/password databases.
- Add support for linking different user accounts with the same user.
- Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
- Analytics of how, when and where users are logging in.
- Pull data from other sources and add it to the user profile, through JavaScript rules.
Create a free Auth0 Account
- Go to Auth0 and click Sign Up.
- Use Google, GitHub or Microsoft Account to login.
Issue Reporting
If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
Author
License
This project is licensed under the MIT license. See the LICENSE file for more info.