Identity provider configuration
How to configure external (federated) identity providers for Comentario
Comentario can be connected to external authentication services called identity providers or, for short, IdPs. They let users to log into Comentario without needing to explicitly register a new account.
This process is called federated authentication.
Comentario supports a number of such services. Each of them has its own way of configuring login, but all of them use either the standard OAuth2 Client Credentials flow, or OIDC code flow.
Below you can find provider-specific instructions for configuring OAuth2 login for Comentario.
To let your users sign in with their Facebook account, follow the below steps.
To let your users sign in with their GitHub account, follow the below steps.
To let your users sign in with their GitLab account, follow the below steps.
To let your users sign in with their Google account, follow the below steps.
To let your users sign in with their LinkedIn account, you’ll have to configure an OIDC identity provider by following the below steps.
To let your users sign in with their Twitter (X) account, follow the below steps.
OpenID Connect (OIDC) is an open authentication protocol and an extension to OAuth2. OIDC specification describes standardised authentication flows that are implemented by numerous identity providers (such as Google, Microsoft, LinkedIn etc.) and servers (for instance, the highly popular, open-source Keycloak IAM server).