React Native toolkit for Auth0 API, compliant with RFC 8252
- Documentation
- Requirements
- Getting Started
- Usage
- Support + Feedback
- Vulnerability Reporting
- Thank You
- What is Auth0
- License
- The React Native Quickstart shows how to get an iOS or Android app running from scratch.
- The React Native Sample has complete, running iOS and Android applications you can try.
- The Usage section below covers specific use cases outside of basic authentication.
- The API documentation is generated from the code and explains all methods that are able to be used.
This SDK targets apps that are using React Native SDK version 0.60.5
and up. If you're using an older React Native version, see the compatibility matrix below.
This SDK attempts to follow semver in a best-effort basis, but React Native is still making releases that eventually include breaking changes on it making this approach difficult for any React Native library module. Use the table below to find the version that best suites your application.
React Native SDK | Auth0 SDK |
---|---|
v0.60.5 | v2.0.0 |
v0.59.0 or lower | v1.6.0 |
The contents of previous release can be found on the branch v1.
First install the native library module:
Using npm
$ npm install react-native-auth0 --save
or yarn
$ yarn add react-native-auth0
Then, you need to run the following command to install the ios app pods with Cocoapods. That will auto-link the iOS library.
$ cd ios && pod install
You need make your Android and iOS applications aware that an authentication result will be received from the browser. This SDK makes use of the Android's Package Name and its analogous iOS's Product Bundle Identifier to generate the redirect URL. Each platform has its own set of instructions.
Open the AndroidManifest.xml
file of your application typically at android/app/src/main/AndroidManifest.xml
and make sure the Activity on which you're going to receive the authentication result has a launchMode of singleTask
. Additionally inside this Activity definition include the following intent filter.
<intent-filter>
<action android:name="android.intent.action.VIEW" />
<category android:name="android.intent.category.DEFAULT" />
<category android:name="android.intent.category.BROWSABLE" />
<data
android:host="YOUR_AUTH0_DOMAIN"
android:pathPrefix="/android/${applicationId}/callback"
android:scheme="${applicationId}" />
</intent-filter>
The android:host
value must be replaced with your Auth0 domain value. So if you have samples.auth0.com
as your Auth0 domain you would have the following MainActivity configuration:
<activity
android:name=".MainActivity"
android:label="@string/app_name"
android:launchMode="singleTask"
android:configChanges="keyboard|keyboardHidden|orientation|screenSize"
android:windowSoftInputMode="adjustResize">
<intent-filter>
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
</intent-filter>
<intent-filter>
<action android:name="android.intent.action.VIEW" />
<category android:name="android.intent.category.DEFAULT" />
<category android:name="android.intent.category.BROWSABLE" />
<data
android:host="samples.auth0.com"
android:pathPrefix="/android/${applicationId}/callback"
android:scheme="${applicationId}" />
</intent-filter>
</activity>
The applicationId
value will be auto-replaced on runtime with the package name or id of your application (e.g. com.example.app
). You can change this value from the build.gradle
file. You can also check it at the top of your AndroidManifest.xml
file. Take note of this value as you'll be requiring it to define the callback URLs below.
For more info please read react native docs
Inside the ios
folder find the file AppDelegate.[swift|m]
add the following to it
#import <React/RCTLinkingManager.h>
- (BOOL)application:(UIApplication *)application openURL:(NSURL *)url
sourceApplication:(NSString *)sourceApplication annotation:(id)annotation
{
return [RCTLinkingManager application:application openURL:url
sourceApplication:sourceApplication annotation:annotation];
}
Inside the ios
folder open the Info.plist
and locate the value for CFBundleIdentifier
, e.g.
<key>CFBundleIdentifier</key>
<string>$(PRODUCT_BUNDLE_IDENTIFIER)</string>
and then below it register a URL type entry using the value of CFBundleIdentifier
as the value for CFBundleURLSchemes
<key>CFBundleURLTypes</key>
<array>
<dict>
<key>CFBundleTypeRole</key>
<string>None</string>
<key>CFBundleURLName</key>
<string>auth0</string>
<key>CFBundleURLSchemes</key>
<array>
<string>$(PRODUCT_BUNDLE_IDENTIFIER)</string>
</array>
</dict>
</array>
If your application is generated using the React Native CLI, the default value of $(PRODUCT_BUNDLE_IDENTIFIER)
matches org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)
. Take note of this value as you'll be requiring it to define the callback URLs below. If desired, you can change its value using XCode in the following way:
- Open the
ios/TestApp.xcodeproj
file replacing 'TestApp' with the name of your app or runxed ios
from a Terminal. - Open your project's or desired target's Build Settings tab and on the search bar at the right type "Product Bundle Identifier".
- Replace the Product Bundle Identifier value with your desired application's bundle identifier name (e.g.
com.example.app
). - If you've changed the project wide settings, make sure the same were applied to each of the targets your app has.
For more info please read react native docs
Callback URLs are the URLs that Auth0 invokes after the authentication process. Auth0 routes your application back to this URL and appends additional parameters to it, including a token. Since callback URLs can be manipulated, you will need to add this URL to your Application's Allowed Callback URLs for security. This will enable Auth0 to recognize these URLs as valid. If omitted, authentication will not be successful.
Callback URLs must have a valid scheme value as defined by the specification. Note however that platforms like Android don't follow this RFC and define the scheme and host values as case-sensitive. Since this SDK makes use of the Android's Package Name and its analogous iOS's Product Bundle Identifier to generate the redirect URL, it's advised to use lower case values for such. A "Redirect URI is not valid" error will raise if this format is not respected.
Go to the Auth0 Dashboard, select your application and make sure that Allowed Callback URLs contains the URLs defined below.
If in addition you plan to use the log out method, you must also add these URLs to the Allowed Logout URLs.
{YOUR_APP_PACKAGE_NAME}://{YOUR_AUTH0_DOMAIN}/android/{YOUR_APP_PACKAGE_NAME}/callback
Make sure to replace {YOUR_APP_PACKAGE_NAME} and {YOUR_AUTH0_DOMAIN} with the actual values for your application.
{YOUR_BUNDLE_IDENTIFIER}://{YOUR_AUTH0_DOMAIN}/ios/{YOUR_BUNDLE_IDENTIFIER}/callback
Make sure to replace {YOUR_BUNDLE_IDENTIFIER} and {YOUR_AUTH0_DOMAIN} with the actual values for your application.
Create a new instance of the client using the Auth0 domain and client ID values from your Application's dashboard page.
import Auth0 from 'react-native-auth0';
const auth0 = new Auth0({
domain: '{YOUR_AUTH0_DOMAIN}',
clientId: '{YOUR_CLIENT_ID}',
});
This SDK is OIDC compliant. To ensure OIDC compliant responses from the Auth0 servers enable the OIDC Conformant switch in your Auth0 dashboard under
Application / Settings / Advanced OAuth
. For more information please check this documentation.
auth0.webAuth
.authorize({scope: 'openid email profile'})
.then(credentials => console.log(credentials))
.catch(error => console.log(error));
auth0.webAuth.clearSession().catch(error => console.log(error));
Since June 2017 new Clients no longer have the Password Grant Type enabled by default.
If you are accessing a Database Connection using passwordRealm
then you will need to enable the Password Grant Type, please follow this guide.
auth0.auth
.passwordRealm({
username: '[email protected]',
password: 'password',
realm: 'myconnection',
})
.then(console.log)
.catch(console.error);
auth0.auth
.userInfo({token: 'the user access_token'})
.then(console.log)
.catch(console.error);
This endpoint requires an Access Token that was granted the /userinfo
audience. Check that the authentication request that returned the Access Token included an audience value of https://{YOUR_AUTH0_DOMAIN}.auth0.com/userinfo
.
auth0.auth
.refreshToken({refreshToken: 'the user refresh_token'})
.then(console.log)
.catch(console.error);
Passwordless is a two-step authentication flow that makes use of this type of connection. The Passwordless OTP grant is required to be enabled in your Auth0 application beforehand. Check our guide to learn how to enable it.
To start the flow, you request a code to be sent to the user's email or phone number. For email scenarios only, a link can be sent in place of the code.
auth0.auth
.passwordlessWithEmail({
email: '[email protected]',
send: 'link',
})
.then(console.log)
.catch(console.error);
or
auth0.auth
.passwordlessWithSMS({
phoneNumber: '+5491159991000',
})
.then(console.log)
.catch(console.error);
Then, in order to complete the authentication, you must send back that received code value along with the email or phone number used:
auth0.auth
.loginWithEmail({
email: '[email protected]',
code: '123456',
})
.then(console.log)
.catch(console.error);
or
auth0.auth
.loginWithSMS({
phoneNumber: '[email protected]',
code: '123456',
})
.then(console.log)
.catch(console.error);
auth0.auth
.createUser({
email: '[email protected]',
username: 'username',
password: 'password',
connection: 'myconnection',
})
.then(console.log)
.catch(console.error);
auth0
.users('the user access_token')
.patchUser({id: 'user_id', metadata: {first_name: 'John', last_name: 'Doe'}})
.then(console.log)
.catch(console.error);
auth0
.users('the user access_token')
.getUser({id: 'user_id'})
.then(console.log)
.catch(console.error);
For more info please check our generated documentation
We appreciate feedback and contribution to this repo! Before you get started, please see the following:
- Auth0's general contribution guidelines
- Auth0's code of conduct guidelines
- This repo's development guide
Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
Auth0 helps you to easily:
- implement authentication with multiple identity providers, including social (e.g., Google, Facebook, Microsoft, LinkedIn, GitHub, Twitter, etc), or enterprise (e.g., Windows Azure AD, Google Apps, Active Directory, ADFS, SAML, etc.)
- log in users with username/password databases, passwordless, or multi-factor authentication
- link multiple user accounts together
- generate signed JSON Web Tokens to authorize your API calls and flow the user identity securely
- access demographics and analytics detailing how, when, and where users are logging in
- enrich user profiles from other data sources using customizable JavaScript rules
This project is licensed under the MIT license. See the LICENSE file for more info.