TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenAUTH: Universal, standards-based auth provider

194 pointsby jacobrussell5 months ago

13 comments

chowells5 months ago
&gt; While OpenAuth tries to be mostly stateless, it does need to store a minimal amount of data (refresh tokens, password hashes, etc). However this has been reduced to a simple KV store with various implementations for zero overhead systems like Cloudflare KV and DynamoDB. You should never need to directly access any data that is stored in there.<p>Written like someone who&#x27;s never actually maintained an identify provider used in B2B contract work. You will inevitably come into contact with people who cannot make things work on their side and are doing things so unexpectedly that logging is insufficient to track down the error. Sooner or later you will need to look at the data actually in storage to figure out what your customers who are threatening to cancel their contract are doing wrong.<p>I&#x27;ve been there. Many times.
评论 #42446395 未加载
评论 #42450580 未加载
评论 #42448048 未加载
sedatk5 months ago
Can we not call any authentication scheme&#x2F;protocol&#x2F;service starting with &quot;Open&quot; and even &quot;O&quot; anymore? We already have OAuth, OATH, OpenID, OpenIDConnect, and Okta; it&#x27;s getting out of hand.
评论 #42447008 未加载
评论 #42453014 未加载
ash5 months ago
Cool project!<p>OAuth-based auth providers are nice, but they can have a weakness. When you have just one app, OAuth can be overkill: protocol is complex, and users suffer jarring redirects¹.<p>This is not surprising, because OAuth &#x2F; OIDC is fundamentally designed for (at least) three parties that don&#x27;t fully trust each other: user, account provider and an app². But in a single app there are only two parties: user and app itself. Auth and app can fully trust each other, protocol can be simpler, and redirects can be avoided.<p>I&#x27;m curious what OpenAUTH authors think about it.<p>¹ Except for Resource Owner Password Credentials (ROPC) grant type, but it&#x27;s no longer recommended: <a href="https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;html&#x2F;draft-ietf-oauth-security-topics#section-2.4" rel="nofollow">https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;html&#x2F;draft-ietf-oauth-secur...</a><p>² In addition, OAuth is mostly designed for and by account providers, and follows their interests more than interests of app developers.
评论 #42447902 未加载
评论 #42454371 未加载
mooreds5 months ago
Good for them for trying! I&#x27;ve been in the auth space for a few years and am surprised that a stateless AWS lambda for doing the exchange. (At least I haven&#x27;t seen any.) So it is nice to see some serverless innovation.<p>Thoughts from a quick scan:<p>- They support PKCE (yay!)<p>- They suggest storing access tokens in localstorage (boo!)<p>- They support JWKS (yay!)
评论 #42447735 未加载
评论 #42447036 未加载
xupybd5 months ago
<a href="https:&#x2F;&#x2F;www.keycloak.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.keycloak.org&#x2F;</a> is pretty great too, if you need a little more.
评论 #42447266 未加载
ptcrash5 months ago
Happy to see the effort! Fresh blood in the authn space is always welcomed.<p>Without rehashing the other good points commenters have made already, I’ll just say that every project starts out immature. What makes a project great is how willing the maintainers will be to grow along with the project and incorporate feedback. I’m excited to see future evolutions of this one.
pomfrit5 months ago
2024 and we still are not sure how to implement auth. Webdev is fantastic.
XCSme5 months ago
Is this like a Passport.js alternative?<p><a href="https:&#x2F;&#x2F;www.passportjs.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.passportjs.org&#x2F;</a>
sontek5 months ago
Does it only support username&#x2F;password + OAuth? I didn&#x27;t see much information on if it supports SAML. I&#x27;m interested in how it compares to things like <a href="https:&#x2F;&#x2F;github.com&#x2F;zitadel&#x2F;zitadel">https:&#x2F;&#x2F;github.com&#x2F;zitadel&#x2F;zitadel</a> and <a href="https:&#x2F;&#x2F;github.com&#x2F;ory&#x2F;kratos">https:&#x2F;&#x2F;github.com&#x2F;ory&#x2F;kratos</a>
评论 #42446436 未加载
评论 #42450625 未加载
vivzkestrel5 months ago
How does this compare to supertokens <a href="https:&#x2F;&#x2F;supertokens.com&#x2F;">https:&#x2F;&#x2F;supertokens.com&#x2F;</a> that supports fastify express, hono, bun, koa, nuxt, react, vue, angular with email password + social login + OTP based login + single sign on all wrapped in a self hostable nice package?
评论 #42449786 未加载
apitman5 months ago
Trying to understand where this fits in to the current ecosystem. Looks like it&#x27;s sort of like Passport but it runs in a separate server, and apps use OAuth2 to communicate with it? The example video looks like it&#x27;s only doing authentication. Does it do any authorization? Do apps need to use OpenAuth libraries directly, or can they get back with basic cookies&#x2F;redirects&#x2F;etc?
thayne5 months ago
I&#x27;m guessing this is for service providers and not identity providers. Just a suggestion, but that could be more clear in the description.
harrisi5 months ago
<a href="https:&#x2F;&#x2F;youtu.be&#x2F;mKKx8uXw5ak" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;mKKx8uXw5ak</a>