Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

Still under construction ... more details coming soon ...

OAuth 2.0 Consumer for Apache Shindig

...

For more information on the related service provider (but still separate) click here: OAuth 2.0 Service Provider Implementation in Apache Shindig

Also being tracked at https://issues.apache.org/jira/browse/SHINDIG-1624

The consumer implementation is v2-21 compliant and was tested against Google, Facebook and the internal shindig provider documented in this Wiki and linked to above.

Overview

  • The OAuth 2.0 Consumer proposal is the combination of a small number of changes to the gadget spec and gadgets.io.makeRequest() API to allow gadgets running in an OpenSocial container to make proxied HttpRequests to service providers protected by OAuth 2.0.
  • The Shindig 3.0.0. Java Reference Implementation is an OAuth 2.0-v21 spec compliant server side implementation that supports Authorization Code (3-leggedparty) and Client Credentials (2-leggedparty) flows.  
  • It has been tested against Google API, Facebook API and the Shindig Provider developed by Matt and Eric with the "Bearer" Token Type.
  • The reference implementation can be extended (via Guice binding injections) to support additional Client Authentication requirements, Grant Types, Token Types, Authorization Responses and Token Responses.
  • The default OAuth2Request and OAuth2Store implementations offer other plugin points required for production-ready OAuth 2.0 deployments.  Persistence, Caching and Secret Encryptpion.
  1. OpenSocial Specification Considerations

  2. Running the Demo Gadgets

...

You will need Google and Facebook accounts and registered applications for these steps....

http://code.google.com/apis/accounts/docs/OAuth2.html

http://developers.facebook.com/docs/authentication/

The redirect_uris for your applications must match the oauth2callback servlet in your shindig environment.

For instance : http://localhost:8080/gadgets/oauth2callback

  1. Extract the Shindig trunk from https://svn.apache.org/repos/asf/shindig/

  2. Apply the patch from https://reviews.apache.org/r/1947/diff/raw
  3. Edit config/oauth2.json - replace the client_id and client_secret placeholders in the "googleApi_client1" and "facebook_client1" clients with the applications you created.  Make sure to keep your

    OAuth 2.0

    secrets secret.
  4. Build and deploy the shindig WAR.
  5. Run the common container and add the "OAuth2 Demo with Google Provider" or "OAuth2 Demo with Facebook Provider".
  6. Click the "Personalize this gadget" link to initiate the OAuth 2.0 Authorization Code (3-legged) flow which will redirect you to the service provider (Google or Fa.cebook) for authorization
  7. Enter your credentials for the service provider, don't worry they are safe and never leave Googe/Facebook.
  8. The service provider will return an authorization code and subsequently access_token to shindig and the gadget's makeRequest() call will pull your Contacts/Friends.
  9. When you are done you can disable your access_token on the service provider site.

Using Google and Facebook and having Google/Facebook accounts and applications is not necessary.  The OAuth 2.0 Consumer should work against any v20 or v21 spec compliant service provider.  It will require writing your gadget and registering it's client in config/oauth2.json

You can also use the Shindig OAuth 2.0 Provider (currently under review) that has been submitted to shindig.  The Consumer contains two sample gadgets that demonstrate the integrated capabilities.

  1. Extract the Shindig trunk from https://svn.apache.org/repos/asf/shindig/
  2. Apply the patch from https://reviews.apache.org/r/1947/diff/raw
  3. Apply the patch from https://reviews.apache.org/r/1940/diff/raw
  4. Run the common container and add the "OAuth2 Demo with Shindig Provider (Authorization Code)" or "OAuth2 Demo with Shindig Provider (Client Credentials)
  5. Client Credentials does not cause a redirect

    Flow Support

  6. High Level Design Overview (NOT DONE)

  7. Client Authentication

  8. Authorization Response Handling

  9. OAuth2CallbackServlet

  10. Token Response Handling

  11. Grant Types (NOT DONE)

  12. Token Types (NOT DONE)

  13. Accessing Protected Resources (NOT DONE)

  14. Access Token Refresh Flow (NOT DONE)

  15. Default Persistence (oauth2.json), Caching and Secret Encryption (NOT DONE)

  16. shindig.properties impacts

  17. web.xml impacts

  18. HOW TO ( NOT DONE)

  19. Future Considerations and TODOs