I was looking at the Supabase docs and it was nice to see a long list of Auth work flows supported/documented. So my question is, here in October 2024, what are y'all using for Auth on your side projects. Password based, social, email, something else? If you are using social, which social do you support? Is there any public data on which types of Auth have the best conversion/bounce rates? And for you, which Auth is just easy to support long term and which just ends up being a drag? TY
grepfru_it|1 year ago
There are tons of open source projects to complete the self service experience, from sign up systems to self service password resets
cpach|1 year ago
hermanradtke|1 year ago
diggan|1 year ago
- Be able to store two types of tokens, one that is temporary, and one that is "permanent"
- Users can use their email address to get sent a temporary token (which expires if unused after X minutes)
- Users can click that link to change the temporary token for a "permanent" token they (the frontend) can use for authentication
- Clicking "Logout" invalidates the currently used "permanent" token
Biggest issue is making sure that whatever email provider you use for the "Login Emails" consistently sends emails quickly, as there is nothing worse but sitting for 2-3 minutes waiting for a login email because the provider batches sends or something.
This would specifically be for side projects. If it grows beyond that, you really should implement something with proper rotation and more, but there are tons of resources about that out there.
alberth|1 year ago
sieabahlpark|1 year ago
If you have an issue with bots on your platform you're going to always have bot problems. It's trivial to abuse your auth to derank your standing too. I can force your app to send out bounced emails to hundreds and thousands of bad emails. Costing you $$ or rep in the email exchange. The second affects your ability to authenticate legitimate users too.
Wish magic links would just go away and be acknowledged as an anti-pattern.
codingclaws|1 year ago
[0] https://github.com/ferg1e/comment-castles
[1] https://www.commentcastles.org/api#api-user-authentication
notamy|1 year ago
mooreds|1 year ago
I believe they don't fully support OAuth/OIDC, which may or may not be a problem based on what you are trying to solve.
Any particular strengths or challenges of their approach that you've found?
masto|1 year ago
My main concern is that I don't want to weld too much of my design to any one service provider, so I've got to be careful about taking too much advantage of their feature set and API so that it won't be a pain if they go away or it becomes necessary to migrate to something else.
simonhfrost|1 year ago
Certainly understandable to worry about lock-in! We do try and make data exports as easy as possible. You can use our Backend API directly to retrieve all data for your users except for passwords: https://clerk.com/docs/reference/backend-api/tag/Users#opera...
If you need encrypted passwords in the export, you can contact our support team who will verify your account and provide a link from within your Clerk Dashboard to download the complete export directly.
xena|1 year ago
rudasn|1 year ago
How do you manage peers and configs?
fragmede|1 year ago
dangprivalpha|1 year ago
mooreds|1 year ago
koliber|1 year ago
I am using Django’s user system. When a user comes and wants to use the app, I create a Django user and mark it as auto-created. Later, when they decide to sign up, I fill the details and I mark it as auto-created.
Using password auth for now. Will migrate to auth0 if enterprise customers knock on the door and want SAML.
dizhn|1 year ago
tommiegannert|1 year ago
https://github.com/thomseddon/traefik-forward-auth
j45|1 year ago
Cheap/ free to self host. I have tried a bunch of the other ones and they all had things I liked but Appwrite gave me nothing to complain about other than getting on with building :)
WhatsName|1 year ago
For selfhosting Authentik + Traefik forward auth is a unbeatable combo
googledocsftw|1 year ago
pooingcode|1 year ago
ukuina|1 year ago
HN post: https://news.ycombinator.com/item?id=41738273
freetonik|1 year ago
dvektor|1 year ago
ldenoue|1 year ago
This is live at https://screenrun.app/
naveen99|1 year ago
Just some ip based rate limits.
Ban misbehaved bot ip addresses.
https://hn.garglet.com (advanced search for hacker news)
infogulch|1 year ago
[1]: https://kanidm.com/
[2]: https://authzed.com/docs/spicedb/getting-started/discovering...
sandreas|1 year ago
However, for my smaller personal side projects I rely on a simple JWT auth based on JWT, QR-codes and https-only AS secure AS possible cookies.
I plan to try openid but i did not habe the time yet.
If you have a userbase, a local username/password login should be at least an Option...
SLKerrigan|1 year ago
JanisErdmanis|1 year ago
random_savv|1 year ago
skeptrune|1 year ago
bearjaws|1 year ago
djaouen|1 year ago
antonpirker|1 year ago
shortrounddev2|1 year ago
vdelitz|1 year ago
gedy|1 year ago
mooreds|1 year ago
0: https://fusionauth.io/blog/fusionauth-on-fly-io
1: https://fusionauth.io/blog/fusionauth-on-render
rch|1 year ago
chgs|1 year ago
dylanzhangdev|1 year ago
https://lucia-auth.com/
impure|1 year ago
John23832|1 year ago
marginalia_nu|1 year ago
For admin, I use HTTP basic auth like the boomer I strive to be.
thot_experiment|1 year ago
purple-leafy|1 year ago
pdyc|1 year ago
mooreds|1 year ago
Unfortunately many apps tie data to users and need to persist it across devices, which makes some kind of login functionality required.
mjomaa|1 year ago
Supported providers: https://authjs.dev/getting-started/providers/github
It's been really great so far and I can recommend it if you have a JS/TS codebase.
----------------------------
You can test Auth.js (v5 beta.22) in my Next.js 15 boilerplate:
https://achromatic.dev
• Credentials auth
• Google and Microsoft login
• Connected accounts
• Multi-factor authentication (via authenticator app)
• Session management
reducesuffering|1 year ago