You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'd love to submit a PR updating iOS setup instructions with an example using OAuthManager.plist, instead of hardcoding secrets in JavaScript. (My motivation here is a possibly flawed assumption that this is more secure. [2])
Would this file go in ios/<project>/OAuthManager.plist?
Any hints on proper formatting? I tried converting
I'm developing a cross-platform app so will also need to get this working on Android side as well. Would be happy to help implement this same behavior on Android, any suggestions for how to get started?
Thanks!
The text was updated successfully, but these errors were encountered:
Thanks for the long issue. I think this is a great FAQ doc starting point too.
Yes, it needs to be a part of the project in XCode, so make sure you drag it into the project. Otherwise, it doesn't quite matter exactly where you put it, just as long as XCode knows about it. You still need to configure the authManager, just don't have to pass it any config ({} should suffice).
It's not necessarily more secure. I think anything can be reverse engineered, it's just how difficult do you want to make it for your attackers. The most secure method would be to not include the secret and have a backend that holds the client secret. Despite that, it's easier to reverse JS over compiled code, so without a back-end, using the plist is the most secure way we have right now to include the secret in the app.
Not sure about Android yet, i suspect there is a way though. I seem to recall a library that handles this in the user preferences, but I cannot recall the name this second.
A few things relating to #16 and #34.
I'd love to submit a PR updating iOS setup instructions with an example using
OAuthManager.plist
, instead of hardcoding secrets in JavaScript. (My motivation here is a possibly flawed assumption that this is more secure. [2])ios/<project>/OAuthManager.plist
?to:
And then removing
authManager.configure(authConfig)
, but no luck so far.I'm new to native app development, but my understanding is that plist files are actually not in any way secure. 😞 And further, even compiled secrets can be reverse engineered. e.g. see http://stackoverflow.com/a/14865695/679702 and also https://www.youtube.com/watch?v=fLnR-zyQWzU (9 minute video). Could you address this?
I'm developing a cross-platform app so will also need to get this working on Android side as well. Would be happy to help implement this same behavior on Android, any suggestions for how to get started?
Thanks!
The text was updated successfully, but these errors were encountered: