ueberauth_microsoft alternatives and similar packages
Based on the "Authentication" category.
Alternatively, view ueberauth_microsoft alternatives based on common mentions on social networks and blogs.
-
coherence
Coherence is a full featured, configurable authentication system for Phoenix -
ueberauth
An Elixir Authentication System for Plug-based Web Applications -
phx_gen_auth
An authentication system generator for Phoenix 1.5 applications. -
guardian_db
Guardian DB integration for tracking tokens and ensuring logout cannot be replayed. -
Phauxth
Not actively maintained - Authentication library for Phoenix, and other Plug-based, web applications -
goth
Elixir package for Oauth authentication via Google Cloud APIs -
PowAssent
Multi-provider authentication for your Pow enabled app -
Shield
Shield is an OAuth2 Provider hex package and also a standalone microservice build top of the Phoenix Framework and 'authable' package. -
ueberauth_google
Google OAuth2 Strategy for Überauth. -
samly
Elixir Plug library to enable SAML 2.0 SP SSO in Phoenix/Plug applications. -
elixir_auth_google
👤Minimalist Google OAuth Authentication for Elixir Apps. Tested, Documented & Maintained. Setup in 5 mins. 🚀 -
basic_auth
Elixir Plug to easily add HTTP basic authentication to an app -
ueberauth_facebook
Facebook OAuth2 Strategy for Überauth. -
ueberauth_github
GitHub OAuth2 Strategy for Überauth -
doorman
Tools to make Plug, and Phoenix authentication simple and flexible. -
ueberauth_identity
A username/password Strategy for Überauth -
Paseto
An Elixir implementation of Paseto (Platform-Agnostic Security Tokens) -
passwordless_auth
A library for simple passwordless authentication -
blackbook
All-in-one membership/authentication system for Elixir. -
aeacus
A simple, secure, and highly configurable Elixir identity [username | email | id | etc.]/password authentication module to use with Ecto. -
phoenix_client_ssl
Set of Plugs / Lib to help with SSL Client Auth. -
sigaws
An Elixir library to sign and verify HTTP requests using AWS Signature V4 -
ueberauth_cas
Central Authentication Service strategy for Überauth -
ueberauth_active_directory
Uberauth strategy for Active Directory authentication. -
exBankID
exBankID is a simple stateless API-client for the Swedish BankID API -
zachaeus
An easy to use licensing system, using asymmetric cryptography to generate and validate licenses. -
oauth2_facebook
A Facebook OAuth2 Provider for Elixir -
apache_passwd_md5
Apache/APR Style Password Hashing -
ueberauth_foursquare
Foursquare OAuth2 Strategy for Überauth
Access the most powerful time series database as a service
Do you think we are missing an alternative of ueberauth_microsoft or a related project?
README
Überauth Microsoft
Microsoft OAuth2 strategy for Überauth.
Installation
Setup your application at the new Microsoft app registration portal.
Add
:ueberauth_microsoft
to your list of dependencies inmix.exs
:def deps do [{:ueberauth_microsoft, "~> 0.8"}] end
Add the strategy to your applications:
def application do [applications: [:ueberauth_microsoft]] end
Add Microsoft to your Überauth configuration:
config :ueberauth, Ueberauth, providers: [ microsoft: {Ueberauth.Strategy.Microsoft, []} ]
Update your provider configuration:
config :ueberauth, Ueberauth.Strategy.Microsoft.OAuth, client_id: System.get_env("MICROSOFT_CLIENT_ID"), client_secret: System.get_env("MICROSOFT_CLIENT_SECRET")
Include the Überauth plug in your controller:
defmodule MyApp.AuthController do use MyApp.Web, :controller plug Ueberauth ... end
Create the request and callback routes if you haven't already:
scope "/auth", MyApp do pipe_through :browser get "/:provider", AuthController, :request get "/:provider/callback", AuthController, :callback end
Your controller needs to implement callbacks to deal with
Ueberauth.Auth
andUeberauth.Failure
responses.
For an example implementation see the Überauth Example application.
Single Tenancy
If you are going to use your app only internally you may need to configure it for a single tenant.
To do so you only need to add tenant_id
to your provider configuration like:
config :ueberauth, Ueberauth.Strategy.Microsoft.OAuth,
tenant_id: System.get_env("MICROSOFT_TENANT_ID"),
client_id: System.get_env("MICROSOFT_CLIENT_ID"),
client_secret: System.get_env("MICROSOFT_CLIENT_SECRET")
Calling
Depending on the configured url you can initial the request through:
/auth/microsoft
By default the scopes used are
- openid
- offline_access
- https://graph.microsoft.com/user.read
Note: at least one service scope is required in order for a token to be returned by the Microsoft endpoint
You can configure additional scopes to be used by passing the extra_scopes
option into the provider
config :ueberauth, Ueberauth,
providers: [
microsoft: {Ueberauth.Strategy.Microsoft, [extra_scopes: "https://graph.microsoft.com/calendars.read"]}
]
License
Please see LICENSE for licensing details.
*Note that all licence references and agreements mentioned in the ueberauth_microsoft README section above
are relevant to that project's source code only.