User registration and login through IdCat mòbil, an authentication method that uses OAuth 2.0 protocol. IdCat mòbil is an identity validator from VÀLid (Validador d'Identitats del Consorci AOC).
Further information: https://web.gencat.cat/ca/tramits/com-tramitar-en-linia/identificacio-digital/id-cat-mobil
Add this line to your application's Gemfile:
gem 'omniauth-idcat_mobil'
And then execute:
$ bundle
Or install it yourself as:
$ gem install omniauth-idcat_mobil
Users must be registered at IdCat mòbil. To do so, you can register online or offline, check how here.
Next, tell OmniAuth about this strategy. In a Rails application using Devise you would create a file like config/initializers/omniauth_idcat_mobil.rb with this code:
Devise.setup do |config|
config.omniauth :idcat_mobil,
ENV["IDCAT_MOBIL_CLIENT_ID"],
ENV["IDCAT_MOBIL_CLIENT_SECRET"],
ENV["IDCAT_MOBIL_SITE_URL"],
scope: :autenticacio_usuari
end
omniauth-idcat_mobil
is a standard OAuth2 strategy. It is based on omniauth-oauth2
that is just an omniauth
extension. Thus, you can also integrate it using omniauth
integrating guide.
This is a quasi standard omniauth Strategy. It is not 100% standard because the standard is to have two phases. A +request_phase+, where our client application delegates the user authentication to the authentication provider (IdCat mòbil in this case), and a +callback_phase+, where the authentication provider invokes our application back with the result of the authentication and we negotiate the final access_token. For IdCat mòbil we still need to perform an extra step during the +callback_phase+ to fetch users' data.
omniauth-idcat_mobil
does not implement this method, instead we rely on the default implementation in OmniAuth::Strategies::OAuth2
.
It simply redirects the user to the authentiction provider to authenticate.
When users finish with the authentication workflow in IdCat mòbil, this authentication provider redirects them to our callback_phase
.
This phase starts by checking the result of the authentication in the provider's site.
When users get authenticated, we still need to negotiate the access_token that we will need to perform extra requests to the provider system.
The access_token is obtained by performing a POST request to the provider. If this succeeds then we're ready to go and perform te getUserInfo
request. This request is implemented in the raw_info
method.
After a successful getUserInfo
the superclass of this strategy fills the info
so that our host application can access it and finishes with its authentication task.
We're including IdCat mòbil icons in lib/decidim/idcat_mobil for the joy of the developer. They can be used to complement the OAuth2 button or alike.
After checking out the repo, run bin/setup
to install dependencies. Then, run rake test
to run the tests. You can also run bin/console
for an interactive prompt that will allow you to experiment.
To install this gem onto your local machine, run bundle exec rake install
. To release a new version, update the version number in version.rb
, and then run bundle exec rake release
, which will create a git tag for the version, push git commits and tags, and push the .gem
file to rubygems.org.
Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/omniauth-idcat_mobil. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the Contributor Covenant code of conduct.
The Department d'Exteriors of Generalitat de Catalunya makes this gem available as open source under the terms of the MIT License.
Authored by CodiTramuntana.
Everyone interacting in the Omniauth::IdcatMobil project’s codebases, issue trackers, chat rooms and mailing lists is expected to follow the code of conduct.