This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| user_guide:social_login [2016/05/09 20:14] – [RADIUSdesk side] admin | user_guide:social_login [2019/06/25 13:53] (current) – [Facebook side] admin | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Social Login overview ====== | ====== Social Login overview ====== | ||
| * Social Logins are also supported in RADIUSdesk and is configured as part of the **Dynamic Login Pages**. | * Social Logins are also supported in RADIUSdesk and is configured as part of the **Dynamic Login Pages**. | ||
| - | * Unlike some hardware vendors which **Only** support Facebook (https:// | + | * Unlike some hardware vendors which **Only** support Facebook (https:// |
| - | * This allow you to include other providers besides Facebook. | + | * This allows |
| - | * Opauth refer to these providers as **Strategies** and include | + | * **Hybridauth** |
| - | * Bitbucket, Facebook, Flickr, Github, Google, Instagram, LinkedIn, (Windows)Live, | + | * The lastest list of supported providers can be found on this page: [[https:// |
| * Using this approach we are now <wrap em> | * Using this approach we are now <wrap em> | ||
| Line 16: | Line 16: | ||
| ===== The basics ===== | ===== The basics ===== | ||
| - | * RADIUSdesk supports three **Strategies** out-of-the-box. | + | * RADIUSdesk supports three **Providers** out-of-the-box. |
| * Google+ | * Google+ | ||
| - | * Each Dynamic Login Page has an option where we can configure zero or more of the supported | + | * Each Dynamic Login Page has an option where we can configure zero or more of the supported |
| - | * If one is configured there will appear a Social Login button for that Strategy | + | * If one is configured there will appear a Social Login button for that Provider |
| * When the user then click on the **Login with Facebook** button they will be: | * When the user then click on the **Login with Facebook** button they will be: | ||
| * Authenticated to the captive portal with a temporary account and redirected to the authentication provider' | * Authenticated to the captive portal with a temporary account and redirected to the authentication provider' | ||
| Line 32: | Line 32: | ||
| * The user used for the temporary session. | * The user used for the temporary session. | ||
| - | * The configuration of the Strategies | + | * The configuration of the Providers |
| * Common to all | * Common to all | ||
| Line 41: | Line 41: | ||
| ====== The user used for the temporary session ====== | ====== The user used for the temporary session ====== | ||
| - | * Because we can make use of multiple | + | * Because we can make use of multiple |
| * We make use of a temporary user account which will log the user into the captive portal and then redirect them to the authentication provider' | * We make use of a temporary user account which will log the user into the captive portal and then redirect them to the authentication provider' | ||
| * You can choose per Dynamic Login Page which temporary user to use. | * You can choose per Dynamic Login Page which temporary user to use. | ||
| Line 61: | Line 61: | ||
| * Click **Save** to commit your selection. | * Click **Save** to commit your selection. | ||
| * At his stage we have not defined any providers and there will thus not be any Social Login buttons displayed on the Login Page. | * At his stage we have not defined any providers and there will thus not be any Social Login buttons displayed on the Login Page. | ||
| - | * Next we will cover the common elements among the Strategies | + | * Next we will cover the common elements among the Providers |
| ------------------- | ------------------- | ||
| - | ====== Common to all Strategies | + | ====== Common to all Providers |
| - | * Each Strategy | + | * Each Provider |
| * You have to choose: | * You have to choose: | ||
| * Whether to auto-create a **Voucher** or **Permanent User** the first time a user authenticated with success using the authentication provider. | * Whether to auto-create a **Voucher** or **Permanent User** the first time a user authenticated with success using the authentication provider. | ||
| * Specify the **Realm** this Voucher or Permanent User should belong to. | * Specify the **Realm** this Voucher or Permanent User should belong to. | ||
| * Specify the **Profile** this Voucher or Permanent User should belong to. | * Specify the **Profile** this Voucher or Permanent User should belong to. | ||
| - | * Specify if the Strategy | + | * Specify if the Provider |
| * Specify if the system should record / update the personal info obtained from the authentication provider. | * Specify if the system should record / update the personal info obtained from the authentication provider. | ||
| Line 87: | Line 87: | ||
| * To implement Facebook integration you need to create a Facebook application on Facebook and then also use those details in RADIUSdesk. | * To implement Facebook integration you need to create a Facebook application on Facebook and then also use those details in RADIUSdesk. | ||
| ===== Facebook side ===== | ===== Facebook side ===== | ||
| - | * Active the Developer side of Facebook and create a Facebook application. | + | * Active the Developer side of Facebook and create a Facebook application. |
| - | * Go to the **Settings** of the application and specify the URL of the server where you will serve the login pages from. | + | |
| - | * Beware that Facebook require that the redirected URL be precisely the same as the one specified. This means that if your login page on the captive portal looks like http://69.30.244.107/ you also have to mirror that. If on the other hand you use a hostname, be sure that they also match e.g http://rd01.wificity.asia/ | + | |
| - | {{ : | + | * Below you can see how it looks when we have not yet defined any applications. Go to **My Apps** -> **Create New App**. |
| - | * Record the application' | + | |
| - | * Select | + | {{: |
| + | |||
| + | | ||
| + | |||
| + | {{: | ||
| + | |||
| + | * You will also be required to verify that you are human | ||
| + | |||
| + | {{: | ||
| + | |||
| + | * Facebook will now generate your App with a unique ID which you will later use in RADIUSdesk' | ||
| + | * The App itself will have settings which you can access. Under the **Basic** settings you will find the **App Id** and **App Secret**. | ||
| + | * Record the application' | ||
| + | |||
| + | {{: | ||
| + | |||
| + | * You can now go to the **Products** menu in the bottom left. Click on add a **Product**. We need to add **Facebook Login**. This product will allow for **OAuth2** based authentication which is what we need for Social Logins. | ||
| + | |||
| + | {{: | ||
| + | |||
| + | * Ignore the **Quickstart** options | ||
| + | |||
| + | {{: | ||
| + | |||
| + | * Facebook tighten their security a lot and one now have to explicitly specify the URL's which OAuth will redirect back to. (Our RADIUSdesk server) | ||
| + | * They also force you to use **https** on the server you specify that you will be redirecting back to. | ||
| + | * Our server here is **dev.radiusdesk.com**. Please change this in order to fit your environment. | ||
| + | * The URI in our deployment is https:// | ||
| + | * This is the value we specify in the **Valid OAuth Redirect URIs** | ||
| + | |||
| + | {{: | ||
| + | |||
| + | * After you saved this there is one item outstanding before you can configure the RADIUSdesk side. | ||
| + | * Top left is a switch to take the App out of development | ||
| <WRAP center round alert 90%> | <WRAP center round alert 90%> | ||
| - | Failing to make the application | + | Failing to make the application |
| </ | </ | ||
| - | {{ : | ||