Federated / Identity Providers
Federated / Identity providers enable you to use some implicit and authorization code grants. You could also use social providers on top of Federated / Identity providers to select other Social providers (e.g.: Twitter, Apple, GitHub, LinkedIn, WeChat etc.) that are not natively supported by us. Note: This will require you to register an app with the Federated / Identity Providers.
Supported directly through Web3Auth Dashboard
Auth0
Set up Auth0 Verifier
Create a verifier for your Auth0 application by selecting
Auth0
as the Login provider from this modal.Select the
Authentication Type
based on your application need on the dropdown.Enter the
Auth0 Client ID
andAuth0 Domain
from your Auth0 application. See how to create a new Auth0 application here.Click on the
Create
button to create your Auth0 verifier.
Check out the Auth0 guide to learn more about how to set up the Auth0 verifier and use it with Web3Auth.
AWS Cognito
Set up AWS Cognito Verifier
Create a AWS Cognito Verifier from the Custom Authentication tab of your Web3Auth Project.
Click on the
Custom Authentication
tab of your Web3Auth Project.Click on the
Create Verifier
button.Enter a name of your choice for the verifier identifier.
eg. w3a-cognito-demo
Select
Custom Providers
from Choose a Login Provider section.JWKS Endpoint: Enter
https://cognito-idp.{REGION}.amazonaws.com/{USER_POOL_ID}/.well-known/jwks.json
as the JWKS endpoint for the Cognito.Now you have the option to paste a sample idToken(JWT) to get the fields for the JWT validation. This step is optional, but if you have a sample JWT you can paste it here to get the fields for the JWT validation. You can also skip this step and fill in the fields manually.
The following are the JWT validation fields needed for the Cognito JWT validation:
- Type
iss
as a field andhttps://cognito-idp.{REGION}.amazonaws.com/{USER_POOL_ID}
as a value. - Next, type
aud
as a field andAPP_CLIENT_ID
as a value.
Note: Replace the
REGION
,USER_POOL_ID
andAPP_CLIENT_ID
with your Cognito specific details.- Type
Next, Select
Sub
,Email
or aCustom
value from the dropdown for the JWT Verifier ID. This is the field that will be used as the verifier ID for the user, and it has to be unique for each user.Finally, Click on the
Create
button to create your verifier.
It may take up to 10 minutes to deploy the verifier on sapphire_devnet. You'll receive an email once it's complete.
Check out the AWS Cognito guide to learn more about how to set up the AWS Cognito verifier and use it with Web3Auth.
Firebase
Setup Firebase Verifier
Create a Firebase Verifier from the Custom Authentication tab of your Web3Auth Project.
Click on the
Custom Authentication
tab of your Web3Auth Project.Click on the
Create Verifier
button.Enter a name of your choice for the verifier identifier.
eg. w3a-firebase-demo
Select
Custom Providers
from Choose a Login Provider section.JWKS Endpoint: Enter
https://www.googleapis.com/service_accounts/v1/jwk/securetoken@system.gserviceaccount.com
as the JWKS endpoint for the Firebase.Now you have the option to paste a sample idToken(JWT) to get the fields for the JWT validation. This step is optional, but if you have a sample JWT you can paste it here to get the fields for the JWT validation. You can also skip this step and fill in the fields manually.
The following are the JWT validation fields needed for the Firebase JWT validation:
- Type
iss
as a field andhttps://securetoken.google.com/FIREBASE-PROJECT-ID
as a value. - Next, type
aud
as a field andFIREBASE-PROJECT-ID
as a value.
Note: Replace the
FIREBASE-PROJECT-ID
with your Firebase Project ID.- Type
Next, Select
Sub
,Email
or aCustom
value from the dropdown for the JWT Verifier ID. This is the field that will be used as the verifier ID for the user, and it has to be unique for each user.Finally, Click on the
Create
button to create your verifier.
It may take up to 10 minutes to deploy the verifier on sapphire_devnet. You'll receive an email once it's complete.
Check out the Firebase guide to learn more about how to set up the Firebase verifier and use it with Web3Auth.