Google & GitHub authentication with OAuth 2¶
Among the many authentication methods we support, a server can be configured to allow users to sign in with their Google accounts or GitHub accounts, using the OAuth protocol.
Testing OAuth in development¶
Because these authentication methods involve an interaction between Zulip, an external service, and the user’s browser, and particularly because browsers can (rightly!) be picky about the identity of sites you interact with, the preferred way to set them up in a development environment is to set up the real Google and GitHub to process auth requests for your development environment.
The steps to do this are a variation of the steps documented in
prod_settings_template.py. Here are the full procedures for dev:
- Visit https://console.developers.google.com and navigate to “APIs & services” > “Credentials”. Create a “Project” which will correspond to your dev environment.
- Navigate to “APIs & services” > “Library”, and find the “Google+ API”. Choose “Enable”.
- Return to “Credentials”, and select “Create credentials”. Choose
“OAuth client ID”, and follow prompts to create a consent screen, etc.
For “Authorized redirect URIs”, fill in
- You should get a client ID and a client secret. Copy them. In
GOOGLE_OAUTH2_CLIENT_IDto the client ID, and in
google_oauth2_client_secretto the client secret.
- Register an OAuth2 application with GitHub at one of
http://zulipdev.com:9991/complete/github/as the callback URL.
- You should get a page with settings for your new application,
showing a client ID and a client secret. In
SOCIAL_AUTH_GITHUB_KEYto the client ID, and in
social_auth_github_secretto the client secret.