Lock-Google 3.0.0

Lock-Google 3.0.0

TestsTested
LangLanguage Obj-CObjective C
License MIT
ReleasedLast Release Jan 2017

Maintained by Hernan Zalazar.


Downloads

Total2,740
Week0
Month0

Installs

Apps64
Test Targets6
powered by Segment

GitHub

Stars0
Watchers67
Forks3
Issues4
Contributors5
Pull Requests0

Code

Files5
LOCLines of Code 277


 
Depends on:
Google/SignIn~> 3.0.0
Lock/Core~> 1.27
 

  • By
  • Auth0 and Hernan Zalazar

Auth0 is an authentication broker that supports social identity providers as well as enterprise identity providers such as Active Directory, LDAP, Google Apps and Salesforce.

Lock-Google helps you integrate native login with Google iOS SDK and Lock

Requierements

iOS 7+

Install

The Lock-Google is available through CocoaPods. To install it, simply add the following line to your Podfile:

Swift & Frameworks

If you are using CocoaPods with the uses_frameworks! flag in your Podfile, adding Lock-Google might make CocoaPods fail because Google SignIn library is distributed as a static lib. A workaround for this case is to add the following files to your project:

And Google SignIn library to your project or to your Podfile like this:

pod 'Google/SignIn', '~> 1.0'

Before you start using Lock-Google

In order to use Google APIs you'll need to register your iOS application in Google Developer Console and get your clientId. We recommend follwing this wizard instead and download the file GoogleServices-Info.plist that is generated at the end.

Add that file to your application's target and the last step is to register two custom URL for your application.

The first URL should have a scheme equal to your application Bundle Identifier, the other one should be your Google clientId reversed, so if your clientID is CLIENTID.apps.googleusercontent.com the scheme will be com.googleusercontent.apps.CLIENTID

This last value can be found in GoogleServices-Info.plist under the key REVERSED_CLIENT_ID For more information please check Google's documentation

Auth0 Connection with multiple Google clientIDs (Web & Mobile)

If you also have a Web Application, and a Google clientID & secret for it configured in Auth0, you need to whitelist the Google clientID of your mobile application in your Auth0 connection. With your Mobile clientID from Google, go to Social Connections, select Google and add the clientID to the field named Allowed Mobile Client IDs

Usage

Just create a new instance of A0GoogleAuthenticator

A0GoogleAuthenticator *google = [A0GoogleAuthenticator newAuthenticator];
let google = A0GoogleAuthenticator.newAuthenticator()

and register it with your instance of A0Lock

A0Lock *lock = //Get your A0Lock instance
[lock registerAuthenticators:@[google]];
let lock:A0Lock = //Get your A0Lock instance
lock.registerAuthenticators([google])

A good place to create and register A0GoogleAuthenticator is the AppDelegate.

Specify scopes

A0GoogleAuthenticator *google = [A0GoogleAuthenticator newAuthenticatorWithScopes:@[@"scope1", @"scope2"]];
let google = A0GoogleAuthenticator.newAuthenticatorWithScopes(["scope1", "scope2"])

Custom Google connection

A0GoogleAuthenticator *google = [A0GoogleAuthenticator newAuthenticatorForConnectionName:@"my-google-connection"];
let google = A0GoogleAuthenticator.newAuthenticatorForConnectionName("my-google-connection")

Please check CocoaDocs for more information about LockGoogle API.

Issue Reporting

If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.

What is Auth0?

Auth0 helps you to:

  • Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
  • Add authentication through more traditional username/password databases.
  • Add support for linking different user accounts with the same user.
  • Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
  • Analytics of how, when and where users are logging in.
  • Pull data from other sources and add it to the user profile, through JavaScript rules.

Create a free account in Auth0

  1. Go to Auth0 and click Sign Up.
  2. Use Google, GitHub or Microsoft Account to login.

Author

Auth0

License

Lock-Google is available under the MIT license. See the LICENSE file for more info.