Skip to content
This repository has been archived by the owner on Oct 11, 2024. It is now read-only.

Commit

Permalink
Use fake authentication in example
Browse files Browse the repository at this point in the history
By using a fake authentication mechanism for the sandbox server we
achieve two objectives:

1. We can avoid making the authentication Google specific.
2. We can avoid the need to embed OAuth client secrets in open source
   code. Client secrets are meant for particular compiled applications.

Fixes #1393 - Embed OAuth client ID
  • Loading branch information
gdbelvin committed Feb 11, 2020
1 parent a9b296f commit 8042e34
Showing 1 changed file with 4 additions and 3 deletions.
7 changes: 4 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,12 +51,13 @@ NB A default for the Key Transparency server URL is being used here. The default


#### Publish the public key
1. Get an [OAuth client ID](https://console.developers.google.com/apis/credentials) and download the generated JSON file to `client_secret.json`.
Any number of protocols may be used to prove to the server that a client owns a userID.
The sandbox server supports a fake authentication string and [OAuth](https://console.developers.google.com/apis/credentials).

```sh
keytransparency-client post user@domain.com \
--client-secret=client_secret.json \
--insecure \
--kt-url sandbox.keytransparency.dev:443 \
--fake-auth-userid user@domain.com \
--password=${PASSWORD} \
--data='dGVzdA==' #Base64
```
Expand Down

0 comments on commit 8042e34

Please sign in to comment.