Social Apps
Configure OAuth providers to enable social login for your applications.
Overview
Social Apps allows you to set up third-party authentication providers like Google, GitHub, Microsoft, and others. Users can sign in to your application using their existing accounts from these providers, simplifying the login experience.
Concepts
OAuth Provider
A third-party authentication service that allows users to sign in using existing credentials. Common providers include Google, GitHub, Microsoft, Facebook, and Apple.
Client ID and Secret
Credentials provided by the OAuth provider when you register your application. These are used to authenticate your app with the provider.
Auto Redirect
When enabled, users are automatically redirected to the OAuth provider's login page instead of showing the application's login form.
View Social Apps
- Navigate to your Site in the Dashboard.
- Click the Settings tab.
- Click Social Apps in the Access section.
- View the list of configured OAuth providers.
The list displays:
- Provider: The OAuth provider icon and name
- Name: Your custom name for the configuration
- Status: Whether the provider is properly configured
- Auto: Whether auto-redirect is enabled
Add an OAuth Provider
- Navigate to Site Settings > Social Apps.
- Click Add Provider.
- Select the OAuth provider from the dropdown.
- Fill in the configuration:
- Name: A custom name for this configuration
- Client ID: The client ID from the provider
- Client Secret: The client secret from the provider
- Scopes: Permission scopes to request (provider-specific)
- Auto Redirect: Enable to redirect users automatically
- Click Create.
Supported Providers
| Provider | Description |
|---|---|
| Sign in with Google accounts | |
| GitHub | Sign in with GitHub accounts |
| Microsoft | Sign in with Microsoft/Azure AD accounts |
| Sign in with Facebook accounts | |
| Apple | Sign in with Apple ID |
| Sign in with LinkedIn accounts | |
| Sign in with Twitter/X accounts | |
| Discord | Sign in with Discord accounts |
| Custom OIDC | Any OpenID Connect compliant provider |
Configure a Provider
Google
- Go to Google Cloud Console.
- Create or select a project.
- Navigate to APIs & Services > Credentials.
- Create an OAuth 2.0 Client ID.
- Add your redirect URI:
https://your-site.taruvi.cloud/auth/callback/google - Copy the Client ID and Client Secret.
GitHub
- Go to GitHub Developer Settings.
- Click New OAuth App.
- Set the Authorization callback URL:
https://your-site.taruvi.cloud/auth/callback/github - Copy the Client ID and generate a Client Secret.
Microsoft
- Go to Azure Portal.
- Navigate to Azure Active Directory > App registrations.
- Create a new registration.
- Add the redirect URI:
https://your-site.taruvi.cloud/auth/callback/microsoft - Copy the Application (client) ID and create a Client Secret.
View Provider Details
- Click on a provider in the Social Apps list.
- View the full configuration details:
- Configuration status
- Connected user count
- Scopes and settings
- Last updated date
Edit a Provider
- Click the Edit (pencil) icon on the provider row.
- Update the configuration fields.
- Click Save Changes.
Changing the Client ID or Secret may require users to re-authenticate.
Delete a Provider
- Click the Delete (trash) icon on the provider row.
- Review the warning about connected users.
- Confirm deletion.
Deleting a provider will prevent users who only have that authentication method from signing in. Ensure affected users have alternative login methods first.
Configuration
Provider Fields
| Field | Description | Required |
|---|---|---|
| Provider | The OAuth provider type | Yes |
| Name | Custom name for the configuration | Yes |
| Client ID | OAuth client identifier | Yes |
| Client Secret | OAuth client secret | Yes |
| Scopes | Permission scopes to request | No |
| Auto Redirect | Automatically redirect to provider | No |
Custom OIDC Fields
For custom OpenID Connect providers:
| Field | Description |
|---|---|
| Authorization URL | OAuth authorization endpoint |
| Token URL | Token exchange endpoint |
| User Info URL | User profile endpoint |
| JWKS URL | JSON Web Key Set URL |
Limits
| Resource | Limit |
|---|---|
| Social apps per site | 20 |
| Scopes per provider | 50 |
Troubleshooting
Login fails with redirect error
Problem: Users see a redirect URI error when trying to log in.
Solution:
- Verify the redirect URI in your provider settings matches exactly.
- Check for trailing slashes.
- Ensure HTTPS is used.
Cannot delete provider with users
Problem: Deletion is blocked because users are connected.
Solution:
- Review how many users use this provider.
- Ensure users have alternative login methods.
- Force delete if necessary (users will need to create new accounts).
Provider shows "Not Configured"
Problem: Status shows the provider is not properly configured.
Solution:
- Verify Client ID and Secret are correct.
- Check that required scopes are added.
- Test the configuration by attempting a login.
Related
Last Updated: January 2025