Identity provider configuration

How to configure external (federated) identity providers for Comentario

Comentario can be connected to external authentication services called identity providers or, for short, IdPs. They let users to log into Comentario without needing to explicitly register a new account.

This process is called federated authentication.

Comentario supports a number of such services. Each of them has its own way of configuring login, but all of them use either the standard OAuth2 Client Credentials flow, or OIDC code flow.

Below you can find provider-specific instructions for configuring OAuth2 login for Comentario.

Login via Facebook

To let your users sign in with their Facebook account, follow the below steps.

Login via GitHub

To let your users sign in with their GitHub account, follow the below steps.

Login via GitLab

To let your users sign in with their GitLab account, follow the below steps.

Login via Google

To let your users sign in with their Google account, follow the below steps.

Login via LinkedIn

To let your users sign in with their LinkedIn account, you’ll have to configure an OIDC identity provider by following the below steps.

Login via Twitter/X

To let your users sign in with their Twitter (X) account, follow the below steps.

Login via OIDC provider

OpenID Connect (OIDC) is an open authentication protocol and an extension to OAuth2. OIDC specification describes standardised authentication flows that are implemented by numerous identity providers (such as Google, Microsoft, LinkedIn etc.) and servers (for instance, the highly popular, open-source Keycloak IAM server).

See also