Authentication

Authentication

Standing up a BYOC environment requires a few steps. Since our product will be running within your VPC, dependencies on our systems for authentication and authorization don't really make sense. Instead our product can be configured to use the same authentication and authorization methods you use in a cloud deployment but within your VPC.

The login process is governed by environment variables. The following need to be set in your environment depending on the authentication method you'd like to use.

GOOGLE_CLIENT_ID=google
GOOGLE_CLIENT_SECRET=google
MICROSOFT_CLIENT_ID=microsoft
MICROSOFT_CLIENT_SECRET=microsoft
GITHUB_CLIENT_ID=github
GITHUB_CLIENT_SECRET=github

Log in with Google

To configure Google authentication, you'll need to create a project in the Google Cloud Console and enable the Google OAuth API. You'll also need to create a client ID and secret for your project.

  1. Create a project in the Google Cloud Console.
  2. Enable the Google OAuth API if necessary.
  3. Create a client ID and secret for your project. The authorized redirect URI should be the URL of your RunReveal API, the authorized origin should be the URL of your RunReveal API.

Google Cloud Console

Once you've created your project, you'll need to set the GOOGLE_CLIENT_ID and GOOGLE_CLIENT_SECRET environment variables when running the api process.