diff --git a/docs/auth-provider-setup/aggregate-verifier.mdx b/docs/auth-provider-setup/aggregate-verifier.mdx index 22a70d6fc..dce02a128 100644 --- a/docs/auth-provider-setup/aggregate-verifier.mdx +++ b/docs/auth-provider-setup/aggregate-verifier.mdx @@ -21,9 +21,9 @@ such verifiers are called `Single ID Verifiers`. `Client ID` field and click on `Add Sub Verifiers`. ![Select Google from Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-aggregate-google.png) 4. Next, create the second sub-verifier. Click on `Add Sub Verifiers` to add a new sub-verifier. -5. Select `Auth0` from the dropdown or choose `Custom Providers` from the radio buttons. We're selecting `Auth0` in this example. +5. Select `Auth0` on the dropdown or choose `Custom Providers` from the radio buttons. We're selecting `Auth0` in this example. ![Auth0 as sub verifier on Web3Auth Dashboard](/images/dashboard/create-verifier-aggregate-add-second-sub.png) -6. Select the `Authentication Type` based on your application need from the dropdown. We're selecting `Github` in this example. +6. Select the `Authentication Type` based on your application need on the dropdown. We're selecting `Github` in this example. ![Create Aggregate Verifiier on Web3Auth Dashboard](/images/dashboard/create-verifier-aggregate-auth0-github.png) 7. Select `Email` as the **JWT Verifier ID** and enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). diff --git a/docs/auth-provider-setup/auth-provider-setup.mdx b/docs/auth-provider-setup/auth-provider-setup.mdx index 423a4baf8..ff1fa53a5 100644 --- a/docs/auth-provider-setup/auth-provider-setup.mdx +++ b/docs/auth-provider-setup/auth-provider-setup.mdx @@ -8,7 +8,6 @@ description: "Auth Provider Setup | Documentation - Web3Auth" import BYOCustomJWTTiles from "@site/src/common/docs/_byo-custom-jwt-providers.mdx"; import FederatedTiles from "@site/src/common/docs/_federated-providers.mdx"; import SocialTiles from "@site/src/common/docs/_social-login-providers.mdx"; -import SocialViaFederatedTiles from "@site/src/common/docs/_social-via-federated-providers.mdx"; Auth Provider setup refers to the capability of creating a verifier with Web3Auth. We recommend you set a verifier to use the Custom Authentication feature of Web3Auth. @@ -19,10 +18,6 @@ feature of Web3Auth. -#### Social via Federated/Identity Providers - - - ### Federated / Identity Providers diff --git a/docs/auth-provider-setup/federated-identity-providers.mdx b/docs/auth-provider-setup/federated-identity-providers.mdx index 73b64be3b..eec59529c 100644 --- a/docs/auth-provider-setup/federated-identity-providers.mdx +++ b/docs/auth-provider-setup/federated-identity-providers.mdx @@ -19,7 +19,7 @@ Note: This will require you to register an app with the Federated / Identity Pro 1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. ![Auth0 - Login Providers list on Web3Auth Dashboard](/dashboard/verifiers/login-providers-list.png) -2. Select the `Authentication Type` based on your application need from the dropdown. +2. Select the `Authentication Type` based on your application need on the dropdown. ![Auth0 Authentication Type list on Web3Auth Dashboard](/dashboard/verifiers/auth0-authentication-type-list.png) 3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). diff --git a/docs/auth-provider-setup/social-providers/apple.mdx b/docs/auth-provider-setup/social-providers/apple.mdx index 771112d01..89d18fe41 100644 --- a/docs/auth-provider-setup/social-providers/apple.mdx +++ b/docs/auth-provider-setup/social-providers/apple.mdx @@ -10,7 +10,7 @@ description: "Apple Social Login with Web3Auth | Documentation - Web3Auth" 1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. ![Apple - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) -2. Select `Apple` as the **Authentication Type** based from the dropdown. +2. Select `Apple` as the **Authentication Type** based on the dropdown. ![Apple - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) 3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). @@ -21,7 +21,7 @@ description: "Apple Social Login with Web3Auth | Documentation - Web3Auth" 4. Add the [Apple Social Connection](https://marketplace.auth0.com/integrations/apple-social-connection) to your Auth0 application. 5. Click on the `Create Verifier` button. -## Example +### Example ```tsx import { Web3AuthNoModal } from "@web3auth/no-modal"; diff --git a/docs/auth-provider-setup/social-providers/baidu.mdx b/docs/auth-provider-setup/social-providers/baidu.mdx new file mode 100644 index 000000000..e0407b89e --- /dev/null +++ b/docs/auth-provider-setup/social-providers/baidu.mdx @@ -0,0 +1,81 @@ +--- +title: Baidu Login with Web3Auth +sidebar_label: Baidu +displayed_sidebar: docs +description: "Baidu Login with Web3Auth | Documentation - Web3Auth" +--- + +## Set up [Baidu](https://marketplace.auth0.com/integrations/baidu-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Baidu - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Other` as the **Authentication Type** based on the dropdown. + ![Baidu - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Baidu - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Baidu - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Baidu Social Connection](https://marketplace.auth0.com/integrations/baidu-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `Baidu` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Baidu +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "baidu", // Use this to skip Auth0 Modal for Baidu login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/bitbucket.mdx b/docs/auth-provider-setup/social-providers/bitbucket.mdx new file mode 100644 index 000000000..e98d9e5a3 --- /dev/null +++ b/docs/auth-provider-setup/social-providers/bitbucket.mdx @@ -0,0 +1,81 @@ +--- +title: Bitbucket Login with Web3Auth +sidebar_label: Bitbucket +displayed_sidebar: docs +description: "Bitbucket Login with Web3Auth | Documentation - Web3Auth" +--- + +## Set up [Bitbucket](https://marketplace.auth0.com/integrations/bitbucket-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Bitbucket - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Other` as the **Authentication Type** based on the dropdown. + ![Bitbucket - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Bitbucket - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Bitbucket - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Bitbucket Social Connection](https://marketplace.auth0.com/integrations/bitbucket-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `Bitbucket` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Bitbucket +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "bitbucket", // Use this to skip Auth0 Modal for Bitbucket login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/discord.mdx b/docs/auth-provider-setup/social-providers/discord.mdx index dbe670a27..e9f96d81a 100644 --- a/docs/auth-provider-setup/social-providers/discord.mdx +++ b/docs/auth-provider-setup/social-providers/discord.mdx @@ -31,14 +31,14 @@ import Tabs from "@theme/Tabs"; ![Discord OAuth2.0 App Client ID and Secret](/content-hub/social-providers/discord/discord-clientid-secret.png) -## Set up Discord Custom Authentication +## Set up Discord 1. Create a verifier for your Discord application by selecting `Discord` as the Login provider from this modal. ![Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) 2. Paste the **Client ID** from the Discord App(above) to the `Client ID` field and click on Create. ![Discord Client ID on Web3Auth Dashboard](/images/dashboard/create-verifier-discord.png) -## Example +### Example + +## Set up [Facebook](https://marketplace.auth0.com/integrations/facebook-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Facebook - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Facebook` as the **Authentication Type** based on the dropdown. + ![Facebook - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Facebook - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Facebook - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Facebook Social Connection](https://marketplace.auth0.com/integrations/facebook-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `Facebook` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "hUVVf4SEsZT7syOiL0gLU9hFEtm2gQ6O", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Facebook +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.au.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "facebook", // Use this to skip Auth0 Modal for Facebook login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/github.mdx b/docs/auth-provider-setup/social-providers/github.mdx index 8b9ce70a6..71734f8bc 100644 --- a/docs/auth-provider-setup/social-providers/github.mdx +++ b/docs/auth-provider-setup/social-providers/github.mdx @@ -10,7 +10,7 @@ description: "Github Social Login with Web3Auth | Documentation - Web3Auth" 1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. ![Twitter - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) -2. Select the `GitHub` as the **Authentication Type** based from the dropdown. +2. Select the `GitHub` as the **Authentication Type** based on the dropdown. ![Twitter - Auth0 Authentication Type list on Web3Auth Dashboard](/dashboard/verifiers/auth0-authentication-type-list.png) 3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). @@ -21,7 +21,7 @@ description: "Github Social Login with Web3Auth | Documentation - Web3Auth" 4. Add the [GitHub Social Connection](https://marketplace.auth0.com/integrations/github-social-connection) to your Auth0 application. 5. Click on the `Create` button to create `GitHub` Custom Authentication via Auth0 verifier. -## Example +### Example ```tsx import { Web3AuthNoModal } from "@web3auth/no-modal"; diff --git a/docs/auth-provider-setup/social-providers/google.mdx b/docs/auth-provider-setup/social-providers/google.mdx index 9e376fa45..4d406f05e 100644 --- a/docs/auth-provider-setup/social-providers/google.mdx +++ b/docs/auth-provider-setup/social-providers/google.mdx @@ -26,7 +26,7 @@ import Tabs from "@theme/Tabs"; 3. Obtain the OAuth `Client ID` from your [App on the Google Developer dashboard](https://console.developers.google.com/) -## Set up Google Custom Authentication +## Set up Google 1. Create a verifier for your Google application by first clicking on `Social Login Provider` and then selecting `Google` as the Login provider from the dropdown list. @@ -43,7 +43,7 @@ import Tabs from "@theme/Tabs"; ::: -## Example +### Example + +## Set up [Google](https://marketplace.auth0.com/integrations/google-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Google - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Google` as the **Authentication Type** based on the dropdown. + ![Google - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Google - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Google - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Google Social Connection](https://marketplace.auth0.com/integrations/google-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `Google` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "hUVVf4SEsZT7syOiL0gLU9hFEtm2gQ6O", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Google +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.au.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "google-oauth2", // Use this to skip Auth0 Modal for Google login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/kakao.mdx b/docs/auth-provider-setup/social-providers/kakao.mdx index c6e0e15f2..65760c614 100644 --- a/docs/auth-provider-setup/social-providers/kakao.mdx +++ b/docs/auth-provider-setup/social-providers/kakao.mdx @@ -10,7 +10,7 @@ description: "KaKao Social Login with Web3Auth | Documentation - Web3Auth" 1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. ![KaKao - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) -2. Select the `KaKao` as the **Authentication Type** based from the dropdown. +2. Select the `KaKao` as the **Authentication Type** based on the dropdown. ![KaKao - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) 3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). @@ -21,7 +21,7 @@ description: "KaKao Social Login with Web3Auth | Documentation - Web3Auth" 4. Add the [KaKao Social Connection](https://marketplace.auth0.com/integrations/kakao-login) to your Auth0 application. 5. Click on the `Create` button to create `KaKao` Custom Authentication via Auth0 verifier. -## Example +### Example ```tsx import { Web3AuthNoModal } from "@web3auth/no-modal"; diff --git a/docs/auth-provider-setup/social-providers/line.mdx b/docs/auth-provider-setup/social-providers/line.mdx index 2476b5a37..4f02ddbef 100644 --- a/docs/auth-provider-setup/social-providers/line.mdx +++ b/docs/auth-provider-setup/social-providers/line.mdx @@ -10,7 +10,7 @@ description: "Line Social Login with Web3Auth | Documentation - Web3Auth" 1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. ![LINE - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) -2. Select the `LINE` as the **Authentication Type** based from the dropdown. +2. Select the `LINE` as the **Authentication Type** based on the dropdown. ![LINE - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) 3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). @@ -21,7 +21,7 @@ description: "Line Social Login with Web3Auth | Documentation - Web3Auth" 4. Add the [LINE Social Connection](https://marketplace.auth0.com/integrations/line-social-connection) to your Auth0 application. 5. Click on the `Create` button to create `LINE` Custom Authentication via Auth0 verifier. -## Example +### Example ```tsx import { Web3AuthNoModal } from "@web3auth/no-modal"; @@ -57,9 +57,9 @@ const openloginAdapter = new OpenloginAdapter({ uxMode: "redirect", loginConfig: { jwt: { - verifier: "w3a-auth0-demo", // Pass the Verifier name here + verifier: "w3a-auth0-jp-demo", // Pass the Verifier name here typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created - clientId: "hUVVf4SEsZT7syOiL0gLU9hFEtm2gQ6O", // Pass on the Auth0 `Client ID` here + clientId: "N9jnKM2Fo8PFRj8rYM9I7rWX1FW6X5xx", // Pass on the Auth0 `Client ID` here }, }, }, @@ -74,7 +74,7 @@ await web3auth.init(); await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { loginProvider: "jwt", extraLoginOptions: { - domain: "https://web3auth.au.auth0.com", // Pass on the Auth0 `Domain` here + domain: "https://web3auth.jp.auth0.com", // Pass on the Auth0 `Domain` here verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT connection: "line", // Use this to skip Auth0 Modal for Line login }, diff --git a/docs/auth-provider-setup/social-providers/linkedin.mdx b/docs/auth-provider-setup/social-providers/linkedin.mdx index c60d35b3a..3a0a648df 100644 --- a/docs/auth-provider-setup/social-providers/linkedin.mdx +++ b/docs/auth-provider-setup/social-providers/linkedin.mdx @@ -10,7 +10,7 @@ description: "LinkedIn Social Login with Web3Auth | Documentation - Web3Auth" 1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. ![LinkedIn - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) -2. Select `LinkedIn` as the **Authentication Type** based from the dropdown. +2. Select `LinkedIn` as the **Authentication Type** based on the dropdown. ![LinkedIn - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) 3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). @@ -21,7 +21,7 @@ description: "LinkedIn Social Login with Web3Auth | Documentation - Web3Auth" 4. Add the [LinkedIn Social Connection](https://marketplace.auth0.com/integrations/linkedin-social-connection) to your Auth0 application. 5. Click on the `Create` button to create `LinkedIn` Custom Authentication via Auth0 verifier. -## Example +### Example ```tsx import { Web3AuthNoModal } from "@web3auth/no-modal"; diff --git a/docs/auth-provider-setup/social-providers/microsoft.mdx b/docs/auth-provider-setup/social-providers/microsoft.mdx new file mode 100644 index 000000000..8b47bcb4f --- /dev/null +++ b/docs/auth-provider-setup/social-providers/microsoft.mdx @@ -0,0 +1,81 @@ +--- +title: Microsoft Social Login with Web3Auth +sidebar_label: Microsoft +displayed_sidebar: docs +description: "Microsoft Social Login with Web3Auth | Documentation - Web3Auth" +--- + +## Set up [Microsoft](https://marketplace.auth0.com/integrations/microsoft-account-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Microsoft - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Other` as the **Authentication Type** based on the dropdown. + ![Microsoft - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Microsoft - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Microsoft - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Microsoft Social Connection](https://marketplace.auth0.com/integrations/microsoft-account-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `Microsoft` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Microsoft +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "windowslive", // Use this to skip Auth0 Modal for Microsoft login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/renren.mdx b/docs/auth-provider-setup/social-providers/renren.mdx new file mode 100644 index 000000000..31c805050 --- /dev/null +++ b/docs/auth-provider-setup/social-providers/renren.mdx @@ -0,0 +1,81 @@ +--- +title: RenRen Login with Web3Auth +sidebar_label: RenRen +displayed_sidebar: docs +description: "RenRen Login with Web3Auth | Documentation - Web3Auth" +--- + +## Set up [RenRen](https://marketplace.auth0.com/integrations/renren-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![RenRen - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Other` as the **Authentication Type** based on the dropdown. + ![RenRen - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![RenRen - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![RenRen - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [RenRen Social Connection](https://marketplace.auth0.com/integrations/renren-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `RenRen` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with RenRen +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "renren", // Use this to skip Auth0 Modal for RenRen login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/slack.mdx b/docs/auth-provider-setup/social-providers/slack.mdx new file mode 100644 index 000000000..ddb8f794e --- /dev/null +++ b/docs/auth-provider-setup/social-providers/slack.mdx @@ -0,0 +1,81 @@ +--- +title: Slack Login with Web3Auth +sidebar_label: Slack +displayed_sidebar: docs +description: "Slack Login with Web3Auth | Documentation - Web3Auth" +--- + +## Set up [Slack](https://marketplace.auth0.com/integrations/sign-in-with-slack) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Slack - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Other` as the **Authentication Type** based on the dropdown. + ![Slack - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Slack - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Slack - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Slack Social Connection](https://marketplace.auth0.com/integrations/sign-in-with-slack) to your Auth0 application. +5. Click on the `Create` button to create `Slack` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Slack +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "sign-in-with-slack", // Use this to skip Auth0 Modal for Slack login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/social-providers.mdx b/docs/auth-provider-setup/social-providers/social-providers.mdx index 0e597cc96..e6ea7997b 100644 --- a/docs/auth-provider-setup/social-providers/social-providers.mdx +++ b/docs/auth-provider-setup/social-providers/social-providers.mdx @@ -5,7 +5,6 @@ description: "Social Providers | Documentation - Web3Auth" --- import SocialTiles from "@site/src/common/docs/_social-login-providers.mdx"; -import SocialViaFederatedTiles from "@site/src/common/docs/_social-via-federated-providers.mdx"; Social providers allow you to register your app directly with [implicit grant support ](https://oauth.net/2/grant-types/implicit/)and use them with the Web3Auth SDK. @@ -16,7 +15,3 @@ used in the Custom Authentication. ### Social via Dashboard - -### Social via Federated/Identity Providers - - diff --git a/docs/auth-provider-setup/social-providers/spotify.mdx b/docs/auth-provider-setup/social-providers/spotify.mdx new file mode 100644 index 000000000..4036a8572 --- /dev/null +++ b/docs/auth-provider-setup/social-providers/spotify.mdx @@ -0,0 +1,81 @@ +--- +title: Spotify Login with Web3Auth +sidebar_label: Spotify +displayed_sidebar: docs +description: "Spotify Login with Web3Auth | Documentation - Web3Auth" +--- + +## Set up [Spotify](https://marketplace.auth0.com/integrations/spotify-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Spotify - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Other` as the **Authentication Type** based on the dropdown. + ![Spotify - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Spotify - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Spotify - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Spotify Social Connection](https://marketplace.auth0.com/integrations/spotify-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `Spotify` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-jp-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "N9jnKM2Fo8PFRj8rYM9I7rWX1FW6X5xx", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Spotify +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.jp.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "spotify", // Use this to skip Auth0 Modal for Spotify login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/twitch.mdx b/docs/auth-provider-setup/social-providers/twitch.mdx index c003bcf3a..eb95bac44 100644 --- a/docs/auth-provider-setup/social-providers/twitch.mdx +++ b/docs/auth-provider-setup/social-providers/twitch.mdx @@ -34,14 +34,14 @@ import Tabs from "@theme/Tabs"; ![Twitch OAuth2.0 App Manage](/content-hub/social-providers/twitch/twitch-client-id.png) -## Set up Twitch Custom Authentication +## Set up Twitch 1. Create a verifier for your Twitch application by selecting `Twitch` as the Login provider from this modal. ![Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) 2. Paste the **Client ID** from the Twitch App(above) to the `Client ID` field and click on Create. ![Twitch Client ID on Web3Auth Dashboard](/images/dashboard/create-verifier-twitch.png) -## Example +### Example + +## Set up [Twitch](https://marketplace.auth0.com/integrations/twitch-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Twitch - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Twitch` as the **Authentication Type** based on the dropdown. + ![Twitch - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Twitch - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Twitch - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Twitch Social Connection](https://marketplace.auth0.com/integrations/twitch-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `Twitch` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-jp-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "N9jnKM2Fo8PFRj8rYM9I7rWX1FW6X5xx", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Twitch +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.jp.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "twitch", // Use this to skip Auth0 Modal for Twitch login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/twitter.mdx b/docs/auth-provider-setup/social-providers/twitter.mdx index f69489bd8..579620dad 100644 --- a/docs/auth-provider-setup/social-providers/twitter.mdx +++ b/docs/auth-provider-setup/social-providers/twitter.mdx @@ -10,7 +10,7 @@ description: "Twitter Social Login with Web3Auth | Documentation - Web3Auth" 1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. ![Twitter - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) -2. Select `Twitter` as the **Authentication Type** based from the dropdown. +2. Select `Twitter` as the **Authentication Type** based on the dropdown. ![Twitter - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) 3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). @@ -21,7 +21,7 @@ description: "Twitter Social Login with Web3Auth | Documentation - Web3Auth" 4. Add the [Twitter Social Connection](https://marketplace.auth0.com/integrations/twitter-social-connection) to your Auth0 application. 5. Click on the `Create` button to create `Twitter` Custom Authentication via Auth0 verifier. -## Example +### Example ```tsx import { Web3AuthNoModal } from "@web3auth/no-modal"; diff --git a/docs/auth-provider-setup/social-providers/vkontakte.mdx b/docs/auth-provider-setup/social-providers/vkontakte.mdx new file mode 100644 index 000000000..b03dc7130 --- /dev/null +++ b/docs/auth-provider-setup/social-providers/vkontakte.mdx @@ -0,0 +1,82 @@ +--- +title: ВКонтакте (vKontakte) Login with Web3Auth +sidebar_label: ВКонтакте (vKontakte) +displayed_sidebar: docs +description: "ВКонтакте (vKontakte) Login with Web3Auth | Documentation - Web3Auth" +--- + +## Set up [ВКонтакте (vKontakte)](https://marketplace.auth0.com/integrations/vkontakte-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![ВКонтакте (vKontakte) - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Other` as the **Authentication Type** based on the dropdown. + ![ВКонтакте (vKontakte) - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![ВКонтакте (vKontakte) - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![ВКонтакте (vKontakte) - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [ВКонтакте (vKontakte) Social Connection](https://marketplace.auth0.com/integrations/vkontakte-social-connection) to your Auth0 + application. +5. Click on the `Create` button to create `ВКонтакте (vKontakte)` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with ВКонтакте (vKontakte) +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "vkontakte", // Use this to skip Auth0 Modal for ВКонтакте (vKontakte) login + }, +}); +``` diff --git a/docs/auth-provider-setup/social-providers/weibo.mdx b/docs/auth-provider-setup/social-providers/weibo.mdx index 2f6b9b879..768a6ff28 100644 --- a/docs/auth-provider-setup/social-providers/weibo.mdx +++ b/docs/auth-provider-setup/social-providers/weibo.mdx @@ -1,7 +1,6 @@ --- title: Weibo Social Login with Web3Auth sidebar_label: Weibo - displayed_sidebar: docs description: "Weibo Social Login with Web3Auth | Documentation - Web3Auth" --- @@ -10,7 +9,7 @@ description: "Weibo Social Login with Web3Auth | Documentation - Web3Auth" 1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. ![Weibo - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) -2. Select the `Weibo` as the **Authentication Type** based from the dropdown. +2. Select the `Weibo` as the **Authentication Type** based on the dropdown. ![Weibo - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) 3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application [here](https://auth0.com/docs/quickstart/webapp/). @@ -21,7 +20,7 @@ description: "Weibo Social Login with Web3Auth | Documentation - Web3Auth" 4. Add the [Weibo Social Connection](https://marketplace.auth0.com/integrations/weibo-social-connection) to your Auth0 application. 5. Click on the `Create` button to create `Weibo` Custom Authentication via Auth0 verifier. -## Example +### Example ```tsx import { Web3AuthNoModal } from "@web3auth/no-modal"; @@ -57,9 +56,9 @@ const openloginAdapter = new OpenloginAdapter({ uxMode: "redirect", loginConfig: { jwt: { - verifier: "w3a-auth0-demo", // Pass the Verifier name here + verifier: "w3a-auth0-jp-demo", // Pass the Verifier name here typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created - clientId: "hUVVf4SEsZT7syOiL0gLU9hFEtm2gQ6O", // Pass on the Auth0 `Client ID` here + clientId: "N9jnKM2Fo8PFRj8rYM9I7rWX1FW6X5xx", // Pass on the Auth0 `Client ID` here }, }, }, @@ -74,7 +73,7 @@ await web3auth.init(); await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { loginProvider: "jwt", extraLoginOptions: { - domain: "https://web3auth.au.auth0.com", // Pass on the Auth0 `Domain` here + domain: "https://web3auth.jp.auth0.com", // Pass on the Auth0 `Domain` here verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT connection: "weibo", // Use this to skip Auth0 Modal for Weibo login }, diff --git a/docs/auth-provider-setup/social-providers/yandex.mdx b/docs/auth-provider-setup/social-providers/yandex.mdx new file mode 100644 index 000000000..7fb2f8d3f --- /dev/null +++ b/docs/auth-provider-setup/social-providers/yandex.mdx @@ -0,0 +1,81 @@ +--- +title: Yandex Login with Web3Auth +sidebar_label: Yandex +displayed_sidebar: docs +description: "Yandex Login with Web3Auth | Documentation - Web3Auth" +--- + +## Set up [Yandex](https://marketplace.auth0.com/integrations/yandex-social-connection) via Auth0 + +1. Create a verifier for your Auth0 application by selecting `Auth0` as the Login provider from this modal. + ![Yandex - Login Providers list on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0.png) +2. Select the `Other` as the **Authentication Type** based on the dropdown. + ![Yandex - Auth0 Authentication Type list on Web3Auth Dashboard](/images/dashboard/create-verifier-google.png) +3. Enter the `Auth0 Client ID` and `Auth0 Domain` from your Auth0 application. See how to create a new Auth0 application + [here](https://auth0.com/docs/quickstart/webapp/). + + ![Yandex - Domain and Client ID from Auth0 Dashboard](/images/dashboard/create-verifier-auth0-filled-common.png) + ![Yandex - Auth0 Client ID and Auth0 Domain on Web3Auth Dashboard](/images/dashboard/create-verifier-auth0-unfilled.png) + +4. Add the [Yandex Social Connection](https://marketplace.auth0.com/integrations/yandex-social-connection) to your Auth0 application. +5. Click on the `Create` button to create `Yandex` Custom Authentication via Auth0 verifier. + +### Example + +```tsx +import { Web3AuthNoModal } from "@web3auth/no-modal"; +import { OpenloginAdapter } from "@web3auth/openlogin-adapter"; +import { EthereumPrivateKeyProvider } from "@web3auth/ethereum-provider"; + +const clientId = "BPi5PB_UiIZ-cPz1GtV5i1I2iOSOHuimiXBI0e-Oe_u6X3oVAbCiAZOTEBtTXw4tsluTITPqA8zMsfxIKMjiqNQ"; +// get it from https://dashboard.web3auth.io by creating a project. + +const chainConfig = { + chainNamespace: "eip155", + chainId: "0x1", + rpcTarget: "https://rpc.ankr.com/eth", + displayName: "Ethereum Mainnet", + blockExplorer: "https://goerli.etherscan.io", + ticker: "ETH", + tickerName: "Ethereum", +}; + +const web3auth = new Web3Auth({ + clientId, + chainConfig, + web3AuthNetwork: "sapphire_mainnet", +}); + +const privateKeyProvider = new EthereumPrivateKeyProvider({ + config: { chainConfig }, +}); + +const openloginAdapter = new OpenloginAdapter({ + privateKeyProvider, + adapterSettings: { + uxMode: "redirect", + loginConfig: { + jwt: { + verifier: "w3a-auth0-uk-demo", // Pass the Verifier name here + typeOfLogin: "jwt", // Pass on the login provider of the verifier you've created + clientId: "OfDAVldBEGslU9wjiWyQ1LPWOWNnnzim", // Pass on the Auth0 `Client ID` here + }, + }, + }, +}); +web3auth.configureAdapter(openloginAdapter); +setWeb3auth(web3auth); + +// Initialize +await web3auth.init(); + +// Login with Yandex +await web3auth.connectTo(WALLET_ADAPTERS.OPENLOGIN, { + loginProvider: "jwt", + extraLoginOptions: { + domain: "https://web3auth.uk.auth0.com", // Pass on the Auth0 `Domain` here + verifierIdField: "sub", // Pass on the field name of the `sub` field in the JWT + connection: "yandex", // Use this to skip Auth0 Modal for Yandex login + }, +}); +``` diff --git a/docs/dashboard-setup/dashboard-setup.mdx b/docs/dashboard-setup/dashboard-setup.mdx index 79605abe1..cb497e621 100644 --- a/docs/dashboard-setup/dashboard-setup.mdx +++ b/docs/dashboard-setup/dashboard-setup.mdx @@ -69,7 +69,7 @@ At a glance you can find the following on the home page: ### Left navbar - Workspace ( Default Organization ) with plan name. - - Choose your Organization from the dropdown. + - Choose your Organization on the dropdown. - Home (Overview) - Projects - List of all the projects you have created. - Archive - List of all the archived projects. diff --git a/docs/pnp/features/custom-authentication.mdx b/docs/pnp/features/custom-authentication.mdx index e86ba4a5e..cc5de24fb 100644 --- a/docs/pnp/features/custom-authentication.mdx +++ b/docs/pnp/features/custom-authentication.mdx @@ -8,7 +8,6 @@ description: "Custom Authentication | Documentation - Web3Auth" import BYOCustomJWTTiles from "@site/src/common/docs/_byo-custom-jwt-providers.mdx"; import FederatedTiles from "@site/src/common/docs/_federated-providers.mdx"; import SocialTiles from "@site/src/common/docs/_social-login-providers.mdx"; -import SocialViaFederatedTiles from "@site/src/common/docs/_social-via-federated-providers.mdx"; Custom Authentication is the ability to integrate your own authentication flow with Web3Auth. We suggest using Custom Authentication instead of relying on Web3Auth's default authentication Modal. @@ -25,10 +24,6 @@ The benefits of using Custom Authentication are: -#### Social via Federated/Identity Providers - - - ### Federated / Identity Providers @@ -37,7 +32,7 @@ The benefits of using Custom Authentication are: :::info -For a Custom JWT based authentication services you need to use the [`Web3Auth Plug and Play No Modal SDK`](/sdk/pnp/web/no-modal/), since the Web3Auth +For Custom JWT based authentication services, you need to use the [`Web3Auth Plug and Play No Modal SDK`](/sdk/pnp/web/no-modal/), since the Web3Auth Modal will only help you configure the social logins present within the Modal UI. ::: diff --git a/sidebars.js b/sidebars.js index d2e7ca7e9..df494290f 100644 --- a/sidebars.js +++ b/sidebars.js @@ -166,8 +166,14 @@ module.exports = { "auth-provider-setup/social-providers/linkedin", "auth-provider-setup/social-providers/github", "auth-provider-setup/social-providers/line", - "auth-provider-setup/social-providers/weibo", - "auth-provider-setup/social-providers/kakao", + "auth-provider-setup/social-providers/baidu", + "auth-provider-setup/social-providers/bitbucket", + "auth-provider-setup/social-providers/microsoft", + "auth-provider-setup/social-providers/renren", + "auth-provider-setup/social-providers/slack", + "auth-provider-setup/social-providers/spotify", + "auth-provider-setup/social-providers/vkontakte", + "auth-provider-setup/social-providers/yandex", ], collapsible: true, collapsed: false, diff --git a/src/common/docs/_federated-providers.mdx b/src/common/docs/_federated-providers.mdx index 5c67a335f..f73546670 100644 --- a/src/common/docs/_federated-providers.mdx +++ b/src/common/docs/_federated-providers.mdx @@ -23,12 +23,6 @@ export const tileGroupsDataFederated = [ icon: "logo-firebase.png", path: "/content-hub/guides/firebase", }, - { - key: "okta", - title: "Okta", - icon: "logo-okta.png", - path: "/auth-provider-setup/federated-identity-providers", - }, ], }, ]; diff --git a/src/common/docs/_social-login-providers.mdx b/src/common/docs/_social-login-providers.mdx index 5b3475369..fd3c6daa5 100644 --- a/src/common/docs/_social-login-providers.mdx +++ b/src/common/docs/_social-login-providers.mdx @@ -29,6 +29,96 @@ export const tileGroupsDataSocial = [ icon: "logo-discord.png", path: "/auth-provider-setup/social-providers/discord", }, + { + key: "twitter", + title: "Twitter", + icon: "logo-twitter.png", + path: "/auth-provider-setup/social-providers/twitter", + }, + { + key: "apple", + title: "Apple", + icon: "logo-apple.png", + path: "/auth-provider-setup/social-providers/apple", + }, + { + key: "linkedin", + title: "Linkedin", + icon: "logo-linkedin.png", + path: "/auth-provider-setup/social-providers/linkedin", + }, + { + key: "github", + title: "Github", + icon: "logo-github.png", + path: "/auth-provider-setup/social-providers/github", + }, + { + key: "line", + title: "Line", + icon: "logo-line.png", + path: "/auth-provider-setup/social-providers/line", + }, + { + key: "weibo", + title: "Weibo", + icon: "logo-weibo.png", + path: "/auth-provider-setup/social-providers/weibo", + }, + { + key: "kakao", + title: "KaKao", + icon: "logo-kakao.png", + path: "/auth-provider-setup/social-providers/kakao", + }, + { + key: "baidu", + title: "Baidu", + icon: "logo-baidu.png", + path: "/auth-provider-setup/social-providers/baidu", + }, + { + key: "bitbucket", + title: "Bitbucket", + icon: "logo-bitbucket.png", + path: "/auth-provider-setup/social-providers/bitbucket", + }, + { + key: "microsoft", + title: "Microsoft", + icon: "logo-microsoft.png", + path: "/auth-provider-setup/social-providers/microsoft", + }, + { + key: "renren", + title: "RenRen", + icon: "logo-renren.png", + path: "/auth-provider-setup/social-providers/renren", + }, + { + key: "slack", + title: "Slack", + icon: "logo-slack.png", + path: "/auth-provider-setup/social-providers/slack", + }, + { + key: "spotify", + title: "Spotify", + icon: "logo-spotify.png", + path: "/auth-provider-setup/social-providers/spotify", + }, + { + key: "vkontakte", + title: "vKontakte", + icon: "logo-vkontakte.png", + path: "/auth-provider-setup/social-providers/vkontakte", + }, + { + key: "yandex", + title: "Yandex", + icon: "logo-yandex.png", + path: "/auth-provider-setup/social-providers/yandex", + }, ], }, ]; diff --git a/src/common/docs/_social-via-federated-providers.mdx b/src/common/docs/_social-via-federated-providers.mdx index 6aed61f2d..0ea83633a 100644 --- a/src/common/docs/_social-via-federated-providers.mdx +++ b/src/common/docs/_social-via-federated-providers.mdx @@ -9,55 +9,43 @@ export const tileGroupsDataSocialViaFederated = [ key: "twitter", title: "Twitter", icon: "logo-twitter.png", - path: "/auth-provider-setup/federated-identity-providers#twitter", + path: "/auth-provider-setup/social-providers/twitter", }, { key: "github", title: "Github", icon: "logo-github.png", - path: "/auth-provider-setup/federated-identity-providers#github", - }, - { - key: "reddit", - title: "Reddit", - icon: "logo-reddit.png", - path: "/auth-provider-setup/federated-identity-providers#reddit", + path: "/auth-provider-setup/social-providers/github", }, { key: "linkedin", title: "Linkedin", icon: "logo-linkedin.png", - path: "/auth-provider-setup/federated-identity-providers#linkedin", + path: "/auth-provider-setup/social-providers/linkedin", }, { key: "apple", title: "Apple", icon: "logo-apple.png", - path: "/auth-provider-setup/federated-identity-providers#apple", + path: "/auth-provider-setup/social-providers/apple", }, { key: "line", title: "Line", icon: "logo-line.png", - path: "/auth-provider-setup/federated-identity-providers#line", - }, - { - key: "wechat", - title: "WeChat", - icon: "logo-wechat.png", - path: "/auth-provider-setup/federated-identity-providers#wechat", + path: "/auth-provider-setup/social-providers/line", }, { key: "weibo", title: "Weibo", icon: "logo-weibo.png", - path: "/auth-provider-setup/federated-identity-providers#weibo", + path: "/auth-provider-setup/social-providers/weibo", }, { key: "kakao", title: "KaKao", icon: "logo-kakao.png", - path: "/auth-provider-setup/federated-identity-providers#kakao", + path: "/auth-provider-setup/social-providers/kakao", }, ], }, diff --git a/static/content-hub/logo-baidu.png b/static/content-hub/logo-baidu.png new file mode 100644 index 000000000..0c9ebcbbe Binary files /dev/null and b/static/content-hub/logo-baidu.png differ diff --git a/static/content-hub/logo-bitbucket.png b/static/content-hub/logo-bitbucket.png new file mode 100644 index 000000000..2d1810a23 Binary files /dev/null and b/static/content-hub/logo-bitbucket.png differ diff --git a/static/content-hub/logo-microsoft.png b/static/content-hub/logo-microsoft.png new file mode 100644 index 000000000..9514b866b Binary files /dev/null and b/static/content-hub/logo-microsoft.png differ diff --git a/static/content-hub/logo-renren.png b/static/content-hub/logo-renren.png new file mode 100644 index 000000000..40fada9f3 Binary files /dev/null and b/static/content-hub/logo-renren.png differ diff --git a/static/content-hub/logo-slack.png b/static/content-hub/logo-slack.png new file mode 100644 index 000000000..fbad00516 Binary files /dev/null and b/static/content-hub/logo-slack.png differ diff --git a/static/content-hub/logo-spotify.png b/static/content-hub/logo-spotify.png new file mode 100644 index 000000000..e0e4eb784 Binary files /dev/null and b/static/content-hub/logo-spotify.png differ diff --git a/static/content-hub/logo-vkontakte.png b/static/content-hub/logo-vkontakte.png new file mode 100644 index 000000000..757b3ffed Binary files /dev/null and b/static/content-hub/logo-vkontakte.png differ diff --git a/static/content-hub/logo-yandex.png b/static/content-hub/logo-yandex.png new file mode 100644 index 000000000..84f79f818 Binary files /dev/null and b/static/content-hub/logo-yandex.png differ