Skip to content

Latest commit

 

History

History
276 lines (234 loc) · 11.8 KB

README.md

File metadata and controls

276 lines (234 loc) · 11.8 KB

Schibsted account Android SDK

Build Status GitHub release (latest by date) Platform License: MIT

New implementation of the Schibsted account Android SDK using the web flows via Custom Tabs:

  • API documentation can be found here.
  • An example implementation of the SDK can be found here.

Getting started

To implement login with Schibsted account in your app, please first have a look at our best practices documentation. This will help you create a client and configure the necessary data.

Important notes

  • This SDK requires your client to be registered as a public_mobile_client in Self Service (see the mobile sdk's dedicated section for more information).
  • Using App Links should be preferred for security reasons. To support older Android versions, configure a fallback page at the same web address to forward authorization responses to your app via a custom scheme.

Installation

The SDK is available via Maven Central:

implementation 'com.schibsted.account:account-sdk-android-web:<version>'

Usage

  1. In your AndroidManifest.xml, configure the necessary intent filter for RedirectUriReceiverActivity which handles the auth response after completed user creation/login.

    <activity
        android:name="com.schibsted.account.webflows.activities.RedirectUriReceiverActivity">
        <intent-filter>
            <action android:name="android.intent.action.VIEW" />
            <category android:name="android.intent.category.DEFAULT" />
            <category android:name="android.intent.category.BROWSABLE" />
            <data android:scheme="app.example.com"
                  android:path="/login"/>
        </intent-filter>
    </activity>
  2. Create a Client instance (see ExampleApp as reference):

    val clientConfig = ClientConfiguration(Environment.PRE, "<clientId>", "<redirect uri>")
    val okHttpClient = OkHttpClient.Builder().build() // this client instance should be shared within your app
    val client = Client(
        context = applicationContext,
        configuration = clientConfig,
        httpClient = okHttpClient
    )
  3. Initialise AuthorizationManagementActivity on app startup (see ExampleApp as reference):

    class App : Application() {
        override fun onCreate() {
            super.onCreate()
    
            val completionIntent = Intent(this, <Activity started after completed login>)
            val cancelIntent = Intent(this, <Activity started after cancelled login>)
            AuthorizationManagementActivity.setup(
                client = client,
                completionIntent = PendingIntent.getActivity(this, 0, completionIntent, 0),
                cancelIntent = PendingIntent.getActivity(this, 0, cancelIntent, 0)
            )
        }
    }

    Note: completionIntent and cancelIntent are optional if you want to redirect user to a specific activity on login completion. You can also observe AuthResultLiveData and navigate on its result (see step 4. below).

  4. Observe the AuthResultLiveData singleton instance to access the logged-in user (see MainActivity as reference):

    class MainActivity : AppCompatActivity() {
        override fun onCreate(savedInstanceState: Bundle?) {
            super.onCreate(savedInstanceState)
    
            AuthResultLiveData.get().observe(this,
                Observer { maybeAuthResult ->
                    val authResult = maybeAuthResult ?: return@Observer
                    authResult
                        .foreach { user ->
                            // TODO the user completed the login flow or an already logged-in user was resumed
                        }
                        .left().foreach(this::handleNotAuthedState)
                })
        }
    
        private fun handleNotAuthedState(state: NotAuthed): Unit {
            when {
                state === NotAuthed.NoLoggedInUser -> {
                    // TODO no logged-in user could be resumed or user was logged-out
                }
                state === NotAuthed.CancelledByUser -> {
                    // TODO the user cancelled the login flow (by pressing back or closing auth activity)
                }
                state === NotAuthed.AuthInProgress -> {
                    // TODO login flow is in progress
                }
                state is NotAuthed.LoginFailed -> {
                    // TODO some error occurred
                }
            }
        }
    }
  5. If no user is logged-in, start the login flow. For example on button click:

    loginButton.setOnClickListener { _ ->
        val authIntent = client.getAuthenticationIntent(this)
        startActivity(authIntent)
    }

Manual flow

The recommended usage (see above) automatically handles the following cases for you:

  • If the user cancels the flow.
  • Managing the back stack such that the Custom Tabs instance is cleared from it.
  • Makes the logged-in user easily accessible via a LiveData instance.

If you want/need more control over the flow you can manage the flow manually, by following these steps:

  1. Create a new Activity that will receive the auth response via deep link and add it to your AndroidManifest.xml:
    <activity
        android:name="<your activity>">
        <intent-filter>
            <action android:name="android.intent.action.VIEW" />
            <category android:name="android.intent.category.DEFAULT" />
            <category android:name="android.intent.category.BROWSABLE" />
            <data android:scheme="https"
                  android:host="app.example.com"
                  android:path="/applogin"/>
        </intent-filter>
    </activity>
  2. In that activity, make sure to call Client.handleAuthenticationResponse when receiving an intent via deep link:
    client.handleAuthenticationResponse(intent) { result ->
        result
            .foreach { user: User ->
                // TODO the user completed the login flow
            }
            .left().foreach { error: LoginError ->
                // TODO some error occurred
            }
    }
  3. To get a logged-in user, first try to resume the last logged-in user:
    val user = client.resumeLastLoggedInUser()
    if (user != null) {
        // TODO user could successfully be resumed
    } else {
        // TODO no previously logged-in user could be resumed
    }
  4. If no user could be resumed, start the login flow. For example on button click:
    loginButton.setOnClickListener { _ -> client.launchAuth(this) }

Included functionality

  • Single-sign on via web flows, offering one-click login for returning users (via shared cookies in CustomTabs).
    • With support for custom scope values, MFA, etc. See here for more information.
  • Automatic and transparent management of user tokens.
    • Authenticated requests to backend services can be done via User.makeAuthenticatedRequest.

      If you want to use for example Retrofit, you can bind the current user session to an OkHttpClient with
      User.bind.

      Security notice: Use a separate OkHttpClient instance to make requests that require tokens to avoid leaking user tokens to non-authorized APIs:

      val clientBuilder = OkHttpClient.Builder() // or use client.newBuilder() if you already have an existing OkHttpClient, to ensure underlying resources are shared as recommended
      val myService = clientBuilder.let {
          user?.bind(it)
          Retrofit.Builder()
              .baseUrl(<URL>)
              .client(it.build())
              .build()
              .create(<Your service interface>)
      }

      The SDK will automatically inject the user access token as a Bearer token in the HTTP Authorization request header. If the access token is rejected with a 401 Unauthorized response (e.g. due to having expired), the SDK will try to use the refresh token to obtain a new access token and then retry the request once more.

      Note: If the refresh token request fails, due to the refresh token itself having expired or been invalidated by the user, the SDK will log the user out.

Login prompt

This is a light version of simplified-login, allowing mobile app developers integrating this SDK to prompt users for log in if a valid session was already detected on the device. This feature is making use of the single-sign on feature from web, allowing users to log in with only two taps.

Note that for this feature to work, both the app where the user has a valid session, and the app that implements and requests the login prompt need to use Android SDK Web version 6.1.0 or newer.

Note that it is the calling app's responsibility to request the login prompt only if the user is not already logged in, or if any other specific conditions are met.

Example:

if (!user?.isLoggedIn()) {
    lifecycleScope.launch {
        ExampleApp.client.requestLoginPrompt(applicationContext, supportFragmentManager, true)
    }
}

ExternalId for TCF

To support TCF consent exchange between native and webview, we have added a new method to the SDK, which allows you to create an externalId for the consent sharing support. To get the externalId, you need to call the following method:

client.getExternalId(pairId: String, externalParty: String, optionalSuffix: String = "")

pairId can be found under UserProfileResponse.pairId property.

Pulse tracking

We have also added a way of integrating the app's Pulse instance into the SDK allowing internal events to be sent.

Important: When integrating with the SDK defined events, please keep in mind that the Pulse instance needs to map [SchibstedAccountTrackingEvent].providerComponent to provider.component and [SchibstedAccountTrackingEvent].deployTag to deploy_tag before pushing the created events.

This is a temporary solution and will be subject to changes in the future, but in the meanwhile you can use the provided example from ExampleApp to connect your Pulse event transmitter, which will be then used internally to track login-prompt flows and also send events if the login was successful or not.