FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login
    1. Home
    2. Alex Patterson
    3. Posts
    A
    • Profile
    • Following 0
    • Followers 0
    • Topics 19
    • Posts 81
    • Best 7
    • Controversial 0
    • Groups 1

    Posts made by Alex Patterson

    • RE: Azure AD token absent in link API response

      @stefan-0 I don't really see where there is an issue here, we wouldn't want to actually keep the Azure AD access_token if you want it just add something to the openid reconcile lambda and store it as needed.

      https://fusionauth.io/docs/extend/code/lambdas/openid-connect-response-reconcile

      posted in Q&A
      A
      Alex Patterson
    • RE: Next.js Version Compatibility and Webpack Integration Issues with FusionAuth in Application

      @aman-c FusionAuth is completely running outside of Next.js. So it all depends on what you are using to make the call to FusionAuth.

      My suggestion would be to implement a version of our React SDK
      https://fusionauth.io/docs/sdks/react-sdk

      Then anything clientside that needs details you can use the built in hooks, anything serverside you can use the cookie that sits at app.at or for identity app.idt.

      If you have been using our quickstart you are most likely using next-auth which could be causing issues with the implementation. We have had a lot of internal discussion about removing this methodology moving forward to simplify our Next.js suggested implementation.

      You can find out more about our cookies that are set in our Hosted Backend details.
      https://fusionauth.io/docs/apis/hosted-backend

      posted in Q&A
      A
      Alex Patterson
    • RE: oauth2/authorize redirects to oauth2/consent (AzureStaticWebApp)

      I believe what you are seeing is the consent mode, you can find more details on this

      https://fusionauth.io/docs/lifecycle/authenticate-users/oauth/scopes#form-fields

      The /oauth2/consent endpoint in FusionAuth is used for handling user consent during the OAuth process. It provides several variables that can be used to customize the consent prompt:
      action: The action the user selected on the consent prompt. The value should be allow if the user made consent selections and wants to continue or cancel if they have decided not to continue.
      optionalScopes: The list of OAuth scopes on the request with optional user consent.
      requiredScopes: The list of OAuth scopes on the request that require user consent.
      scopeConsents: A map of OAuth scope consent choices made by the user. The key into the map is the OAuth scope name. The value should be true if the user has consented to the scope or false if they have declined.
      unknownScopes: The list of unknown OAuth scope names on the request if the application is configured to Allow unknown scopes.
      These variables are available since version 1.50.0 of FusionAuth.

      This can also be used in theming.

      https://fusionauth.io/docs/customize/look-and-feel/template-variables#oauth-consent-prompt

      posted in Q&A
      A
      Alex Patterson
    • RE: Issue with FusionAuth React SDK and next-client-cookies Adapter in Next.js 13.1.2

      @aman-c do you have a repo available for this?

      Also what are you trying to use next-client-cookies for in the app? Is it in a client-side only app?

      Are you trying to access app.at to get the Auth cookie?

      posted in Q&A
      A
      Alex Patterson
    • RE: Missing Email address in JWT token claims

      @bubblez there was also a change in 1.50 (so I am surprised if you were on 1.51 if this would happen) where we stopped sending email to the app.id JWT and only provide this within app.idt.

      I would recommend updating the code accordingly if you are still using this method.

      An alternative but not suggested is to change your scope handling policy to Compatibility which will send this again in your app.id.

      096febf1-8a5d-4f25-aae2-37a38ee3b104-image.png

      posted in Q&A
      A
      Alex Patterson
    • RE: Missing Email address in JWT token claims

      @bubblez do you have the scope correctly set within your Identiy provider?

      169f5005-8172-4958-8e89-d0f49dbe3d66-image.png

      I am testing this now locally to see if there is a difference on the versions.

      posted in Q&A
      A
      Alex Patterson
    • RE: How can I pull the latest docker image

      @aswetnatex

      docker pull fusionauth/fusionauth-app:latest
      
      posted in Q&A
      A
      Alex Patterson
    • RE: Create a Tenant using API with Golang

      @milton-jesus awesome glad you solved it!!

      posted in General Discussion
      A
      Alex Patterson
    • RE: Create a Tenant using API with Golang

      @milton-jesus is there a requirement leaving you on 1.15.8?

      Have you tried with latest?

      https://fusionauth.io/docs/release-notes/

      posted in General Discussion
      A
      Alex Patterson
    • RE: Kickstart webhook in kickstart.json

      @tschlegel thank you for reporting! This appears to be a bug. I have created the same issue within our GitHub issues page to follow up with, feel free to follow over there for status. I have prompted the engineering team as well so it gets on our "short" list.

      https://github.com/FusionAuth/fusionauth-issues/issues/2863

      posted in Q&A
      A
      Alex Patterson
    • Meetup - Protecting your API's with JSON Web Tokens

      Hey, are you interested in learning more about JSON Web Tokens and how to protect your APIs with them?

      Join my talk hosted by the great peeps at Gun.io!

      https://www.meetup.com/gundotio/events/302264818/

      posted in Announcements
      A
      Alex Patterson
    • RE: Error in startup after upgrading to 1.51.2

      @ronn316 if you want to use silent mode during the upgrade

      https://fusionauth.io/docs/get-started/download-and-install/silent-mode

      posted in Q&A
      A
      Alex Patterson
    • RE: What is the webhook guarantee?

      @itai This is what exists today, the team is working on more features for webhooks in upcoming releases.

      FusionAuth provides certain guarantees when it comes to the delivery of webhooks. These guarantees are determined by the transaction level that you set for your webhooks. The transaction level can be one of the following:

      • "No webhooks are required to succeed": In this case, FusionAuth will "fire and forget" the webhooks. Even if all webhooks fail, the operation (like a user update) will still succeed (source).

      • "Any single webhook must succeed": If at least one webhook succeeds, the operation will succeed. If all webhooks fail, the operation will fail. FusionAuth will retry failed webhooks up to three additional times (source).

      • "All webhooks must succeed": Every single webhook must succeed for the operation to succeed. If any webhook fails, the operation will fail (source).

      In case of failures, FusionAuth will retry sending the payload up to three additional times. If a webhook endpoint times out, this is considered a failure, the same as if a non 2xx status code is returned. If the endpoint does not respond after the retries, the failure will be logged in the system log (source).

      It's important to note that if a webhook is transactional and returns a non 2xx status code, the corresponding action will not succeed. For example, if a user login triggers a webhook and the webhook fails, the user won’t be able to log in (source).

      posted in Q&A
      A
      Alex Patterson
    • RE: STMP failure after upgrade from 1.37 to 1.51

      JavaMail settings in FusionAuth can be configured under the SMTP settings of a tenant. You can access these settings by navigating to Tenants > Edit > Advanced > SMTP settings. Here, you can add additional properties for JavaMail.

      For example, to enable debug mode, you can add mail.debug=true to the additional properties. This will provide more verbose logging for SMTP, which can be helpful for troubleshooting email issues. The debug logs can be viewed under System > Logs and selecting fusionauth-app.log source.

      In some cases, you might need to set timeouts for the SMTP connection. This can be done by adding the following properties:

      mail.smtp.connectiontimeout=2000
      mail.smtp.timeout=2000
      

      These settings will set the read and write timeouts to 2 seconds (2000 ms) source.

      If you're experiencing issues with email delivery, it might be helpful to change the SMTP port or switch between TLS and SSL, especially if you're using a cloud service like FusionAuth Cloud, which has certain restrictions on ports source.

      Remember to be cautious when enabling debug mode or changing other settings, as it could potentially lead to a large volume of logs or affect the performance of your application.

      posted in Q&A
      A
      Alex Patterson
    • RE: Adding supplementary user data

      @evanm Yes you can use the sub inside of the JWT when making any API call to your backend. In your database this will be a unique Id for the user. You can even get more details about the user from FusionAuth by calling the User endpoints.

      https://fusionauth.io/docs/apis/users#response-1

      posted in Q&A
      A
      Alex Patterson
    • RE: How to pass the response_type in the FusionAuthProviderConfig of the react-sdk?

      @richard-0 do you have a sample repo you could share, or your full config for the SDK?

      posted in Q&A
      A
      Alex Patterson
    • RE: Error in startup after upgrading to 1.51.2

      @ronn316 I believe there was an database change that was required in 1.50 https://fusionauth.io/docs/release-notes/#version-1-50-0

      You will need to check the upgrade info
      https://fusionauth.io/docs/operate/deploy/upgrade

      specifically the database migration in silent mode
      https://fusionauth.io/docs/operate/deploy/upgrade#downtime-and-database-migrations

      posted in Q&A
      A
      Alex Patterson
    • RE: How do I call a Google API or retrieve the Google credentials?

      I do this all the time and keep meaning to create a post on codingcat.dev for it instead of hitting Jeff's site for it all the time. In the meantime I would suggest checking this out it always works for me 😄

      https://fireship.io/lessons/google-apis-node-tutorial/

      posted in General Discussion
      A
      Alex Patterson
    • RE: Adding supplementary user data

      @evanm I would recommend using a JWT in your API and storing the user id to associate the user to your stripe user account.

      You can find more about this in our tokens docs, here you will want the sub.

      https://fusionauth.io/docs/lifecycle/authenticate-users/oauth/tokens

      On point two it is a classic it depends scenario. This could be handled by logic that you build, or if it makes sense you could use FusionAuth's groups or entities

      posted in Q&A
      A
      Alex Patterson
    • RE: Upgrading from 1.46.0 to 1.47.1 CSRF token issue with IdP

      @tvdlooy were you able to resolve this?

      posted in Q&A
      A
      Alex Patterson