ueberauth_github alternatives and similar packages
Based on the "Authentication" category.
Alternatively, view ueberauth_github alternatives based on common mentions on social networks and blogs.
-
coherence
Coherence is a full featured, configurable authentication system for Phoenix -
ueberauth
An Elixir Authentication System for Plug-based Web Applications -
phx_gen_auth
An authentication system generator for Phoenix 1.5 applications. -
guardian_db
Guardian DB integration for tracking tokens and ensuring logout cannot be replayed. -
Phauxth
Not actively maintained - Authentication library for Phoenix, and other Plug-based, web applications -
Shield
Shield is an OAuth2 Provider hex package and also a standalone microservice build top of the Phoenix Framework and 'authable' package. -
PowAssent
Multi-provider authentication for your Pow enabled app -
elixir_auth_google
👤Minimalist Google OAuth Authentication for Elixir Apps. Tested, Documented & Maintained. Setup in 5 mins. 🚀 -
samly
Elixir Plug library to enable SAML 2.0 SP SSO in Phoenix/Plug applications. -
basic_auth
Elixir Plug to easily add HTTP basic authentication to an app -
ueberauth_facebook
Facebook OAuth2 Strategy for Überauth. -
doorman
Tools to make Plug, and Phoenix authentication simple and flexible. -
ueberauth_identity
A username/password Strategy for Überauth -
Paseto
An Elixir implementation of Paseto (Platform-Agnostic Security Tokens) -
passwordless_auth
A library for simple passwordless authentication -
blackbook
All-in-one membership/authentication system for Elixir. -
aeacus
A simple, secure, and highly configurable Elixir identity [username | email | id | etc.]/password authentication module to use with Ecto. -
phoenix_client_ssl
Set of Plugs / Lib to help with SSL Client Auth. -
sigaws
An Elixir library to sign and verify HTTP requests using AWS Signature V4 -
ueberauth_cas
Central Authentication Service strategy for Überauth -
exBankID
exBankID is a simple stateless API-client for the Swedish BankID API -
ueberauth_active_directory
Uberauth strategy for Active Directory authentication. -
zachaeus
An easy to use licensing system, using asymmetric cryptography to generate and validate licenses. -
ex_aws_msk_iam_auth
AWS_MSK_IAM Authentication Plugin for Broadway Kafka
Clean code begins in your IDE with SonarLint
Do you think we are missing an alternative of ueberauth_github or a related project?
README
Überauth GitHub
GitHub OAuth2 strategy for Überauth.
Installation
Setup your application at GitHub Developer.
Add
:ueberauth_github
to your list of dependencies inmix.exs
:def deps do [{:ueberauth_github, "~> 0.7"}] end
Add the strategy to your applications:
def application do [applications: [:ueberauth_github]] end
Add GitHub to your Überauth configuration:
config :ueberauth, Ueberauth, providers: [ github: {Ueberauth.Strategy.Github, []} ]
Update your provider configuration:
config :ueberauth, Ueberauth.Strategy.Github.OAuth, client_id: System.get_env("GITHUB_CLIENT_ID"), client_secret: System.get_env("GITHUB_CLIENT_SECRET")
Or, to read the client credentials at runtime:
config :ueberauth, Ueberauth.Strategy.Github.OAuth, client_id: {:system, "GITHUB_CLIENT_ID"}, client_secret: {:system, "GITHUB_CLIENT_SECRET"}
Include the Überauth plug in your router:
defmodule MyApp.Router do use MyApp.Web, :router pipeline :browser do plug Ueberauth ... end end
Create the request and callback routes if you haven't already:
scope "/auth", MyApp do pipe_through :browser get "/:provider", AuthController, :request get "/:provider/callback", AuthController, :callback end
Your controller needs to implement callbacks to deal with
Ueberauth.Auth
andUeberauth.Failure
responses.
For an example implementation see the Überauth Example application.
Calling
Depending on the configured url you can initiate the request through:
/auth/github
Or with options:
/auth/github?scope=user,public_repo
By default the requested scope is "user,public_repo". This provides both read and write access to the GitHub user profile details and public repos. For a read-only scope, either use "user:email" or an empty scope "". See more at GitHub's OAuth Documentation. Scope can be configured either explicitly as a scope
query value on the request path or in your configuration:
config :ueberauth, Ueberauth,
providers: [
github: {Ueberauth.Strategy.Github, [default_scope: "user,public_repo,notifications"]}
]
It is also possible to disable the sending of the redirect_uri
to GitHub. This is particularly useful
when your production application sits behind a proxy that handles SSL connections. In this case,
the redirect_uri
sent by Ueberauth
will start with http
instead of https
, and if you configured
your GitHub OAuth application's callback URL to use HTTPS, GitHub will throw an uri_missmatch
error.
To prevent Ueberauth
from sending the redirect_uri
, you should add the following to your configuration:
config :ueberauth, Ueberauth,
providers: [
github: {Ueberauth.Strategy.Github, [send_redirect_uri: false]}
]
Private Emails
Github now allows you to keep your email address private. If you don't mind that you won't know a users email address you can specify allow_private_emails
. This will set the users email as [email protected]
.
config :ueberauth, Ueberauth,
providers: [
github: {Ueberauth.Strategy.Github, [allow_private_emails: true]}
]
License
Please see LICENSE for licensing details.
*Note that all licence references and agreements mentioned in the ueberauth_github README section above
are relevant to that project's source code only.