You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
And all of the the key store and token machinery. Then I handle signup, email verification, and various other things.
Along the way we have developed a few things that might find a home in authn-server. I'll list them here, and if you are interested I can open separate issues with the code we have:
Login and consent endpoints that work with Ory Hydra: https://github.com/ory/hydra so that Pericyte can act as a compliant OpenID connect ID provider backed by keratin
SendGrid integration for sending emails - this sits on top of the redis worker queues - you can configure various templates for password reset, passwordless login, etc
Email verification - not clear this really fits, but this is a new token flow to verify a change in email, might apply when UsernameIsEmail. The token holds the account ID plus the email address.
A PostSignup endpoint and purely email based signup flow - you get a an email verification token - we maintain the invariant user can log in iff user's email has been verified
A kind of pattern for working with an embedded AccountStore and a Transactor that makes it reasonably neat to do updates to keratin and our user profile in a single shot whilst keeping the notional separation - we don't modify keratin tables or core services. This might make sense of an example of library usage. It took a bit of getting right.
Let me know if you'd like to see a bit more on any of the above, and I'll try to get round to it.
The text was updated successfully, but these errors were encountered:
👍 taskq looks like a direct upgrade to WebhookSender
Hydra integration is pretty awesome! Is this a responsibility of the host app, though? I would imagine the host app is responsible for providing Login and Consent but may rely on AuthN for functionality of the Login page in particular. Maybe this deserves a writeup for https://keratin.github.io/authn-server?
I consider this a responsibility of the host app. I don't want to get into email templating or SMTP vendor selection (but SendGrid is my favorite!).
Nice! I do the same in my Ruby app with a custom JWT. I've generalized the pattern for any one-click email action.
I'm nearing completion of the first cut of my project (named Pericyte) that uses Keratin as a library, so thanks for that!
The way it has ended up is I use the core keratin routes:
And all of the the key store and token machinery. Then I handle signup, email verification, and various other things.
Along the way we have developed a few things that might find a home in authn-server. I'll list them here, and if you are interested I can open separate issues with the code we have:
UsernameIsEmail
. The token holds the account ID plus the email address.PostSignup
endpoint and purely email based signup flow - you get a an email verification token - we maintain the invariantuser can log in iff user's email has been verified
AccountStore
and aTransactor
that makes it reasonably neat to do updates to keratin and our user profile in a single shot whilst keeping the notional separation - we don't modify keratin tables or core services. This might make sense of an example of library usage. It took a bit of getting right.Let me know if you'd like to see a bit more on any of the above, and I'll try to get round to it.
The text was updated successfully, but these errors were encountered: