React Native toolkit for Auth0 API, compliant with RFC 8252
React Native 0.26+
Install react-native-auth0
using npm
npm install react-native-auth0 --save
Or via yarn
yarn add react-native-auth0
then you need to link the native module in react-native-auth0
react-native link react-native-auth0
This section is for those that want to use Web Authentication, if you dont need it just ignore this section.
In the file android/app/src/main/AndroidManifest.xml
you must make sure the MainActivity of the app has a launchMode value of singleTask
and that it has the following intent filter:
<intent-filter>
<action android:name="android.intent.action.VIEW" />
<category android:name="android.intent.category.DEFAULT" />
<category android:name="android.intent.category.BROWSABLE" />
<data
android:host="YOUR_AUTH0_DOMAIN"
android:pathPrefix="/android/${applicationId}/callback"
android:scheme="${applicationId}" />
</intent-filter>
So if you have samples.auth0.com
as your Auth0 domain you would have the following MainActivity configuration:
<activity
android:name=".MainActivity"
android:label="@string/app_name"
android:launchMode="singleTask"
android:configChanges="keyboard|keyboardHidden|orientation|screenSize"
android:windowSoftInputMode="adjustResize">
<intent-filter>
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
</intent-filter>
<intent-filter>
<action android:name="android.intent.action.VIEW" />
<category android:name="android.intent.category.DEFAULT" />
<category android:name="android.intent.category.BROWSABLE" />
<data
android:host="samples.auth0.com"
android:pathPrefix="/android/${applicationId}/callback"
android:scheme="${applicationId}" />
</intent-filter>
</activity>
For more info please read react native docs
In order to reduce the potential for conflict which may be caused by the presence of differing versions of the Android support libraries, you may wish to configure project-wide properties. Setting the Compile and Target SDK versions, Build Tools version, and Support Library version in your root project's build.gradle
file will make react-native-auth0
and many other React Native modules use them.
Inside the ios
folder find the file AppDelegate.[swift|m]
add the following to it
#import <React/RCTLinkingManager.h>
- (BOOL)application:(UIApplication *)application openURL:(NSURL *)url
sourceApplication:(NSString *)sourceApplication annotation:(id)annotation
{
return [RCTLinkingManager application:application openURL:url
sourceApplication:sourceApplication annotation:annotation];
}
Inside the ios
folder open the Info.plist
and locate the value for CFBundleIdentifier
, e.g.
<key>CFBundleIdentifier</key>
<string>org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)</string>
and then register a URL type entry using the value of CFBundleIdentifier
as the value of CFBundleURLSchemes
<key>CFBundleURLTypes</key>
<array>
<dict>
<key>CFBundleTypeRole</key>
<string>None</string>
<key>CFBundleURLName</key>
<string>auth0</string>
<key>CFBundleURLSchemes</key>
<array>
<string>org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)</string>
</array>
</dict>
</array>
The <string>
value should be the literal value of the Bundle Identifier with no $ variables, for example: samples.auth0.com
.
The value
org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)
is the default for apps created with React Native CLI, you may have a different value.
For more info please read react native docs
Callback URLs are the URLs that Auth0 invokes after the authentication process. Auth0 routes your application back to this URL and appends additional parameters to it, including a token. Since callback URLs can be manipulated, you will need to add this URL to your Application's Allowed Callback URLs for security. This will enable Auth0 to recognize these URLs as valid. If omitted, authentication will not be successful.
Callback URLs must have a valid scheme value as defined by the specification. A "Redirect URI is not valid" error will raise if this format is not respected.
Go to the Auth0 Dashboard, select your application and make sure that Allowed Callback URLs contains the following:
{YOUR_BUNDLE_IDENTIFIER}://${YOUR_AUTH0_DOMAIN}/ios/{YOUR_BUNDLE_IDENTIFIER}/callback
{YOUR_APP_PACKAGE_NAME}://{YOUR_AUTH0_DOMAIN}/android/{YOUR_APP_PACKAGE_NAME}/callback
import Auth0 from 'react-native-auth0';
const auth0 = new Auth0({ domain: '{YOUR_AUTH0_DOMAIN}', clientId: '{YOUR_CLIENT_ID}' });
auth0
.webAuth
.authorize({scope: 'openid email', audience: 'https://{YOUR_AUTH0_DOMAIN}/userinfo'})
.then(credentials => console.log(credentials))
.catch(error => console.log(error));
This snippet sets the
audience
to ensure OIDC compliant responses, this can also be achieved by enabling the OIDC Conformant switch in your Auth0 dashboard underApplication / Settings / Advanced OAuth
. For more information please check this documentation.
auth0
.webAuth
.clearSession()
.catch(error => console.log(error));
Since June 2017 new Clients no longer have the Password Grant Type* enabled by default.
If you are accessing a Database Connection using passwordRealm
then you will need to enable the Password Grant Type, please follow this guide.
auth0
.auth
.passwordRealm({username: "[email protected]", password: "password", realm: "myconnection"})
.then(console.log)
.catch(console.error);
auth0
.auth
.userInfo({token: 'user access_token'})
.then(console.log)
.catch(console.error);
auth0
.auth
.refreshToken({refreshToken: 'user refresh_token'})
.then(console.log)
.catch(console.error);
auth0
.auth
.createUser({email: '[email protected]', username: 'username', password: 'password', connection: 'myconnection'})
.then(console.log)
.catch(console.error);
auth0
.users('user token')
.patchUser({id: 'user_id', metadata: {'first_name': 'John', 'last_name': 'Doe'}})
.then(console.log)
.catch(console.error);
auth0
.users('user token')
.getUser({id: "user_id"})
.then(console.log)
.catch(console.error);
For more info please check our generated documentation
Auth0 helps you to:
- Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
- Add authentication through more traditional username/password databases.
- Add support for linking different user accounts with the same user.
- Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
- Analytics of how, when and where users are logging in.
- Pull data from other sources and add it to the user profile, through JavaScript rules.
- Go to Auth0 and click Sign Up.
- Use Google, GitHub or Microsoft Account to login.
If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
This project is licensed under the MIT license. See the LICENSE file for more info.