Comments (3)
Thanks for the request,
We have no intention to support Embedded WebView, one of the reasons is that Google has blocked OAuth flows from Embedded WebViews since 2017, see https://auth0.com/blog/google-blocks-oauth-requests-from-embedded-browsers/ for more information around this.
Even though this is not Xamarin, but the native WebView documentation also recommends using browsers such as Chrome: https://developer.android.com/reference/android/webkit/WebView
Our general recommendation is to use a trusted browser to ensure users are aware they are entering their credentials in a known and secure browser.
That said, what browser are you using for Auth0Client? Or are you relying on the default one?
We have two browsers available:
- https://github.com/auth0/auth0-oidc-client-net/blob/master/src/Auth0.OidcClient.Android/ChromeCustomTabsBrowser.cs
- https://github.com/auth0/auth0-oidc-client-net/blob/master/src/Auth0.OidcClient.Android/SystemBrowser.cs
ChromeCustomTabsBrowser should be used by default and results in the behavior visible in the GIF here: https://developer.chrome.com/multidevice/android/customtabs
Is this the one you are using? If so, what exactly do you not like about that?
from auth0-oidc-client-net.
Thanks for reopening and inquiring. I might have been a bit too narrow with the original problem description. As far as I know, the main problem was not just Android, but especially die dialogue on iOS that asks the user every time if it is allowed to login using an external provider. Is there any way we can circumvent that and give a more seamless experience?
I will also ask my colleague again for more details and then come back to you with more info.
from auth0-oidc-client-net.
There is more information around this here: https://community.auth0.com/t/ios-swift-remove-consent-dialog-social-login-with-auth0/9006/5
But in short, this is a decision from Apple to protect their users in case you want to authenticate using an external provider.
There is however a way to not show this popup, which is by using Ephemeral Sessions (there is a feature request for it here: #157).
Keep in kind that, even tho this removes the popup, it has other consequences for the user:
- No cookie is saved
- User has to re-login every time they click login
- Acts as if you are using an incognito browser
So if that popup is what you want to avoid, the only solution is to wait for #157 to be implemented. I will be closing this issue as a duplicate, but feel free to reopen if needed.
from auth0-oidc-client-net.
Related Issues (20)
- System.ArgumentException if using the same dictionary object as "extraParameters" argument in the "LoginAsync" function to log in multiple times HOT 3
- Impossible to login anymore, any recent breaking change ? HOT 10
- federated logout is not working on WinForms HOT 7
- Android Auth0Client Throwing Errors on Login: Error loading discovery document: Error connecting to https://<url>/.well-known/openid-configuration. The SSL connection could not be established HOT 5
- Scope set to null when calling RefreshTokenAsync HOT 14
- Login browser appears again after successfully login on Xamarin Forms (Android) HOT 12
- Token validation error (Android) HOT 4
- Uninstalling the app without logging out didn't clear the browser’s session cookie (Xamarin Android) HOT 1
- Error processing method: 'System.Void Auth0.OidcClient.Auth0ClientBase/<RefreshTokenAsync> HOT 2
- Auth0.OidcClient.WPF HOT 3
- Package Auth0.OidcClient.iOS 3.3.7 is not compatible with net7.0-ios16.1 (.NETCoreApp,Version=v7.0). Package Auth0.OidcClient.iOS 3.3.7 supports: xamarinios10 (Xamarin.iOS,Version=v1.0) HOT 15
- Error loading discovery document: Error connecting to https://yourDomain/.well-known/jwks.json HOT 8
- JsonSerializationException in .Net 7 for iOS Project HOT 2
- LogoutAsync Headless Browser Option HOT 5
- Documentation: Readme documentation link is broken HOT 1
- An option to open the Webview in full screen ( Maximized ) using Auth0.OidcClient.WPF HOT 1
- What does BrowserResultType.UserCancel indicates? HOT 8
- Error getting configuration for JWK in Auth0.OidcClient.Tokens because of incorrect metadataAddress (/.well-known/openid-configuration) HOT 1
- Allow environment override for WebView2 HOT 1
- browser window open after login HOT 1
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from auth0-oidc-client-net.