This is a fork of LinkedIn OAuth2 strategy for Überauth that fixes the CSRF issue with ueberauth >= 0.0.7
versions.
-
Setup your application at LinkedIn Developers.
-
Add
:ueberauth_linkedin
to your list of dependencies inmix.exs
:def deps do [{:ueberauth_linkedin, "~> 0.3"}] end
-
Add the strategy to your applications:
def application do [applications: [:ueberauth_linkedin]] end
-
Add LinkedIn to your Überauth configuration:
config :ueberauth, Ueberauth, providers: [ linkedin: {Ueberauth.Strategy.LinkedIn, []} ]
-
Update your provider configuration:
config :ueberauth, Ueberauth.Strategy.LinkedIn.OAuth, client_id: System.get_env("LINKEDIN_CLIENT_ID"), client_secret: System.get_env("LINKEDIN_CLIENT_SECRET")
-
Include the Überauth plug in your controller:
defmodule MyApp.AuthController do use MyApp.Web, :controller plug Ueberauth ... end
-
Create the request and callback routes if you haven't already:
scope "/auth", MyApp do pipe_through :browser get "/:provider", AuthController, :request get "/:provider/callback", AuthController, :callback end
-
You controller needs to implement callbacks to deal with
Ueberauth.Auth
andUeberauth.Failure
responses.
For an example implementation see the Überauth Example application.
Depending on the configured url you can initial the request through:
/auth/linkedin?state=csrf_token_here
Or with scope:
/auth/linkedin?state=csrf_token_here&scope=r_emailaddress
By default the requested scope is "r_basicprofile r_emailaddress". Scope can be configured either explicitly as a scope
query value on the request path or in your configuration:
config :ueberauth, Ueberauth,
providers: [
linkedin: {Ueberauth.Strategy.LinkedIn, [default_scope: "r_basicprofile r_emailaddress"]}
]
Please see LICENSE for licensing details.