aerogear-ios-oauth2 | Client library for OAuth2/OpenID Connect | Authentication library

 by   aerogear Swift Version: 2.1.0 License: Apache-2.0

kandi X-RAY | aerogear-ios-oauth2 Summary

kandi X-RAY | aerogear-ios-oauth2 Summary

aerogear-ios-oauth2 is a Swift library typically used in Security, Authentication applications. aerogear-ios-oauth2 has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.

OAuth2 Client based on aerogear-ios-http.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              aerogear-ios-oauth2 has a low active ecosystem.
              It has 152 star(s) with 84 fork(s). There are 41 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              aerogear-ios-oauth2 has no issues reported. There are 2 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of aerogear-ios-oauth2 is 2.1.0

            kandi-Quality Quality

              aerogear-ios-oauth2 has 0 bugs and 0 code smells.

            kandi-Security Security

              aerogear-ios-oauth2 has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              aerogear-ios-oauth2 code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              aerogear-ios-oauth2 is licensed under the Apache-2.0 License. This license is Permissive.
              Permissive licenses have the least restrictions, and you can use them in most projects.

            kandi-Reuse Reuse

              aerogear-ios-oauth2 releases are available to install and integrate.
              Installation instructions are not available. Examples and code snippets are available.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of aerogear-ios-oauth2
            Get all kandi verified functions for this library.

            aerogear-ios-oauth2 Key Features

            No Key Features are available at this moment for aerogear-ios-oauth2.

            aerogear-ios-oauth2 Examples and Code Snippets

            No Code Snippets are available at this moment for aerogear-ios-oauth2.

            Community Discussions

            Trending Discussions on aerogear-ios-oauth2

            QUESTION

            Recommended authentication flow on MDM managed iOS devices
            Asked 2018-Jan-29 at 07:00

            We're building an iOS native app together with two web apps. For identiy/access management we are using Keycloak (supports OpenID Connect and OAuth 2.0).

            The iOS apps are installed on MDM managed devices. Only our apps are installed.

            I learnt that the current best practice for implementing authentication/authorization is to use OpenId Connect and a browser based flow through an external user agent:

            using one of these libraries:

            Is it also recommended for MDM managed iOS devices (with no "evil" third party apps, just our own stuff) to implement a browser based flow? Or is it safe in this case to implement a native login flow (user enters credentials directly into the app)?

            I am worried about the user experience... That switch between our app and the browser does not look very smooth...

            ...

            ANSWER

            Answered 2018-Jan-29 at 07:00

            There is an RFC about OAuth2 for native apps. It's worth reading - it discusses possible implementations and security risks involved. The general recommended way is to use the authorization code flow in a browser (not an internal application component), because this way the application cannot get the user credentials. People use to trust the browser and the authentication provider more than other apps, so the visibility of URL and the verified SSL certificate is important too.

            The RFC covers also the iOS implementation details:

            Apps can initiate an authorization request in the browser, without the user leaving the app, through the "SFSafariViewController" class or its successor "SFAuthenticationSession", which implement the in- app browser tab pattern. Safari can be used to handle requests on old versions of iOS without in-app browser tab functionality.

            So if you use the SFAuthenticationSession you don't need to open a new Safari window and the user experience should not suffer.

            If you use the Resource Owner Password Credentials grant (users enter their credentials into your application directly), you will make it less secure for the same reasons - the credentials get exposed to the application. And using this grant, you cannot use the third party authentication providers in Keycloak (Google, Facebook).

            It's up to you (and your organization) how much secure you want the system to be, so you can opt for some compromises, but I would rather stick to the current best practices, since the app may grow later the compromises may turn to problems.

            Source https://stackoverflow.com/questions/48491368

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install aerogear-ios-oauth2

            You can download it from GitHub.

            Support

            For more details about that please consult our documentation.
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/aerogear/aerogear-ios-oauth2.git

          • CLI

            gh repo clone aerogear/aerogear-ios-oauth2

          • sshUrl

            git@github.com:aerogear/aerogear-ios-oauth2.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular Authentication Libraries

            supabase

            by supabase

            iosched

            by google

            monica

            by monicahq

            authelia

            by authelia

            hydra

            by ory

            Try Top Libraries by aerogear

            offix

            by aerogearTypeScript

            create-graphql

            by aerogearJavaScript

            keycloak-metrics-spi

            by aerogearJava

            graphback

            by aerogearTypeScript