Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/curityio/oauth-mobile-web-sso

Using the nonce authenticator pattern to achieve SSO between a mobile app and a web app
https://github.com/curityio/oauth-mobile-web-sso

code-example mobile nonce oauth2 openid-connect sso

Last synced: 5 days ago
JSON representation

Using the nonce authenticator pattern to achieve SSO between a mobile app and a web app

Awesome Lists containing this project

README

        

# OAuth Mobile Web SSO Code Example

Demo mobile apps and SPA, to demonstrate the nonce authenticator pattern on a development computer.\
This provides an additional Single Sign On (SSO) option between mobile and web apps, to prevent a double login.

## Run the Code Example

The following components are called, from a mobile emulator or device.\
The SPA and OAuth agent are hosted on the same domain, behind a Docker based reverse proxy.\
This ensures that the HTTP-only cookies issued to the SPA are first-party:

![Components](./doc/components.jpg)

Build and deploy the system with the following commands:

```bash
./build.sh
./deploy.sh
```

To enable a setup that works on a standalone computer, an ngrok base URL is used:

```bash
The internet base URL is: https://c7b9-2-26-158-168.eu.ngrok.io
```

Mobile and web apps running on devices or emulators then have full connectivity, over HTTPS URLs.\
Backend components use URLs similar to the following values:

| Component | Internet URL |
| --------- | ------------ |
| Web Host | https://c7b9-2-26-158-168.eu.ngrok.io/spa |
| OAuth Agent | https://c7b9-2-26-158-168.eu.ngrok.io/oauth-agent |
| Curity Identity Server Runtime URL | https://c7b9-2-26-158-168.eu.ngrok.io |

The Curity Identity Server Admin UI is available at `https://localhost:6749/admin`.\
Sign in with credentials `admin / Password1` to inspect the OAuth configuration.

## Application Flow

Run the mobile client from Android Studio or Xcode, and an unauthenticated view will be shown:

| Android | iOS |
| ------- | --- |
| |

Click the login button and sign in as `demouser / Password1`.

| Android | iOS |
| ------- | --- |
| |

The authenticated view will then be presented, to enable navigation to the SPA:

| Android | iOS |
| ------- | --- |
| |

The mobile app posts its ID token to the nonce authenticator in order to get a one-time token.\
It then passes the nonce in a query string parameter to the SPA, when loading it in a browser.\
The SPA then runs an OpenID Connect redirect that authenticates the user automatically, using the nonce:

| Android | iOS |
| ------- | --- |
| |

## Website Documentation

See the following resources for further information:

- [Mobile Web SSO Code Example](https://curity.io/resources/learn/mobile-web-sso)
- [Nonce Authenticator Pattern](https://curity.io/resources/learn/nonce-authenticator-pattern)
- [Nonce Authenticator Plugin](https://github.com/curityio/nonce-authenticator)

## More Information

Please visit [curity.io](https://curity.io/) for more information about the Curity Identity Server.