-
Updated
Nov 7, 2021 - Ruby
authentication
Here are 8,134 public repositories matching this topic...
-
Updated
Nov 15, 2021 - PHP
-
Updated
Nov 20, 2021 - Java
Description 🐜
If you only have a Credentials provider, you now are unable to get a CSRF token:
[next-auth][error][CALLBACK_CREDENTIALS_JWT_ERROR]
https://next-auth.js.org/errors#callback_credentials_jwt_error Signin in with credentials only supported if JWT strategy is enabled UnsupportedStrategy [UnsupportedStrategyError]: Signin in with credentials only supported if JWT strategy is
-
Updated
Nov 4, 2021 - Ruby
-
Updated
Apr 5, 2021 - TypeScript
-
Updated
Nov 19, 2021 - Ruby
-
Updated
Nov 17, 2021 - Go
-
Updated
Nov 19, 2021 - Python
-
Updated
Oct 19, 2021 - JavaScript
-
Updated
Nov 9, 2021 - JavaScript
-
Updated
Nov 20, 2021 - Objective-C
-
Updated
Nov 6, 2021 - Elixir
-
Updated
Nov 11, 2021 - Python
-
Updated
Dec 4, 2020 - JavaScript
-
Updated
Nov 19, 2021 - SCSS
-
Updated
Oct 1, 2020 - Java
Is your feature request related to a problem? Please describe.
The public key-based request signing functionality added to sso_proxy in buzzfeed/sso#106 is undocumented. In particular, it's not immediately obvious how to a) generate an appropriate keypair or b) validate a signed request in an upstream service.
Describe the solution you'd like
New documenta
There was an error where someone was trying to sign up using the thirdparty recipe and postgres rejected the query cause of value too long for type character varying(128) - and in the thidparty table, only the third_party_user_id column has 128 chars limit.
Error log reference:
[https://app.zenhub.com/files/231921809/8968d6d6-bcdd-48d8-aa60-fd556e934acd/download](https://app.zenhub.com/files
-
Updated
Jul 15, 2020 - JavaScript
-
Updated
Nov 4, 2021 - C#
-
Updated
May 25, 2021 - PHP
-
Updated
Nov 18, 2021 - Python
-
Updated
Oct 30, 2020 - Shell
-
Updated
Nov 16, 2021 - Go
Before opening, please confirm:
- I have installed the latest version of the Amplify CLI (see above), and confirmed that the issue still persists.
- I have searched for duplicate or closed issues.
- I have read the guide for [submitting bug reports](https://github.com/aws-amplify/amplify-cli/blob/master/CONTRIBUTI
Improve this page
Add a description, image, and links to the authentication topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the authentication topic, visit your repo's landing page and select "manage topics."


Percona is quite strict on having primary keys on all tables (and rightly so).
Please add primary keys to all tables, even if it's just an auto-increment.
It's mostly just the following tables:
authentication_logs (could just get a auto-increment primary key added)
identity_verification_tokens (could just set the token as primary key)