We integrated with Torus last year using a custom JWT verifier. The UX is handled in-house and we provide a valid JWT downstream to getTorusKey
for key material.
The latest rebrand and SDK does not seem as willing to give clients the same flexibility, or at least we aren't finding it in the docs.
Tried following BYO JWT Providers from the docs, two discoveries:
- The latest ExtraLoginOptions spec does not seem to support directly plumbing
id_token
through as the doc suggests doing. - We still need to initialize our client with an
OpenLoginAdapter
, which has a requireduxMode
field. We were hoping this was ignored whenconnectTo
is called withid_token
present, but that was not the case.
Can you explain the two discrepancies please? We are having troubles there.
And more generally, in the new Adapter/Provider model, is there an equivalent flow to directly calling getTorusKey
on deprecated Torus client?
Originally posted by: NTonani
Check the discussion at: https://github.com/orgs/Web3Auth/discussions/423