diff --git a/docs/auth-provider-setup/aggregate-verifier.mdx b/docs/auth-provider-setup/aggregate-verifier.mdx
index 22a70d6fc..dce02a128 100644
--- a/docs/auth-provider-setup/aggregate-verifier.mdx
+++ b/docs/auth-provider-setup/aggregate-verifier.mdx
@@ -21,9 +21,9 @@ such verifiers are called `Single ID Verifiers`.
`Client ID` field and click on `Add Sub Verifiers`.
![Select Google from Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-aggregate-google.png)
4. Next, create the second sub-verifier. Click on `Add Sub Verifiers` to add a new sub-verifier.
-5. Select `Auth0` from the dropdown or choose `Custom Providers` from the radio buttons. We're selecting `Auth0` in this example.
+5. Select `Auth0` on the dropdown or choose `Custom Providers` from the radio buttons. We're selecting `Auth0` in this example.
![Auth0 as sub verifier on Web3Auth Dashboard](/images/dashboard/create-verifier-aggregate-add-second-sub.png)
-6. Select the `Authentication Type` based on your application need from the dropdown. We're selecting `Github` in this example.
+6. Select the `Authentication Type` based on your application need on the dropdown. We're selecting `Github` in this example.
![Create Aggregate Verifiier on Web3Auth Dashboard](/images/dashboard/create-verifier-aggregate-auth0-github.png)
7. Select `Email` as the **JWT Verifier ID** and enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new
Auth0 application [here](https://auth0.com/docs/quickstart/webapp/).
diff --git a/docs/auth-provider-setup/auth-provider-setup.mdx b/docs/auth-provider-setup/auth-provider-setup.mdx
index 423a4baf8..ff1fa53a5 100644
--- a/docs/auth-provider-setup/auth-provider-setup.mdx
+++ b/docs/auth-provider-setup/auth-provider-setup.mdx
@@ -8,7 +8,6 @@ description: "Auth Provider Setup | Documentation - Web3Auth"
import BYOCustomJWTTiles from "@site/src/common/docs/_byo-custom-jwt-providers.mdx";
import FederatedTiles from "@site/src/common/docs/_federated-providers.mdx";
import SocialTiles from "@site/src/common/docs/_social-login-providers.mdx";
-import SocialViaFederatedTiles from "@site/src/common/docs/_social-via-federated-providers.mdx";
Auth Provider setup refers to the capability of creating a verifier with Web3Auth. We recommend you set a verifier to use the Custom Authentication
feature of Web3Auth.
@@ -19,10 +18,6 @@ feature of Web3Auth.
-#### Social via Federated/Identity Providers
-
-
-
### Federated / Identity Providers
diff --git a/docs/auth-provider-setup/federated-identity-providers.mdx b/docs/auth-provider-setup/federated-identity-providers.mdx
index 73b64be3b..eec59529c 100644
--- a/docs/auth-provider-setup/federated-identity-providers.mdx
+++ b/docs/auth-provider-setup/federated-identity-providers.mdx
@@ -19,7 +19,7 @@ Note: This will require you to register an app with the Federated / Identity Pro
1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
![Auth0 - Login Providers list on Web3Auth Dashboard](/dashboard/verifiers/login-providers-list.png)
-2. Select the `Authentication Type` based on your application need from the dropdown.
+2. Select the `Authentication Type` based on your application need on the dropdown.
![Auth0 Authentication Type list on Web3Auth Dashboard](/dashboard/verifiers/auth0-authentication-type-list.png)
3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
[here](https://auth0.com/docs/quickstart/webapp/).
diff --git a/docs/auth-provider-setup/social-providers/apple.mdx b/docs/auth-provider-setup/social-providers/apple.mdx
index 771112d01..89d18fe41 100644
--- a/docs/auth-provider-setup/social-providers/apple.mdx
+++ b/docs/auth-provider-setup/social-providers/apple.mdx
@@ -10,7 +10,7 @@ description: "Apple Social Login with Web3Auth | Documentation - Web3Auth"
1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
![Apple - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
-2. Select `Apple` as the **Authentication Type** based from the dropdown.
+2. Select `Apple` as the **Authentication Type** based on the dropdown.
![Apple - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
[here](https://auth0.com/docs/quickstart/webapp/).
@@ -21,7 +21,7 @@ description: "Apple Social Login with Web3Auth | Documentation - Web3Auth"
4. Add the [Apple Social Connection](https://marketplace.auth0.com/integrations/apple-social-connection) to your Auth0 application.
5. Click on the `Create Verifier` button.
-## Example
+### Example
```tsx
import { Web3AuthNoModal } from "@web3auth/no-modal";
diff --git a/docs/auth-provider-setup/social-providers/baidu.mdx b/docs/auth-provider-setup/social-providers/baidu.mdx
new file mode 100644
index 000000000..e0407b89e
--- /dev/null
+++ b/docs/auth-provider-setup/social-providers/baidu.mdx
@@ -0,0 +1,81 @@
+---
+title: Baidu Login with Web3Auth
+sidebar_label: Baidu
+displayed_sidebar: docs
+description: "Baidu Login with Web3Auth | Documentation - Web3Auth"
+---
+
+## Set up [Baidu](https://marketplace.auth0.com/integrations/baidu-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Baidu - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Other` as the **Authentication Type** based on the dropdown.
+ ![Baidu - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Baidu - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Baidu - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Baidu Social Connection](https://marketplace.auth0.com/integrations/baidu-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `Baidu` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Baidu
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "baidu", // Use this to skip Auth0 Modal for Baidu login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/bitbucket.mdx b/docs/auth-provider-setup/social-providers/bitbucket.mdx
new file mode 100644
index 000000000..e98d9e5a3
--- /dev/null
+++ b/docs/auth-provider-setup/social-providers/bitbucket.mdx
@@ -0,0 +1,81 @@
+---
+title: Bitbucket Login with Web3Auth
+sidebar_label: Bitbucket
+displayed_sidebar: docs
+description: "Bitbucket Login with Web3Auth | Documentation - Web3Auth"
+---
+
+## Set up [Bitbucket](https://marketplace.auth0.com/integrations/bitbucket-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Bitbucket - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Other` as the **Authentication Type** based on the dropdown.
+ ![Bitbucket - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Bitbucket - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Bitbucket - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Bitbucket Social Connection](https://marketplace.auth0.com/integrations/bitbucket-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `Bitbucket` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Bitbucket
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "bitbucket", // Use this to skip Auth0 Modal for Bitbucket login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/discord.mdx b/docs/auth-provider-setup/social-providers/discord.mdx
index dbe670a27..e9f96d81a 100644
--- a/docs/auth-provider-setup/social-providers/discord.mdx
+++ b/docs/auth-provider-setup/social-providers/discord.mdx
@@ -31,14 +31,14 @@ import Tabs from "@theme/Tabs";
![Discord OAuth2.0 App Client ID and Secret](/content-hub/social-providers/discord/discord-clientid-secret.png)
-## Set up Discord Custom Authentication
+## Set up Discord
1. Create a verifier for your Discord application by selecting `Discord` as the Login provider from this modal.
![Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
2. Paste the **Client ID** from the Discord App(above) to the `Client ID` field and click on Create.
![Discord Client ID on Web3Auth Dashboard](/images/dashboard/create-verifier-discord.png)
-## Example
+### Example
+
+## Set up [Facebook](https://marketplace.auth0.com/integrations/facebook-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Facebook - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Facebook` as the **Authentication Type** based on the dropdown.
+ ![Facebook - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Facebook - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Facebook - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Facebook Social Connection](https://marketplace.auth0.com/integrations/facebook-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `Facebook` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "hUVVf4SEsZT7syOiL0gLU9hFEtm2gQ6O", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Facebook
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.au.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "facebook", // Use this to skip Auth0 Modal for Facebook login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/github.mdx b/docs/auth-provider-setup/social-providers/github.mdx
index 8b9ce70a6..71734f8bc 100644
--- a/docs/auth-provider-setup/social-providers/github.mdx
+++ b/docs/auth-provider-setup/social-providers/github.mdx
@@ -10,7 +10,7 @@ description: "Github Social Login with Web3Auth | Documentation - Web3Auth"
1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
![Twitter - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
-2. Select the `GitHub` as the **Authentication Type** based from the dropdown.
+2. Select the `GitHub` as the **Authentication Type** based on the dropdown.
![Twitter - Auth0 Authentication Type list on Web3Auth Dashboard](/dashboard/verifiers/auth0-authentication-type-list.png)
3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
[here](https://auth0.com/docs/quickstart/webapp/).
@@ -21,7 +21,7 @@ description: "Github Social Login with Web3Auth | Documentation - Web3Auth"
4. Add the [GitHub Social Connection](https://marketplace.auth0.com/integrations/github-social-connection) to your Auth0 application.
5. Click on the `Create` button to create `GitHub` Custom Authentication via Auth0 verifier.
-## Example
+### Example
```tsx
import { Web3AuthNoModal } from "@web3auth/no-modal";
diff --git a/docs/auth-provider-setup/social-providers/google.mdx b/docs/auth-provider-setup/social-providers/google.mdx
index 9e376fa45..4d406f05e 100644
--- a/docs/auth-provider-setup/social-providers/google.mdx
+++ b/docs/auth-provider-setup/social-providers/google.mdx
@@ -26,7 +26,7 @@ import Tabs from "@theme/Tabs";
3. Obtain the OAuth `Client ID` from your [App on the Google Developer dashboard](https://console.developers.google.com/)
-## Set up Google Custom Authentication
+## Set up Google
1. Create a verifier for your Google application by first clicking on `Social Login Provider` and then selecting `Google` as the Login provider from
the dropdown list.
@@ -43,7 +43,7 @@ import Tabs from "@theme/Tabs";
:::
-## Example
+### Example
+
+## Set up [Google](https://marketplace.auth0.com/integrations/google-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Google - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Google` as the **Authentication Type** based on the dropdown.
+ ![Google - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Google - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Google - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Google Social Connection](https://marketplace.auth0.com/integrations/google-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `Google` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "hUVVf4SEsZT7syOiL0gLU9hFEtm2gQ6O", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Google
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.au.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "google-oauth2", // Use this to skip Auth0 Modal for Google login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/kakao.mdx b/docs/auth-provider-setup/social-providers/kakao.mdx
index c6e0e15f2..65760c614 100644
--- a/docs/auth-provider-setup/social-providers/kakao.mdx
+++ b/docs/auth-provider-setup/social-providers/kakao.mdx
@@ -10,7 +10,7 @@ description: "KaKao Social Login with Web3Auth | Documentation - Web3Auth"
1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
![KaKao - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
-2. Select the `KaKao` as the **Authentication Type** based from the dropdown.
+2. Select the `KaKao` as the **Authentication Type** based on the dropdown.
![KaKao - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
[here](https://auth0.com/docs/quickstart/webapp/).
@@ -21,7 +21,7 @@ description: "KaKao Social Login with Web3Auth | Documentation - Web3Auth"
4. Add the [KaKao Social Connection](https://marketplace.auth0.com/integrations/kakao-login) to your Auth0 application.
5. Click on the `Create` button to create `KaKao` Custom Authentication via Auth0 verifier.
-## Example
+### Example
```tsx
import { Web3AuthNoModal } from "@web3auth/no-modal";
diff --git a/docs/auth-provider-setup/social-providers/line.mdx b/docs/auth-provider-setup/social-providers/line.mdx
index 2476b5a37..4f02ddbef 100644
--- a/docs/auth-provider-setup/social-providers/line.mdx
+++ b/docs/auth-provider-setup/social-providers/line.mdx
@@ -10,7 +10,7 @@ description: "Line Social Login with Web3Auth | Documentation - Web3Auth"
1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
![LINE - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
-2. Select the `LINE` as the **Authentication Type** based from the dropdown.
+2. Select the `LINE` as the **Authentication Type** based on the dropdown.
![LINE - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
[here](https://auth0.com/docs/quickstart/webapp/).
@@ -21,7 +21,7 @@ description: "Line Social Login with Web3Auth | Documentation - Web3Auth"
4. Add the [LINE Social Connection](https://marketplace.auth0.com/integrations/line-social-connection) to your Auth0 application.
5. Click on the `Create` button to create `LINE` Custom Authentication via Auth0 verifier.
-## Example
+### Example
```tsx
import { Web3AuthNoModal } from "@web3auth/no-modal";
@@ -57,9 +57,9 @@ const openloginAdapter = new OpenloginAdapter({
uxMode: "redirect",
loginConfig: {
jwt: {
- verifier: "w3a-auth0-demo", // Pass the Verifier name here
+ verifier: "w3a-auth0-jp-demo", // Pass the Verifier name here
typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
- clientId: "hUVVf4SEsZT7syOiL0gLU9hFEtm2gQ6O", // Pass on the Auth0 `Client ID` here
+ clientId: "N9jnKM2Fo8PFRj8rYM9I7rWX1FW6X5xx", // Pass on the Auth0 `Client ID` here
},
},
},
@@ -74,7 +74,7 @@ await web3auth.init();
await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
loginProvider: "jwt",
extraLoginOptions: {
- domain: "https://web3auth.au.auth0.com", // Pass on the Auth0 `Domain` here
+ domain: "https://web3auth.jp.auth0.com", // Pass on the Auth0 `Domain` here
verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
connection: "line", // Use this to skip Auth0 Modal for Line login
},
diff --git a/docs/auth-provider-setup/social-providers/linkedin.mdx b/docs/auth-provider-setup/social-providers/linkedin.mdx
index c60d35b3a..3a0a648df 100644
--- a/docs/auth-provider-setup/social-providers/linkedin.mdx
+++ b/docs/auth-provider-setup/social-providers/linkedin.mdx
@@ -10,7 +10,7 @@ description: "LinkedIn Social Login with Web3Auth | Documentation - Web3Auth"
1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
![LinkedIn - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
-2. Select `LinkedIn` as the **Authentication Type** based from the dropdown.
+2. Select `LinkedIn` as the **Authentication Type** based on the dropdown.
![LinkedIn - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
[here](https://auth0.com/docs/quickstart/webapp/).
@@ -21,7 +21,7 @@ description: "LinkedIn Social Login with Web3Auth | Documentation - Web3Auth"
4. Add the [LinkedIn Social Connection](https://marketplace.auth0.com/integrations/linkedin-social-connection) to your Auth0 application.
5. Click on the `Create` button to create `LinkedIn` Custom Authentication via Auth0 verifier.
-## Example
+### Example
```tsx
import { Web3AuthNoModal } from "@web3auth/no-modal";
diff --git a/docs/auth-provider-setup/social-providers/microsoft.mdx b/docs/auth-provider-setup/social-providers/microsoft.mdx
new file mode 100644
index 000000000..8b47bcb4f
--- /dev/null
+++ b/docs/auth-provider-setup/social-providers/microsoft.mdx
@@ -0,0 +1,81 @@
+---
+title: Microsoft Social Login with Web3Auth
+sidebar_label: Microsoft
+displayed_sidebar: docs
+description: "Microsoft Social Login with Web3Auth | Documentation - Web3Auth"
+---
+
+## Set up [Microsoft](https://marketplace.auth0.com/integrations/microsoft-account-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Microsoft - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Other` as the **Authentication Type** based on the dropdown.
+ ![Microsoft - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Microsoft - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Microsoft - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Microsoft Social Connection](https://marketplace.auth0.com/integrations/microsoft-account-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `Microsoft` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Microsoft
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "windowslive", // Use this to skip Auth0 Modal for Microsoft login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/renren.mdx b/docs/auth-provider-setup/social-providers/renren.mdx
new file mode 100644
index 000000000..31c805050
--- /dev/null
+++ b/docs/auth-provider-setup/social-providers/renren.mdx
@@ -0,0 +1,81 @@
+---
+title: RenRen Login with Web3Auth
+sidebar_label: RenRen
+displayed_sidebar: docs
+description: "RenRen Login with Web3Auth | Documentation - Web3Auth"
+---
+
+## Set up [RenRen](https://marketplace.auth0.com/integrations/renren-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![RenRen - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Other` as the **Authentication Type** based on the dropdown.
+ ![RenRen - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![RenRen - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![RenRen - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [RenRen Social Connection](https://marketplace.auth0.com/integrations/renren-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `RenRen` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with RenRen
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "renren", // Use this to skip Auth0 Modal for RenRen login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/slack.mdx b/docs/auth-provider-setup/social-providers/slack.mdx
new file mode 100644
index 000000000..ddb8f794e
--- /dev/null
+++ b/docs/auth-provider-setup/social-providers/slack.mdx
@@ -0,0 +1,81 @@
+---
+title: Slack Login with Web3Auth
+sidebar_label: Slack
+displayed_sidebar: docs
+description: "Slack Login with Web3Auth | Documentation - Web3Auth"
+---
+
+## Set up [Slack](https://marketplace.auth0.com/integrations/sign-in-with-slack) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Slack - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Other` as the **Authentication Type** based on the dropdown.
+ ![Slack - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Slack - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Slack - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Slack Social Connection](https://marketplace.auth0.com/integrations/sign-in-with-slack) to your Auth0 application.
+5. Click on the `Create` button to create `Slack` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Slack
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "sign-in-with-slack", // Use this to skip Auth0 Modal for Slack login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/social-providers.mdx b/docs/auth-provider-setup/social-providers/social-providers.mdx
index 0e597cc96..e6ea7997b 100644
--- a/docs/auth-provider-setup/social-providers/social-providers.mdx
+++ b/docs/auth-provider-setup/social-providers/social-providers.mdx
@@ -5,7 +5,6 @@ description: "Social Providers | Documentation - Web3Auth"
---
import SocialTiles from "@site/src/common/docs/_social-login-providers.mdx";
-import SocialViaFederatedTiles from "@site/src/common/docs/_social-via-federated-providers.mdx";
Social providers allow you to register your app directly with [implicit grant support ](https://oauth.net/2/grant-types/implicit/)and use them with
the Web3Auth SDK.
@@ -16,7 +15,3 @@ used in the Custom Authentication.
### Social via Dashboard
-
-### Social via Federated/Identity Providers
-
-
diff --git a/docs/auth-provider-setup/social-providers/spotify.mdx b/docs/auth-provider-setup/social-providers/spotify.mdx
new file mode 100644
index 000000000..4036a8572
--- /dev/null
+++ b/docs/auth-provider-setup/social-providers/spotify.mdx
@@ -0,0 +1,81 @@
+---
+title: Spotify Login with Web3Auth
+sidebar_label: Spotify
+displayed_sidebar: docs
+description: "Spotify Login with Web3Auth | Documentation - Web3Auth"
+---
+
+## Set up [Spotify](https://marketplace.auth0.com/integrations/spotify-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Spotify - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Other` as the **Authentication Type** based on the dropdown.
+ ![Spotify - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Spotify - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Spotify - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Spotify Social Connection](https://marketplace.auth0.com/integrations/spotify-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `Spotify` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-jp-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "N9jnKM2Fo8PFRj8rYM9I7rWX1FW6X5xx", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Spotify
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.jp.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "spotify", // Use this to skip Auth0 Modal for Spotify login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/twitch.mdx b/docs/auth-provider-setup/social-providers/twitch.mdx
index c003bcf3a..eb95bac44 100644
--- a/docs/auth-provider-setup/social-providers/twitch.mdx
+++ b/docs/auth-provider-setup/social-providers/twitch.mdx
@@ -34,14 +34,14 @@ import Tabs from "@theme/Tabs";
![Twitch OAuth2.0 App Manage](/content-hub/social-providers/twitch/twitch-client-id.png)
-## Set up Twitch Custom Authentication
+## Set up Twitch
1. Create a verifier for your Twitch application by selecting `Twitch` as the Login provider from this modal.
![Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
2. Paste the **Client ID** from the Twitch App(above) to the `Client ID` field and click on Create.
![Twitch Client ID on Web3Auth Dashboard](/images/dashboard/create-verifier-twitch.png)
-## Example
+### Example
+
+## Set up [Twitch](https://marketplace.auth0.com/integrations/twitch-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Twitch - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Twitch` as the **Authentication Type** based on the dropdown.
+ ![Twitch - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Twitch - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Twitch - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Twitch Social Connection](https://marketplace.auth0.com/integrations/twitch-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `Twitch` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-jp-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "N9jnKM2Fo8PFRj8rYM9I7rWX1FW6X5xx", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Twitch
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.jp.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "twitch", // Use this to skip Auth0 Modal for Twitch login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/twitter.mdx b/docs/auth-provider-setup/social-providers/twitter.mdx
index f69489bd8..579620dad 100644
--- a/docs/auth-provider-setup/social-providers/twitter.mdx
+++ b/docs/auth-provider-setup/social-providers/twitter.mdx
@@ -10,7 +10,7 @@ description: "Twitter Social Login with Web3Auth | Documentation - Web3Auth"
1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
![Twitter - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
-2. Select `Twitter` as the **Authentication Type** based from the dropdown.
+2. Select `Twitter` as the **Authentication Type** based on the dropdown.
![Twitter - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
[here](https://auth0.com/docs/quickstart/webapp/).
@@ -21,7 +21,7 @@ description: "Twitter Social Login with Web3Auth | Documentation - Web3Auth"
4. Add the [Twitter Social Connection](https://marketplace.auth0.com/integrations/twitter-social-connection) to your Auth0 application.
5. Click on the `Create` button to create `Twitter` Custom Authentication via Auth0 verifier.
-## Example
+### Example
```tsx
import { Web3AuthNoModal } from "@web3auth/no-modal";
diff --git a/docs/auth-provider-setup/social-providers/vkontakte.mdx b/docs/auth-provider-setup/social-providers/vkontakte.mdx
new file mode 100644
index 000000000..b03dc7130
--- /dev/null
+++ b/docs/auth-provider-setup/social-providers/vkontakte.mdx
@@ -0,0 +1,82 @@
+---
+title: ВКонтакте (vKontakte) Login with Web3Auth
+sidebar_label: ВКонтакте (vKontakte)
+displayed_sidebar: docs
+description: "ВКонтакте (vKontakte) Login with Web3Auth | Documentation - Web3Auth"
+---
+
+## Set up [ВКонтакте (vKontakte)](https://marketplace.auth0.com/integrations/vkontakte-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![ВКонтакте (vKontakte) - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Other` as the **Authentication Type** based on the dropdown.
+ ![ВКонтакте (vKontakte) - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![ВКонтакте (vKontakte) - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![ВКонтакте (vKontakte) - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [ВКонтакте (vKontakte) Social Connection](https://marketplace.auth0.com/integrations/vkontakte-social-connection) to your Auth0
+ application.
+5. Click on the `Create` button to create `ВКонтакте (vKontakte)` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with ВКонтакте (vKontakte)
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "vkontakte", // Use this to skip Auth0 Modal for ВКонтакте (vKontakte) login
+ },
+});
+```
diff --git a/docs/auth-provider-setup/social-providers/weibo.mdx b/docs/auth-provider-setup/social-providers/weibo.mdx
index 2f6b9b879..768a6ff28 100644
--- a/docs/auth-provider-setup/social-providers/weibo.mdx
+++ b/docs/auth-provider-setup/social-providers/weibo.mdx
@@ -1,7 +1,6 @@
---
title: Weibo Social Login with Web3Auth
sidebar_label: Weibo
-
displayed_sidebar: docs
description: "Weibo Social Login with Web3Auth | Documentation - Web3Auth"
---
@@ -10,7 +9,7 @@ description: "Weibo Social Login with Web3Auth | Documentation - Web3Auth"
1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
![Weibo - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
-2. Select the `Weibo` as the **Authentication Type** based from the dropdown.
+2. Select the `Weibo` as the **Authentication Type** based on the dropdown.
![Weibo - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
[here](https://auth0.com/docs/quickstart/webapp/).
@@ -21,7 +20,7 @@ description: "Weibo Social Login with Web3Auth | Documentation - Web3Auth"
4. Add the [Weibo Social Connection](https://marketplace.auth0.com/integrations/weibo-social-connection) to your Auth0 application.
5. Click on the `Create` button to create `Weibo` Custom Authentication via Auth0 verifier.
-## Example
+### Example
```tsx
import { Web3AuthNoModal } from "@web3auth/no-modal";
@@ -57,9 +56,9 @@ const openloginAdapter = new OpenloginAdapter({
uxMode: "redirect",
loginConfig: {
jwt: {
- verifier: "w3a-auth0-demo", // Pass the Verifier name here
+ verifier: "w3a-auth0-jp-demo", // Pass the Verifier name here
typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
- clientId: "hUVVf4SEsZT7syOiL0gLU9hFEtm2gQ6O", // Pass on the Auth0 `Client ID` here
+ clientId: "N9jnKM2Fo8PFRj8rYM9I7rWX1FW6X5xx", // Pass on the Auth0 `Client ID` here
},
},
},
@@ -74,7 +73,7 @@ await web3auth.init();
await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
loginProvider: "jwt",
extraLoginOptions: {
- domain: "https://web3auth.au.auth0.com", // Pass on the Auth0 `Domain` here
+ domain: "https://web3auth.jp.auth0.com", // Pass on the Auth0 `Domain` here
verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
connection: "weibo", // Use this to skip Auth0 Modal for Weibo login
},
diff --git a/docs/auth-provider-setup/social-providers/yandex.mdx b/docs/auth-provider-setup/social-providers/yandex.mdx
new file mode 100644
index 000000000..7fb2f8d3f
--- /dev/null
+++ b/docs/auth-provider-setup/social-providers/yandex.mdx
@@ -0,0 +1,81 @@
+---
+title: Yandex Login with Web3Auth
+sidebar_label: Yandex
+displayed_sidebar: docs
+description: "Yandex Login with Web3Auth | Documentation - Web3Auth"
+---
+
+## Set up [Yandex](https://marketplace.auth0.com/integrations/yandex-social-connection) via Auth0
+
+1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal.
+ ![Yandex - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png)
+2. Select the `Other` as the **Authentication Type** based on the dropdown.
+ ![Yandex - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png)
+3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application
+ [here](https://auth0.com/docs/quickstart/webapp/).
+
+ ![Yandex - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png)
+ ![Yandex - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png)
+
+4. Add the [Yandex Social Connection](https://marketplace.auth0.com/integrations/yandex-social-connection) to your Auth0 application.
+5. Click on the `Create` button to create `Yandex` Custom Authentication via Auth0 verifier.
+
+### Example
+
+```tsx
+import { Web3AuthNoModal } from "@web3auth/no-modal";
+import { OpenloginAdapter } from "@web3auth/openlogin-adapter";
+import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider";
+
+const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ";
+// get it from https://dashboard.web3auth.io by creating a project.
+
+const chainConfig = {
+ chainNamespace: "eip155",
+ chainId: "0x1",
+ rpcTarget: "https://rpc.ankr.com/eth",
+ displayName: "Ethereum Mainnet",
+ blockExplorer: "https://goerli.etherscan.io",
+ ticker: "ETH",
+ tickerName: "Ethereum",
+};
+
+const web3auth = new Web3Auth({
+ clientId,
+ chainConfig,
+ web3AuthNetwork: "sapphire_mainnet",
+});
+
+const privateKeyProvider = new EthereumPrivateKeyProvider({
+ config: { chainConfig },
+});
+
+const openloginAdapter = new OpenloginAdapter({
+ privateKeyProvider,
+ adapterSettings: {
+ uxMode: "redirect",
+ loginConfig: {
+ jwt: {
+ verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here
+ typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created
+ clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here
+ },
+ },
+ },
+});
+web3auth.configureAdapter(openloginAdapter);
+setWeb3auth(web3auth);
+
+// Initialize
+await web3auth.init();
+
+// Login with Yandex
+await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, {
+ loginProvider: "jwt",
+ extraLoginOptions: {
+ domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here
+ verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT
+ connection: "yandex", // Use this to skip Auth0 Modal for Yandex login
+ },
+});
+```
diff --git a/docs/dashboard-setup/dashboard-setup.mdx b/docs/dashboard-setup/dashboard-setup.mdx
index 79605abe1..cb497e621 100644
--- a/docs/dashboard-setup/dashboard-setup.mdx
+++ b/docs/dashboard-setup/dashboard-setup.mdx
@@ -69,7 +69,7 @@ At a glance you can find the following on the home page:
### Left navbar
- Workspace ( Default Organization ) with plan name.
- - Choose your Organization from the dropdown.
+ - Choose your Organization on the dropdown.
- Home (Overview)
- Projects - List of all the projects you have created.
- Archive - List of all the archived projects.
diff --git a/docs/pnp/features/custom-authentication.mdx b/docs/pnp/features/custom-authentication.mdx
index e86ba4a5e..cc5de24fb 100644
--- a/docs/pnp/features/custom-authentication.mdx
+++ b/docs/pnp/features/custom-authentication.mdx
@@ -8,7 +8,6 @@ description: "Custom Authentication | Documentation - Web3Auth"
import BYOCustomJWTTiles from "@site/src/common/docs/_byo-custom-jwt-providers.mdx";
import FederatedTiles from "@site/src/common/docs/_federated-providers.mdx";
import SocialTiles from "@site/src/common/docs/_social-login-providers.mdx";
-import SocialViaFederatedTiles from "@site/src/common/docs/_social-via-federated-providers.mdx";
Custom Authentication is the ability to integrate your own authentication flow with Web3Auth. We suggest using Custom Authentication instead of
relying on Web3Auth's default authentication Modal.
@@ -25,10 +24,6 @@ The benefits of using Custom Authentication are:
-#### Social via Federated/Identity Providers
-
-
-
### Federated / Identity Providers
@@ -37,7 +32,7 @@ The benefits of using Custom Authentication are:
:::info
-For a Custom JWT based authentication services you need to use the [`Web3Auth Plug and Play No Modal SDK`](/sdk/pnp/web/no-modal/), since the Web3Auth
+For Custom JWT based authentication services, you need to use the [`Web3Auth Plug and Play No Modal SDK`](/sdk/pnp/web/no-modal/), since the Web3Auth
Modal will only help you configure the social logins present within the Modal UI.
:::
diff --git a/sidebars.js b/sidebars.js
index d2e7ca7e9..df494290f 100644
--- a/sidebars.js
+++ b/sidebars.js
@@ -166,8 +166,14 @@ module.exports = {
"auth-provider-setup/social-providers/linkedin",
"auth-provider-setup/social-providers/github",
"auth-provider-setup/social-providers/line",
- "auth-provider-setup/social-providers/weibo",
- "auth-provider-setup/social-providers/kakao",
+ "auth-provider-setup/social-providers/baidu",
+ "auth-provider-setup/social-providers/bitbucket",
+ "auth-provider-setup/social-providers/microsoft",
+ "auth-provider-setup/social-providers/renren",
+ "auth-provider-setup/social-providers/slack",
+ "auth-provider-setup/social-providers/spotify",
+ "auth-provider-setup/social-providers/vkontakte",
+ "auth-provider-setup/social-providers/yandex",
],
collapsible: true,
collapsed: false,
diff --git a/src/common/docs/_federated-providers.mdx b/src/common/docs/_federated-providers.mdx
index 5c67a335f..f73546670 100644
--- a/src/common/docs/_federated-providers.mdx
+++ b/src/common/docs/_federated-providers.mdx
@@ -23,12 +23,6 @@ export const tileGroupsDataFederated = [
icon: "logo-firebase.png",
path: "/content-hub/guides/firebase",
},
- {
- key: "okta",
- title: "Okta",
- icon: "logo-okta.png",
- path: "/auth-provider-setup/federated-identity-providers",
- },
],
},
];
diff --git a/src/common/docs/_social-login-providers.mdx b/src/common/docs/_social-login-providers.mdx
index 5b3475369..fd3c6daa5 100644
--- a/src/common/docs/_social-login-providers.mdx
+++ b/src/common/docs/_social-login-providers.mdx
@@ -29,6 +29,96 @@ export const tileGroupsDataSocial = [
icon: "logo-discord.png",
path: "/auth-provider-setup/social-providers/discord",
},
+ {
+ key: "twitter",
+ title: "Twitter",
+ icon: "logo-twitter.png",
+ path: "/auth-provider-setup/social-providers/twitter",
+ },
+ {
+ key: "apple",
+ title: "Apple",
+ icon: "logo-apple.png",
+ path: "/auth-provider-setup/social-providers/apple",
+ },
+ {
+ key: "linkedin",
+ title: "Linkedin",
+ icon: "logo-linkedin.png",
+ path: "/auth-provider-setup/social-providers/linkedin",
+ },
+ {
+ key: "github",
+ title: "Github",
+ icon: "logo-github.png",
+ path: "/auth-provider-setup/social-providers/github",
+ },
+ {
+ key: "line",
+ title: "Line",
+ icon: "logo-line.png",
+ path: "/auth-provider-setup/social-providers/line",
+ },
+ {
+ key: "weibo",
+ title: "Weibo",
+ icon: "logo-weibo.png",
+ path: "/auth-provider-setup/social-providers/weibo",
+ },
+ {
+ key: "kakao",
+ title: "KaKao",
+ icon: "logo-kakao.png",
+ path: "/auth-provider-setup/social-providers/kakao",
+ },
+ {
+ key: "baidu",
+ title: "Baidu",
+ icon: "logo-baidu.png",
+ path: "/auth-provider-setup/social-providers/baidu",
+ },
+ {
+ key: "bitbucket",
+ title: "Bitbucket",
+ icon: "logo-bitbucket.png",
+ path: "/auth-provider-setup/social-providers/bitbucket",
+ },
+ {
+ key: "microsoft",
+ title: "Microsoft",
+ icon: "logo-microsoft.png",
+ path: "/auth-provider-setup/social-providers/microsoft",
+ },
+ {
+ key: "renren",
+ title: "RenRen",
+ icon: "logo-renren.png",
+ path: "/auth-provider-setup/social-providers/renren",
+ },
+ {
+ key: "slack",
+ title: "Slack",
+ icon: "logo-slack.png",
+ path: "/auth-provider-setup/social-providers/slack",
+ },
+ {
+ key: "spotify",
+ title: "Spotify",
+ icon: "logo-spotify.png",
+ path: "/auth-provider-setup/social-providers/spotify",
+ },
+ {
+ key: "vkontakte",
+ title: "vKontakte",
+ icon: "logo-vkontakte.png",
+ path: "/auth-provider-setup/social-providers/vkontakte",
+ },
+ {
+ key: "yandex",
+ title: "Yandex",
+ icon: "logo-yandex.png",
+ path: "/auth-provider-setup/social-providers/yandex",
+ },
],
},
];
diff --git a/src/common/docs/_social-via-federated-providers.mdx b/src/common/docs/_social-via-federated-providers.mdx
index 6aed61f2d..0ea83633a 100644
--- a/src/common/docs/_social-via-federated-providers.mdx
+++ b/src/common/docs/_social-via-federated-providers.mdx
@@ -9,55 +9,43 @@ export const tileGroupsDataSocialViaFederated = [
key: "twitter",
title: "Twitter",
icon: "logo-twitter.png",
- path: "/auth-provider-setup/federated-identity-providers#twitter",
+ path: "/auth-provider-setup/social-providers/twitter",
},
{
key: "github",
title: "Github",
icon: "logo-github.png",
- path: "/auth-provider-setup/federated-identity-providers#github",
- },
- {
- key: "reddit",
- title: "Reddit",
- icon: "logo-reddit.png",
- path: "/auth-provider-setup/federated-identity-providers#reddit",
+ path: "/auth-provider-setup/social-providers/github",
},
{
key: "linkedin",
title: "Linkedin",
icon: "logo-linkedin.png",
- path: "/auth-provider-setup/federated-identity-providers#linkedin",
+ path: "/auth-provider-setup/social-providers/linkedin",
},
{
key: "apple",
title: "Apple",
icon: "logo-apple.png",
- path: "/auth-provider-setup/federated-identity-providers#apple",
+ path: "/auth-provider-setup/social-providers/apple",
},
{
key: "line",
title: "Line",
icon: "logo-line.png",
- path: "/auth-provider-setup/federated-identity-providers#line",
- },
- {
- key: "wechat",
- title: "WeChat",
- icon: "logo-wechat.png",
- path: "/auth-provider-setup/federated-identity-providers#wechat",
+ path: "/auth-provider-setup/social-providers/line",
},
{
key: "weibo",
title: "Weibo",
icon: "logo-weibo.png",
- path: "/auth-provider-setup/federated-identity-providers#weibo",
+ path: "/auth-provider-setup/social-providers/weibo",
},
{
key: "kakao",
title: "KaKao",
icon: "logo-kakao.png",
- path: "/auth-provider-setup/federated-identity-providers#kakao",
+ path: "/auth-provider-setup/social-providers/kakao",
},
],
},
diff --git a/static/content-hub/logo-baidu.png b/static/content-hub/logo-baidu.png
new file mode 100644
index 000000000..0c9ebcbbe
Binary files /dev/null and b/static/content-hub/logo-baidu.png differ
diff --git a/static/content-hub/logo-bitbucket.png b/static/content-hub/logo-bitbucket.png
new file mode 100644
index 000000000..2d1810a23
Binary files /dev/null and b/static/content-hub/logo-bitbucket.png differ
diff --git a/static/content-hub/logo-microsoft.png b/static/content-hub/logo-microsoft.png
new file mode 100644
index 000000000..9514b866b
Binary files /dev/null and b/static/content-hub/logo-microsoft.png differ
diff --git a/static/content-hub/logo-renren.png b/static/content-hub/logo-renren.png
new file mode 100644
index 000000000..40fada9f3
Binary files /dev/null and b/static/content-hub/logo-renren.png differ
diff --git a/static/content-hub/logo-slack.png b/static/content-hub/logo-slack.png
new file mode 100644
index 000000000..fbad00516
Binary files /dev/null and b/static/content-hub/logo-slack.png differ
diff --git a/static/content-hub/logo-spotify.png b/static/content-hub/logo-spotify.png
new file mode 100644
index 000000000..e0e4eb784
Binary files /dev/null and b/static/content-hub/logo-spotify.png differ
diff --git a/static/content-hub/logo-vkontakte.png b/static/content-hub/logo-vkontakte.png
new file mode 100644
index 000000000..757b3ffed
Binary files /dev/null and b/static/content-hub/logo-vkontakte.png differ
diff --git a/static/content-hub/logo-yandex.png b/static/content-hub/logo-yandex.png
new file mode 100644
index 000000000..84f79f818
Binary files /dev/null and b/static/content-hub/logo-yandex.png differ