Most providers require you to sign up for a so called API client or app, containing a client ID and API secret. You must add a SocialApp
record per provider via the Django admin containing these app credentials.
When creating the OAuth app on the side of the provider pay special attention to the callback URL (sometimes also referred to as redirect URL). If you do not configure this correctly, you will receive login failures when attempting to log in, such as:
An error occurred while attempting to login via your social network account.
Use a callback URL of the form:
http://example.com/accounts/twitter/login/callback/
http://example.com/accounts/soundcloud/login/callback/
...
For local development, use the following:
http://127.0.0.1:8000/accounts/twitter/login/callback/
- App registration (get your key and secret here)
- Development callback URL
- App registration (get your key and secret here)
- Development callback URL
- Account Signup
- App registration
Run
client-create
from the cli: https://bitbucket.org/agaveapi/cli/overview- Development callback URL
http://localhost:8000/accounts/agave/login/callback/ May require https url, even for localhost
SOCIALACCOUNT_PROVIDERS = {
'agave': {
'API_URL': 'https://api.tacc.utexas.edu',
}
}
- In the absense of a specified API_URL, the default Agave tenant is
Amazon requires secure OAuth callback URLs (redirect_uri
), please see the section on HTTPS about how this is handled.
- App registration (get your key and secret here)
- Development callback URL
- App registration (get your key and secret here)
- Go to your https://console.aws.amazon.com/cognito/ and create a Cognito User Pool if you haven't already.
- Go to General Settings > App Clients section and create a new App Client if you haven't already. Please make sure you select the option to generate a secret key.
- Go to App Integration > App Client Settings section and:
- Enable Cognito User Pool as an identity provider.
- Set the callback and sign-out URLs. (see next section for development callback URL)
- Enable Authorization Code Grant OAuth flow.
- Select the OAuth scopes you'd like to allow.
- Go to App Integration > Domain Name section and create a domain prefix for your Cognito User Pool.
- Development callback URL:
http://localhost:8000/accounts/amazon-cognito/login/callback/
In addition, you'll need to specify your user pool's domain like so:
SOCIALACCOUNT_PROVIDERS = {
'amazon_cognito': {
'DOMAIN': 'https://<domain-prefix>.auth.us-east-1.amazoncognito.com',
}
}
Your domain prefix is the value you specified in step 4 of the app registration process. If you provided a custom domain such as accounts.example.com provide that instead.
- App registration (get your key and secret here)
- Development callback URL
- App registration (create an App ID and then a related Service ID here)
https://developer.apple.com/account/resources/certificates/list
- Private Key registration (be sure to save it)
- Development callback URL
Add the following configuration to your settings:
SOCIALACCOUNT_PROVIDERS = {
"apple": {
"APP": {
# Your service identifier.
"client_id": "your.service.id",
# The Key ID (visible in the "View Key Details" page).
"secret": "KEYID",
# Member ID/App ID Prefix -- you can find it below your name
# at the top right corner of the page, or it’s your App ID
# Prefix in your App ID.
"key": "MEMAPPIDPREFIX",
# The certificate you downloaded when generating the key.
"certificate_key": """-----BEGIN PRIVATE KEY-----
s3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr
3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3cr3ts3
c3ts3cr3t
-----END PRIVATE KEY-----
"""
}
}
}
Note: Sign In With Apple uses a slight variation of OAuth2, which uses a POST instead of a GET. Unlike a GET with SameSite=Lax, the session cookie will not get sent along with a POST. If you encounter 'PermissionDenied' errors during Apple log in, check that you don't have any 3rd party middleweare that is generating a new session on this cross-origin POST, as this will prevent the login process from being able to access the original session after the POST completes.
- App registration (get your key and secret here)
- Development callback URL
You'll need to specify the base URL for your Auth0 domain:
SOCIALACCOUNT_PROVIDERS = {
'auth0': {
'AUTH0_URL': 'https://your.auth0domain.auth0.com',
}
}
Browse to https://www.authentiq.com/developers to get started.
- App registration
Sign in or register with your Authentiq ID (select Download the app
while signing in if you don't have Authentiq ID yet).
- Development redirect URL
While testing you can leave the Redirect URIs
field empty in the dashboard. You can specify what identity details to request via the SCOPE
parameter.
SOCIALACCOUNT_PROVIDERS = {
'authentiq': {
'SCOPE': ['email', 'aq:name']
}
}
Valid scopes include: email
, phone
, address
, aq:name
, aq:location
. The default is to request a user's name, and email address if SOCIALACCOUNT_QUERY_EMAIL=True
. You can request and require a verified email address by setting SOCIALACCOUNT_EMAIL_VERIFICATION=True
and SOCIALACCOUNT_EMAIL_REQUIRED=True
.
- The Baidu OAuth2 authentication documentation:
http://developer.baidu.com/wiki/index.php?title=docs/oauth/refresh http://developer.baidu.com/wiki/index.php?title=docs/oauth/rest/file_data_apis_lista
- App registration (get your key and secret here)
- The Basecamp OAuth2 authentication documentation
https://github.com/basecamp/api/blob/master/sections/authentication.md#oauth-2
- Development callback URL
- The Battle.net OAuth2 authentication documentation
- Register your app here (Blizzard account required)
- Development callback URL
Note that in order to use battletags as usernames, you are expected to override either the username
field on your User model, or to pass a custom validator which will accept the #
character using the ACCOUNT_USERNAME_VALIDATORS
setting. Such a validator is available in socialaccount.providers.battlenet.validators.BattletagUsernameValidator
.
The following Battle.net settings are available:
SOCIALACCOUNT_PROVIDERS = {
'battlenet': {
'SCOPE': ['wow.profile', 'sc2.profile'],
'REGION': 'us',
}
}
- SCOPE:
Scope can be an array of the following options:
wow.profile
allows access to the user's World of Warcraft characters.sc2.profile
allows access to the user's StarCraft 2 profile. The default setting is[]
.- REGION:
Either
apac
,cn
,eu
,kr
,sea
,tw
orus
Sets the default region to use, can be overriden using query parameters in the URL, for example:
?region=eu
. Defaults tous
.
- App registration (get your key and secret here)
https://bitbucket.org/account/user/{{yourusername}}/oauth-consumers/new
Make sure you select the Account:Read permission.
- Development callback URL
http://127.0.0.1:8000/accounts/bitbucket_oauth2/login/callback/
Note that Bitbucket calls the client_id
Key in their user interface. Don't get confused by that; use the Key value for your client_id
field.
- App registration (get your key and secret here)
- Development callback URL
- App registration (get your key and secret here)
https://sso-management.web.cern.ch/OAuth/RegisterOAuthClient.aspx
- CERN OAuth2 Documentation
https://espace.cern.ch/authentication/CERN%20Authentication/OAuth.aspx
CILogon ----CILogon is a federated identity provider for hundreds of universities and research institutions around the world.
- App registration (get your key and secret here)
- CILogon OIDC/OAuth2 Documentation
- App registration (get your key and secret here)
- Development callback URL
- App registration (get your key and secret here)
- Development callback URL
- App registration (get your key and secret here)
- Development callback URL
With the acquired access token you will have read permissions on the API by default. If you also need write access specify the scope as follows. See https://developers.digitalocean.com/documentation/oauth/#scopes for details.
SOCIALACCOUNT_PROVIDERS = {
'digitalocean': {
'SCOPE': [
'read write',
],
}
}
- App registration and management (get your key and secret here)
Make sure to Add Redirect URI to your application.
- Development callback (redirect) URL
- Doximity OAuth2 implementation documentation
- Request API keys here
- Development callback URL
- App registration (get your key and secret here)
- Authentication documentation
- Development callback URL
- App registration (get your key and secret here)
- Development callback URL
- App registration (get your key and secret here)
- Development callback URL
SOCIALACCOUNT_PROVIDERS = {
'dwolla': {
'SCOPE': [
'Send',
'Transactions',
'Funding',
'AccountInfoFull',
],
'ENVIROMENT':'sandbox',
}
}
- Edmodo OAuth2 documentation
https://developers.edmodo.com/edmodo-connect/edmodo-connect-overview-getting-started/
You can optionally specify additional permissions to use. If no SCOPE
value is set, the Edmodo provider will use basic
by default:
SOCIALACCOUNT_PROVIDERS = {
'edmodo': {
'SCOPE': [
'basic',
'read_groups',
'read_connections',
'read_user_email',
'create_messages',
'write_library_items',
]
}
}
- Open Edx OAuth2 documentation
https://course-catalog-api-guide.readthedocs.io/en/latest/authentication/
It is necessary to set EDX_URL
to your open edx installation. If no EDX_URL
value is set, the Edx provider will use https://edx.org
which does not work:
SOCIALACCOUNT_PROVIDERS = {
'edx': {
'EDX_URL': "https://openedx.local",
}
}
Register your application at https://developers.eveonline.com/applications/create
. Note that if you have STORE_TOKENS
enabled (the default), you will need to set up your application to be able to request an OAuth scope. This means you will need to set it as having "CREST Access". The least obtrusive scope is "publicData".
Log in and click your profile name in the top right navigation, then select Account Settings
. Choose App Management
near the bottom of the left navigation column. You can then click Create A New App
on the upper left corner.
- App registration
Fill in the form with the following link
- Development callback URL
for both the Application URL
and OAuth Redirect URI
.
Register your OAuth2 application at https://dev.evernote.com/doc/articles/authentication.php
:
SOCIALACCOUNT_PROVIDERS = {
'evernote': {
'EVERNOTE_HOSTNAME': 'evernote.com' # defaults to sandbox.evernote.com
}
}
Register your OAuth2 app in apps page:
During development set the callback url to:
In production replace localhost with whatever domain you're hosting your app on.
If your app is writing to certain attributes you need to specify this during the creation of the app.
The following Exist settings are available:
SOCIALACCOUNT_PROVIDERS = {
'exist': {
'SCOPE': ['read+write'],
}
}
- SCOPE:
The default scope is
read
. If you'd like to change this set the scope toread+write
.
For more information: OAuth documentation: http://developer.exist.io/#oauth2-authentication API documentation: http://developer.exist.io/
For Facebook both OAuth2 and the Facebook Connect Javascript SDK are supported. You can even mix the two.
An advantage of the Javascript SDK may be a more streamlined user experience as you do not leave your site. Furthermore, you do not need to worry about tailoring the login dialog depending on whether or not you are using a mobile device. Yet, relying on Javascript may not be everybody's cup of tea.
To initiate a login use:
{% load socialaccount %}
{% providers_media_js %}
<a href="{% provider_login_url "facebook" method="js_sdk" %}">Facebook Connect</a>
or:
{% load socialaccount %}
<a href="{% provider_login_url "facebook" method="oauth2" %}">Facebook OAuth2</a>
The following Facebook settings are available:
SOCIALACCOUNT_PROVIDERS = {
'facebook': {
'METHOD': 'oauth2',
'SDK_URL': '//connect.facebook.net/{locale}/sdk.js',
'SCOPE': ['email', 'public_profile'],
'AUTH_PARAMS': {'auth_type': 'reauthenticate'},
'INIT_PARAMS': {'cookie': True},
'FIELDS': [
'id',
'first_name',
'last_name',
'middle_name',
'name',
'name_format',
'picture',
'short_name'
],
'EXCHANGE_TOKEN': True,
'LOCALE_FUNC': 'path.to.callable',
'VERIFIED_EMAIL': False,
'VERSION': 'v7.0',
}
}
- METHOD:
Either
js_sdk
oroauth2
. The default isoauth2
.- SDK_URL:
If needed, use
SDK_URL
to override the default Facebook JavaScript SDK URL,//connect.facebook.net/{locale}/sdk.js
. This may be necessary, for example, when using the Customer Chat Plugin. If theSDK_URL
contains a{locale}
format string named argument, the locale given by theLOCALE_FUNC
will be used to generate theSDK_URL
.- SCOPE:
By default, the
email
scope is required depending on whether or notSOCIALACCOUNT_QUERY_EMAIL
is enabled. Apps using permissions beyondemail
andpublic_profile
require review by Facebook. See Permissions with Facebook Login for more information.- AUTH_PARAMS:
Use
AUTH_PARAMS
to pass along other parameters to theFB.login
JS SDK call.- FIELDS:
The fields to fetch from the Graph API
/me/?fields=
endpoint. For example, you could add the'friends'
field in order to capture the user's friends that have also logged into your app using Facebook (requires'user_friends'
scope).- EXCHANGE_TOKEN:
The JS SDK returns a short-lived token suitable for client-side use. Set
EXCHANGE_TOKEN = True
to make a server-side request to upgrade to a long-lived token before storing in theSocialToken
record. See Expiration and Extending Tokens.- LOCALE_FUNC:
The locale for the JS SDK is chosen based on the current active language of the request, taking a best guess. This can be customized using the
LOCALE_FUNC
setting, which takes either a callable or a path to a callable. This callable must take exactly one argument, the request, and return a valid Facebook locale <http://developers.facebook.com/docs/ internationalization/> as a string, e.g. US English:SOCIALACCOUNT_PROVIDERS = { 'facebook': { 'LOCALE_FUNC': lambda request: 'en_US' } }
- VERIFIED_EMAIL:
It is not clear from the Facebook documentation whether or not the fact that the account is verified implies that the e-mail address is verified as well. For example, verification could also be done by phone or credit card. To be on the safe side, the default is to treat e-mail addresses from Facebook as unverified. But, if you feel that is too paranoid, then use this setting to mark them as verified. Due to lack of an official statement from the side of Facebook, attempts have been made to reverse engineer the meaning of the verified flag. Do know that by setting this to
True
you may be introducing a security risk.- VERSION:
The Facebook Graph API version to use. The default is
v7.0
.- App registration (get your key and secret here)
A key and secret key can be obtained by creating an app. After registration you will need to make it available to the public. In order to do that your app first has to be reviewed by Facebook.
- Development callback URL
Leave your App Domains empty and put
http://localhost:8000
in the section labeledWebsite with Facebook Login
. Note that you'll need to add your site's actual domain to this section once it goes live.
- App registration (get your key and secret here)
- Development callback URL
The Firefox Accounts provider is currently limited to Mozilla relying services but there is the intention, in the future, to allow third-party services to delegate authentication. There is no committed timeline for this.
- The provider is OAuth2 based. More info:
Note: This is not the same as the Mozilla Persona provider below.
The following Firefox Accounts settings are available:
SOCIALACCOUNT_PROVIDERS = {
'fxa': {
'SCOPE': ['profile'],
'OAUTH_ENDPOINT': 'https://oauth.accounts.firefox.com/v1',
'PROFILE_ENDPOINT': 'https://profile.accounts.firefox.com/v1',
}
}
- SCOPE:
Requested OAuth2 scope. Default is ['profile'], which will work for applications on the Mozilla trusted whitelist. If your application is not on the whitelist, then define SCOPE to be ['profile:email', 'profile:uid'].
- OAUTH_ENDPOINT:
Explicitly set the OAuth2 endpoint. Default is the production endpoint "https://oauth.accounts.firefox.com/v1".
- PROFILE_ENDPOINT:
Explicitly set the profile endpoint. Default is the production endpoint and is "https://profile.accounts.firefox.com/v1".
- App registration (get your key and secret here)
You can optionally specify the application permissions to use. If no perms
value is set, the Flickr provider will use read
by default.
SOCIALACCOUNT_PROVIDERS = {
'flickr': {
'AUTH_PARAMS': {
'perms': 'write',
}
}
}
The Frontier provider is OAuth2 based.
Frontier Developments switched to OAuth2 based authentication in early 2019. Before a developer can use the authentication and CAPI (Companion API) service from Frontier, they must first apply for access.
Go to https://user.frontierstore.net/ and apply for access. Once your application is approved for access. Under "Developer Zone", you will see a list of authorized clients granted access. To add access for your client, click on the "Create Client" button and fill out the form and submit the form.
After creating the client access, click on "View" to reveal your Client ID and Shared Key. You can also regenerate the key in an event tha your shared key is compromised.
The app credentials are configured for your Django installation via the admin interface. Create a new socialapp through /admin/socialaccount/socialapp/
.
Fill in the form as follows:
- Provider, "Frontier"
- Name, your pick, suggest "Frontier"
- Client id, is called "Client ID" by Frontier
- Secret key, is called "Shared Key" by Frontier
- Key, is not needed, leave blank.
Optionally, you can specify the scope to use as follows:
SOCIALACCOUNT_PROVIDERS = {
'frontier': {
'SCOPE': ['auth', 'capi'],
'VERIFIED_EMAIL': True
},
}
- App registration (get your key and secret here)
- Development callback URL
Self-hosted Support ******************
If you use a self-hosted Gitea instance add your server URL to your Django settings as follows:
SOCIALACCOUNT_PROVIDERS = {
'gitea': {
'GITEA_URL': 'https://your.gitea-server.domain',
}
}
- App registration (get your key and secret here)
- Development callback URL
If you want more than just read-only access to public data, specify the scope as follows. See https://developer.github.com/v3/oauth/#scopes for details.
SOCIALACCOUNT_PROVIDERS = {
'github': {
'SCOPE': [
'user',
'repo',
'read:org',
],
}
}
If you use GitHub Enterprise add your server URL to your Django settings as follows:
SOCIALACCOUNT_PROVIDERS = {
'github': {
'GITHUB_URL': 'https://your.github-server.domain',
}
}
The GitLab provider works by default with https://gitlab.com. It allows you to connect to your private GitLab server and use GitLab as an OAuth2 authentication provider as described in GitLab docs at http://doc.gitlab.com/ce/integration/oauth_provider.html
The following GitLab settings are available, if unset https://gitlab.com will be used, with a read_user
scope.
- GITLAB_URL:
Override endpoint to request an authorization and access token. For your private GitLab server you use:
https://your.gitlab.server.tld
- SCOPE:
The
read_user
scope is required for the login procedure, and is the default. If more access is required, the scope should be set here.
Example:
SOCIALACCOUNT_PROVIDERS = {
'gitlab': {
'GITLAB_URL': 'https://your.gitlab.server.tld',
'SCOPE': ['api'],
},
}
- Registering an application:
By default, you will have access to the openid, profile, and offline_access scopes. With the offline_access scope, the API will provide you with a refresh token. For additional scopes, see the Globus API docs:
SOCIALACCOUNT_PROVIDERS = {
'globus': {
'SCOPE': [
'openid',
'profile',
'email',
'urn:globus:auth:scope:transfer.api.globus.org:all'
]
}
}
The Google provider is OAuth2 based.
Create a google app to obtain a key and secret through the developer console.
- Google Developer Console
After you create a project you will have to create a "Client ID" and fill in some project details for the consent form that will be presented to the client.
Under "APIs & auth" go to "Credentials" and create a new Client ID. Probably you will want a "Web application" Client ID. Provide your domain name or test domain name in "Authorized JavaScript origins". Finally fill in http://127.0.0.1:8000/accounts/google/login/callback/
in the "Authorized redirect URI" field. You can fill multiple URLs, one for each test domain. After creating the Client ID you will find all details for the Django configuration on this page.
Users that login using the app will be presented a consent form. For this to work additional information is required. Under "APIs & auth" go to "Consent screen" and at least provide an email and product name.
The app credentials are configured for your Django installation via the admin interface. Create a new socialapp through /admin/socialaccount/socialapp/
.
Fill in the form as follows:
- Provider, "Google"
- Name, your pick, suggest "Google"
- Client id, is called "Client ID" by Google
- Secret key, is called "Client secret" by Google
- Key, is not needed, leave blank.
Optionally, you can specify the scope to use as follows:
SOCIALACCOUNT_PROVIDERS = {
'google': {
'SCOPE': [
'profile',
'email',
],
'AUTH_PARAMS': {
'access_type': 'online',
}
}
}
By default (if you do not specify SCOPE
), profile
scope is requested, and optionally email
scope depending on whether or not SOCIALACCOUNT_QUERY_EMAIL
is enabled.
You must set AUTH_PARAMS['access_type']
to offline
in order to receive a refresh token on first login and on reauthentication requests (which is needed to refresh authentication tokens in the background, without involving the user's browser). When unspecified, Google defaults to online
.
- App registration (get your key and secret here)
- Development callback URL
- Documentation on configuring a key and secret key
https://jupyterhub.readthedocs.io/en/stable/api/services.auth.html
- Development callback URL
Specify the URL of your JupyterHub server as follows:
SOCIALACCOUNT_PROVIDERS = {
'jupyterhub': {
'API_URL': 'https://jupyterhub.example.com',
}
}
- App registration (get your key here)
- Development callback URL
- Creating and Registering the Client
https://www.keycloak.org/docs/latest/getting_started/index.html#creating-and-registering-the-client
- Development callback URL
The following Keycloak settings are available.
- KEYCLOAK_URL:
The url of your hosted keycloak server, it must end with
/auth
. For example, you can use:https://your.keycloak.server/auth
- KEYCLOAK_URL_ALT:
An alternate url of your hosted keycloak server, it must end with
/auth
. For example, you can use:https://your.keycloak.server/auth
This can be used when working with Docker on localhost, with a frontend and a backend hosted in different containers.
- KEYCLOAK_REAML:
The name of the
realm
you want to use.
Example:
SOCIALACCOUNT_PROVIDERS = {
'keycloak': {
'KEYCLOAK_URL': 'https://keycloak.custom/auth',
'KEYCLOAK_REALM': 'master'
}
}
- App registration (get your key and secret here)
- Development callback URL
The LinkedIn provider comes in two flavors: OAuth 1.0 (allauth.socialaccount.providers.linkedin
) and OAuth 2.0 (allauth.socialaccount.providers.linkedin_oauth2
).
You can specify the scope and fields to fetch as follows:
SOCIALACCOUNT_PROVIDERS = {
'linkedin': {
'SCOPE': [
'r_basicprofile',
'r_emailaddress'
],
'PROFILE_FIELDS': [
'id',
'first-name',
'last-name',
'email-address',
'picture-url',
'public-profile-url',
]
}
}
By default, r_emailaddress
scope is required depending on whether or not SOCIALACCOUNT_QUERY_EMAIL
is enabled.
Note: if you are experiencing issues where it seems as if the scope has no effect you may be using an old LinkedIn app that is not scope enabled. Please refer to https://developer.linkedin.com/forum/when-will-old-apps-have-scope-parameter-enabled
for more background information.
Furthermore, we have experienced trouble upgrading from OAuth 1.0 to OAuth 2.0 using the same app. Attempting to do so resulted in a weird error message when fetching the access token:
missing required parameters, includes an invalid parameter value, parameter more then once. : Unable to retrieve access token : authorization code not found
If you are using tokens originating from the mobile SDK, you will need to specify additional headers:
SOCIALACCOUNT_PROVIDERS = {
'linkedin': {
'HEADERS': {
'x-li-src': 'msdk'
}
}
}
- App registration (get your key and secret here)
Add any you need (up to 200) consisting of:
{
ACCOUNT_DEFAULT_HTTP_PROTOCOL
}://{hostname}{:optional_port}/{allauth_base_url}/linkedin_oauth2/login/callback/
For example when using the built-in django server and default settings:
http://localhost:8000/accounts/linkedin_oauth2/login/callback/
Leave the OAuth1 redirect URLs empty.
MailChimp has a simple API for working with your own data and a good library already exists for this use. However, to allow other MailChimp users to use an app you develop, the OAuth2 API allows those users to give or revoke access without creating a key themselves.
Instructions for generating your own OAuth2 app can be found at https://developer.mailchimp.com/documentation/mailchimp/guides/how-to-use-oauth2/. It is worth reading that carefully before following the instructions below.
Login via https://login.mailchimp.com/, which will redirect you to https://usX.admin.mailchimp.com/
where the prefix usX
(X
is an integer) is the subdomain you need to connect to. Click on your username in the top right corner and select Profile. On the next page select Extras then click API keys, which should lead you to:
- App registration (where
X
is dependent on your account)
Fill in the form with the following URL for local development:
- Development callback URL
Note the requirement of https. If you would like to test OAuth2 authentication locally before deploying a default django project will raise errors because development mode does not support https
. One means of circumventing this is to install django-extensions
:
pip install django-extensions
add it to your INSTALLED_APPS
INSTALLED_APPS = (
...
'django_extensions',
...
)
and then run:
./manage.py runserver_plus --cert cert
which should allow you to test locally via https://127.0.0.1:8000. Some browsers may require enabling this on localhost and not support by default and ask for permission.
Microsoft Graph API is the gateway to connect to mail, calendar, contacts, documents, directory, devices and more.
- Apps can be registered (for consumer key and secret) here
By default, common (organizations and consumers) tenancy is configured for the login. To restrict it, change the tenant setting as shown below.
SOCIALACCOUNT_PROVIDERS = {
'microsoft': {
'tenant': 'organizations',
}
}
- App registration (get your key and secret here)
- Development callback URL
NetIQ/Microfocus AccessManager (NAM) -----------------------------------
The following AccessManager settings are available:
SOCIALACCOUNT_PROVIDERS = {
'netiq': {
'NETIQ_URL': 'https://my.identity.provider.example.org',
}
}
App registration (get your key and secret here) is done by the administrator of your NetIQ/Microfocus AccessManager.
The following NextCloud settings are available:
SOCIALACCOUNT_PROVIDERS = {
'nextcloud': {
'SERVER': 'https://nextcloud.example.org',
}
}
App registration (get your key and secret here)
- App registration (get your key and secret here)
- Development callback URL
SOCIALACCOUNT_PROVIDERS = {
'okta': {
'OKTA_BASE_URL': 'example.okta.com',
}
}
The OpenID provider does not require any settings per se. However, a typical OpenID login page presents the user with a predefined list of OpenID providers and allows the user to input their own OpenID identity URL in case their provider is not listed by default. The list of providers displayed by the builtin templates can be configured as follows:
SOCIALACCOUNT_PROVIDERS = {
'openid': {
'SERVERS': [
dict(id='yahoo',
name='Yahoo',
openid_url='http://me.yahoo.com'),
dict(id='hyves',
name='Hyves',
openid_url='http://hyves.nl'),
dict(id='google',
name='Google',
openid_url='https://www.google.com/accounts/o8/id'),
]
}
}
You can manually specify extra_data you want to request from server as follows:
SOCIALACCOUNT_PROVIDERS = \
{ 'openid':
{ 'SERVERS':
[ dict(id='mojeid',
name='MojeId',
openid_url='https://mojeid.cz/endpoint/',
extra_attributes = [
('phone', 'http://axschema.org/contact/phone/default', False),
('birth_date', 'http://axschema.org/birthDate', False,),
])]}}
Attributes are in form (id, name, required) where id is key in extra_data field of socialaccount, name is identifier of requested attribute and required specifies whether attribute is required.
If you want to manually include login links yourself, you can use the following template tag:
{% load socialaccount %}
<a href="{% provider_login_url "openid" openid="https://www.google.com/accounts/o8/id" next="/success/url/" %}">Google</a>
The OpenID provider can be forced to operate in stateless mode as follows:
SOCIALACCOUNT_PROVIDERS = \
{ 'openid':
{ 'SERVERS':
[ dict(id='steam',
name='Steam',
openid_url='https://steamcommunity.com/openid',
stateless=True,
)]}}
Register your client application under My Settings/`oauth settings`:
https://www.openstreetmap.org/user/{Display Name}/oauth_clients
In this page you will get your key and secret
For more information: OpenStreetMap OAuth documentation: https://wiki.openstreetmap.org/wiki/OAuth
The ORCID provider should work out of the box provided that you are using the Production ORCID registry and the public API. In other settings, you will need to define the API you are using in your site's settings, as follows:
SOCIALACCOUNT_PROVIDERS = {
'orcid': {
# Base domain of the API. Default value: 'orcid.org', for the production API
'BASE_DOMAIN':'sandbox.orcid.org', # for the sandbox API
# Member API or Public API? Default: False (for the public API)
'MEMBER_API': True, # for the member API
}
}
The following Patreon settings are available:
SOCIALACCOUNT_PROVIDERS = {
'patreon': {
'VERSION': 'v1',
'SCOPE': ['pledges-to-me', 'users', 'my-campaign'],
}
}
- VERSION:
API version. Either
v1
orv2
. Defaults tov1
.- SCOPE:
Defaults to the scope above if using API v1. If using v2, the scope defaults to
['identity', 'identity[email]', 'campaigns', 'campaigns.members']
.- API documentation:
- App registration (get your key and secret for the API here):
https://www.patreon.com/portal/registration/register-clients
- Development callback URL
The following Paypal settings are available:
SOCIALACCOUNT_PROVIDERS = {
'paypal': {
'SCOPE': ['openid', 'email'],
'MODE': 'live',
}
}
- SCOPE:
In the Paypal developer site, you must also check the required attributes for your application. For a full list of scope options, see https://developer.paypal.com/docs/integration/direct/identity/attributes/
- MODE:
Either
live
ortest
. Set to test to use the Paypal sandbox.- App registration (get your key and secret here)
https://developer.paypal.com/webapps/developer/applications/myapps
- Development callback URL
Note: Mozilla Persona was shut down on November 30th 2016. See the announcement for details.
Mozilla Persona requires one setting, the "AUDIENCE" which needs to be the hardcoded hostname and port of your website. See https://developer.mozilla.org/en-US/Persona/Security_Considerations#Explicitly_specify_the_audience_parameter for more information why this needs to be set explicitly and can't be derived from user provided data:
SOCIALACCOUNT_PROVIDERS = {
'persona': {
'AUDIENCE': 'https://www.example.com',
}
}
The optional REQUEST_PARAMETERS
dictionary contains parameters that are passed as is to the navigator.id.request()
method to influence the look and feel of the Persona dialog:
SOCIALACCOUNT_PROVIDERS = {
'persona': {
'AUDIENCE': 'https://www.example.com',
'REQUEST_PARAMETERS': {'siteName': 'Example'},
}
}
The Pinterest OAuth2 documentation:
https://developers.pinterest.com/docs/api/overview/#authentication
You can optionally specify additional permissions to use. If no SCOPE
value is set, the Pinterest provider will use read_public
by default.
SOCIALACCOUNT_PROVIDERS = {
'pinterest': {
'SCOPE': [
'read_public',
'read_relationships',
]
}
}
- SCOPE:
For a full list of scope options, see https://developers.pinterest.com/docs/api/overview/#scopes
- App registration (get your key and secret here)
- Development callback URL
You can specify sandbox mode by adding the following to the SOCIALACCOUNT_PROVIDERS in your settings.
You can also add space-delimited scope to utilize the QuickBooks Payments and Payroll API
SOCIALACCOUNT_PROVIDERS = {
'quickbooks': {
'SANDBOX': TRUE,
'SCOPE': [
'openid',
'com.intuit.quickbooks.accounting com.intuit.quickbooks.payment',
'profile',
'phone',
]
}
}
- App registration (get your key and secret here)
- Development callback URL
By default, access to Reddit is temporary. You can specify the duration
auth parameter to make it permanent
.
You can optionally specify additional permissions to use. If no SCOPE
value is set, the Reddit provider will use identity
by default.
In addition, you should override your user agent to comply with Reddit's API rules, and specify something in the format <platform>:<app ID>:<version string> (by /u/<reddit username>)
. Otherwise, you will risk additional rate limiting in your application.
SOCIALACCOUNT_PROVIDERS = {
'reddit': {
'AUTH_PARAMS': {'duration': 'permanent'},
'SCOPE': ['identity', 'submit'],
'USER_AGENT': 'django:myappid:1.0 (by /u/yourredditname)',
}
}
The Salesforce provider requires you to set the login VIP as the provider model's 'key' (in addition to client id and secret). Production environments use https://login.salesforce.com/. Sandboxes use https://test.salesforce.com/.
HTTPS is required for the callback.
- Development callback URL
- Salesforce OAuth2 documentation
https://developer.salesforce.com/page/Digging_Deeper_into_OAuth_2.0_on_Force.com
To Use:
- Include allauth.socialaccount.providers.salesforce in INSTALLED_APPS
- In a new Salesforce Developer Org, create a Connected App with OAuth (minimum scope id, openid), and a callback URL
- Create a Social application in Django admin, with client id, client key, and login_url (in "key" field)
- The following ShareFile settings are available.
- SUBDOMAIN:
Subdomain of your organization with ShareFile. This is required.
- Example:
test
forhttps://test.sharefile.com
- APICP:
Defaults to
secure
. Refer to the ShareFile documentation if you need to change this value.- DEFAULT_URL:
Defaults to
https://secure.sharefile.com
Refer to the ShareFile documentation if you need to change this value.
Example:
SOCIALACCOUNT_PROVIDERS = {
'sharefile': {
'SUBDOMAIN': 'TEST',
'APICP': 'sharefile.com',
'DEFAULT_URL': 'https://secure.sharefile.com',
}
}
The Shopify provider requires a shop
parameter to login. For example, for a shop petstore.myshopify.com
, use this:
/accounts/shopify/login/?shop=petstore
You can create login URLs like these as follows:
{% provider_login_url "shopify" shop="petstore" %}
For setting up authentication in your app, use this url as your App URL
(if your server runs at localhost:8000):
http://localhost:8000/accounts/shopify/login/
And set Redirection URL
to:
http://localhost:8000/accounts/shopify/login/callback/
Embedded Apps
If your Shopify app is embedded you will want to tell allauth to do the required JS (rather than server) redirect.:
SOCIALACCOUNT_PROVIDERS = {
'shopify': {
'IS_EMBEDDED': True,
}
}
Note that there is more an embedded app creator must do in order to have a page work as an iFrame within Shopify (building the x_frame_exempt landing page, handing session expiration, etc...). However that functionality is outside the scope of django-allauth.
Online/per-user access mode Shopify has two access modes, offline (the default) and online/per-user. Enabling 'online' access will cause all-auth to tie the logged in Shopify user to the all-auth account (rather than the shop as a whole).:
SOCIALACCOUNT_PROVIDERS = {
'shopify': {
'AUTH_PARAMS': {'grant_options[]': 'per-user'},
}
}
- App registration (get your key and secret here)
- Development callback URL
- API documentation
SoundCloud allows you to choose between OAuth1 and OAuth2. Choose the latter.
- App registration (get your key and secret here)
- Development callback URL
Register your OAuth2 app over at http://stackapps.com/apps/oauth/register
. Do not enable "Client Side Flow". For local development you can simply use "localhost" for the OAuth domain.
As for all providers, provider specific data is stored in SocialAccount.extra_data
. For Stack Exchange we need to choose what data to store there by choosing the Stack Exchange site (e.g. Stack Overflow, or Server Fault). This can be controlled by means of the SITE
setting:
SOCIALACCOUNT_PROVIDERS = {
'stackexchange': {
'SITE': 'stackoverflow',
}
}
Steam is an OpenID-compliant provider. However, the steam provider allows access to more of the user's details such as username, full name, avatar, etc.
- You need to register an API key here:
Copy the Key supplied by the website above into BOTH Client ID and Secret Key fields of the Social Application.
- App Registration
- Site Domain, Must be an external url (127.0.0.1 and localhost do not work).
- Consumer key is your
client id
- Consumer secret is your
secret key
Register your OAuth2 app in api settings page:
In this page you will get your key and secret
Development callback URL (only the domain is required on strava.com/settings/api)
For more information: Strava auth documentation: https://developers.strava.com/docs/authentication/ API documentation: https://developers.strava.com/docs/reference/
You register your OAUth2 app via the Connect->Settings page of the Stripe dashboard:
This page will provide you with both a Development and Production client_id.
You can also register your OAuth2 app callback on the Settings page in the "Website URL" box, e.g.:
However, the OAuth2 secret key is not on this page. The secret key is the same secret key that you use with the Stripe API generally. This can be found on the Stripe dashboard API page:
- See more in documentation
You need to request an API Partnership to get your OAth credentials:
Make sure to request scope athlete:profile to be able to use OAuth for user login (default if setting SCOPE is omitted).
In development you should only use the sandbox services, which is the default unless you set USE_PRODUCTION to True.
SOCIALACCOUNT_PROVIDERS = {
'trainingpeaks': {
'SCOPE': ['athlete:profile'],
'USE_PRODUCTION': False,
}
}
API documentation:
Register the application at
You get one application key per account.
Save the "Key" to "Client id", the "Secret" to "Secret Key" and "Key" to the "Key" field.
Verify which scope you need at
Need to change the default scope? Add or update the trello setting to settings.py
SOCIALACCOUNT_PROVIDERS = {
'trello': {
'AUTH_PARAMS': {
'scope': 'read,write',
},
},
}
- App registration (get your key and secret here)
- Development callback URL
You will need to create a Twitter app and configure the Twitter provider for your Django application via the admin interface.
To register an app on Twitter you will need a Twitter account. With an account, you can create a new app via:
https://apps.twitter.com/app/new
In the app creation form fill in the development callback URL:
http://127.0.0.1:8000/accounts/twitter/login/callback/
Twitter won't allow using http://localhost:8000.
For production use a callback URL such as:
http://{{yourdomain}}.com/accounts/twitter/login/callback/
To allow users to login without authorizing each session, select "Allow this application to be used to Sign in with Twitter" under the application's "Settings" tab.
The second part of setting up the Twitter provider requires you to configure your Django application. Configuration is done by creating a Socialapp object in the admin. Add a social app on the admin page:
/admin/socialaccount/socialapp/
Use the twitter keys tab of your application to fill in the form. It's located:
https://apps.twitter.com/app/{{yourappid}}/keys
The configuration is as follows:
- Provider, "Twitter"
- Name, your pick, suggest "Twitter"
- Client id, is called "Consumer Key (API Key)" on Twitter
- Secret key, is called "Consumer Secret (API Secret)" on Twitter
- Key, is not needed, leave blank
In the app creation form fill in the development callback URL, e.g.:
http://127.0.0.1:8000/accounts/untappd/login/callback/
For production, make it your production host, e.g.:
http://yoursite.com/accounts/untappd/login/callback/
The configuration values come from your API dashboard on Untappd:
- Provider: "Untappd"
- Name: "Untappd"
- Client id: "Client ID" from Untappd
- Secret key: "Client Secret" from Untappd
- Sites: choose your site
In addition, you should override your user agent to comply with Untappd's API rules, and specify something in the format <platform>:<app ID>:<version string>
. Otherwise, you will risk additional rate limiting in your application.
SOCIALACCOUNT_PROVIDERS = {
'untappd': {
'USER_AGENT': 'django:myappid:1.0',
}
}
SOCIALACCOUNT_PROVIDERS = {
'telegram': {
'TOKEN': 'insert-token-received-from-botfather'
}
}
- App registration (get your key and secret here)
- Development callback URL
- App registration (get your key and secret here)
- Development callback URL
- App registration
- Development callback URL ("Site address")
The Windows Live provider currently does not use any settings in SOCIALACCOUNT_PROVIDERS
.
- App registration (get your key and secret here)
- Development callback URL
Microsoft calls the "client_id" an "Application Id" and it is a UUID. Also, the "client_secret" is not created by default, you must edit the application after it is created, then click "Generate New Password" to create it.
Register your OAuth2 app over at http://open.weibo.com/apps
. Unfortunately, Weibo does not allow for specifying a port number in the authorization callback URL. So for development purposes you have to use a callback url of the form http://127.0.0.1/accounts/weibo/login/callback/
and run runserver 127.0.0.1:80
.
The Weixin OAuth2 documentation:
Weixin supports two kinds of oauth2 authorization, one for open platform and one for media platform, AUTHORIZE_URL is the only difference between them, you can specify AUTHORIZE_URL
in setting, If no AUTHORIZE_URL
value is set will support open platform by default, which value is https://open.weixin.qq.com/connect/qrconnect
.
You can optionally specify additional scope to use. If no SCOPE
value is set, will use snsapi_login
by default(for Open Platform Account, need registration). Other SCOPE
options are: snsapi_base, snsapi_userinfo.
SOCIALACCOUNT_PROVIDERS = {
'weixin': {
'AUTHORIZE_URL': 'https://open.weixin.qq.com/connect/oauth2/authorize', # for media platform
'SCOPE': ['snsapi_base'],
}
}
- App registration (get your key and secret here)
- Development callback URL
- Register your OAuth2 app below and enter the resultant client id and secret into admin
The Redirect URL requires secure URLs, please see the section on HTTPS about how this is handled.
When you register the app within yahoo, ensure you select the following API Permissions
- - OpenID Connect Permissions
- Profile
When copying the supplied Client ID and Client Secret, do not include the 4 starting spaces.
- App registration (get key and secret here)
- Development callback URL
Yandex OAuth app has many different access rights for its services. For the basic access level, you just need to a choose "Yandex.Passport API" section and check "Access to email address" and "Access to username, first name and surname, gender". Everything else is optional.
- App Registration
- Development callback URL
Default SCOPE permissions are 'read-only'. If this is the desired functionality, do not add SCOPE entry with ynab app in SOCIALACCOUNT_PROVIDERS. Otherwise, adding SCOPE and an empty string will give you read / write.
SOCIALACCOUNT_PROVIDERS = {
'ynab': {
'SCOPE': ''
}
}
- App Registration
https://api-console.zoho.com/add
Select "Server-base Applications"
- Authorized Redirect URI
- App Registration
- Development callback URL
Select scope user:read during app registration.
Feishu ----
- App Registration
- Authorized Redirect URI
Into the developer background https://open.feishu.cn/app, click on the create self-built application, obtain app_id and app_secret. In the configuration of application security domain name added to redirect URL, such as https://open.feishu.cn/document. Redirect URL is the interface through which the application obtains the user's identity by using the user login pre-authorization code after the user has logged in. If it is not configured or configured incorrectly, the open platform will prompt the request to be illegal.