Auth0 Wechat

Posted onby admin
  1. Auth0 Wechat Download
  2. Auth0 Wechat Account
  3. Auth0 Wechat
Latest version

Released:

Auth0

Register - WeChat. Auth0 can provide compliance for several standards including HIPAA, via a Business Associate Agreement, and PCI compliant environments. Premier Support. Phone support, 24x7x365 support hours, shorter response times, and a designated team of support engineers to help you with your onboarding and ongoing experience with Auth0. Developed a simple mobile app using Ionic to be used as a sample of the integration between the app, REST server, and WeChat. The mobile app was developed by another team in China. Integrated WeChat with the mobile app and web server to log in and get personal info from WeChat to create the user on the platform and authorize him. Premium designed free icon set with marks in SVG, Webfont and raster formats. CoreUI Icons are beautifully crafted symbols for common actions and items. You can use them in your digital products for web or mobile app.

微信公众平台网页授权获取用户信息python封装

Project description

微信网页授权获取用户信息封装
对微信网页授权获取用户信息接口的封装
* 生成授权URL
* 获取access_token
* 刷新access_token
* 获取用户信息
微信文档
---
[http://mp.weixin.qq.com/wiki/17/c0f37d5704f0b64713d5d2c37b468d75.html](http://mp.weixin.qq.com/wiki/17/c0f37d5704f0b64713d5d2c37b468d75.html)
使用方式
```
from wechat_web_auth import Wechat
wc = Wechat(app_id, secret)
def connect(request):
url = wc.get_connect_url('http://redirect.url/)
return redirect(url)
def callback(request):
resp = wc.get_access_token(self, request.GET.get('code'))
access_token = resp.access_token
userinfo = wc.get_userinfo(access_token)
return HttpResponse('nickname:' + userinfo.nickname)
```

Release historyRelease notifications RSS feed

0.1.1

0.1.0

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for wechat-web-auth, version 0.1.1
Filename, sizeFile typePython versionUpload dateHashes
Filename, size wechat_web_auth-0.1.1-py2-none-any.whl (4.5 kB) File type Wheel Python version py2 Upload dateHashes
Filename, size wechat_web_auth-0.1.1-py2.py3-none-any.whl (4.5 kB) File type Wheel Python version py2.py3 Upload dateHashes
Close

Hashes for wechat_web_auth-0.1.1-py2-none-any.whl

Hashes for wechat_web_auth-0.1.1-py2-none-any.whl
AlgorithmHash digest
SHA2563b049fee6cb3fccc5316a5980573a6041e4e87aadb36505549c7c61cdcb976d1
MD5424f28d7fcb1d64039b401a5a5c92c56
BLAKE2-256d385645d7b4716693e5fabc4114a3c902657a010d2659c7abde416b538c8f8db
Close

Hashes for wechat_web_auth-0.1.1-py2.py3-none-any.whl

Hashes for wechat_web_auth-0.1.1-py2.py3-none-any.whl
AlgorithmHash digest
SHA25678b90bd0d42f2037343ead21960dc969b3efef0d41538b3e040fd5c074658c40
MD5607694ba7e7f733297f551baebbcd93a
BLAKE2-25648f29911e2b6bde4544e7d929a03da7f34178cc587a4925be89d87c05e27333c
-->

Auth0 Wechat Download

Before you begin, use the selector above to choose the type of policy you’re configuring. Azure AD B2C offers two methods of defining how users interact with your applications: through predefined user flows, or through fully configurable custom policies. The steps required in this article are different for each method.

Prerequisites

  • Create a user flow to enable users to sign up and sign in to your application.
  • If you haven't already done so, register a web application, and enable ID token implicit grant.
  • Complete the steps in the Get started with custom policies in Active Directory B2C.
  • If you haven't already done so, register a web application, and enable ID token implicit grant.

Create a WeChat application

To enable sign-in for users with a WeChat account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in WeChat management center. If you don't already have a WeChat account, you can get information at https://kf.qq.com.

Register a WeChat application

  1. Sign in to https://open.weixin.qq.com/ with your WeChat credentials.
  2. Select 管理中心 (management center).
  3. Follow the steps to register a new application.
  4. For the 授权回调域 (callback URL), enter https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp. If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp. Replace your-tenant-name with the name of your tenant, and your-domain-name with your custom domain.
  5. Copy the APP ID and APP KEY. You need both of them to configure the identity provider to your tenant.

Configure WeChat as an identity provider

  1. Sign in to the Azure portal as the global administrator of your Azure AD B2C tenant.
  2. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the Directory + subscription filter in the top menu and choosing the directory that contains your tenant.
  3. Choose All services in the top-left corner of the Azure portal, search for and select Azure AD B2C.
  4. Select Identity providers, then select WeChat (Preview).
  5. Enter a Name. For example, WeChat.
  6. For the Client ID, enter the APP ID of the WeChat application that you created earlier.
  7. For the Client secret, enter the APP KEY that you recorded.
  8. Select Save.

Add WeChat identity provider to a user flow

  1. In your Azure AD B2C tenant, select User flows.
  2. Click the user flow that you want to add the WeChat identity provider.
  3. Under the Social identity providers, select WeChat.
  4. Select Save.
  5. To test your policy, select Run user flow.
  6. For Application, select the web application named testapp1 that you previously registered. The Reply URL should show https://jwt.ms.
  7. Select the Run user flow button.
  8. From the sign-up or sign-in page, select WeChat to sign in with WeChat account.

If the sign-in process is successful, your browser is redirected to https://jwt.ms, which displays the contents of the token returned by Azure AD B2C.

Create a policy key

You need to store the client secret that you previously recorded in your Azure AD B2C tenant.

  1. Sign in to the Azure portal.
  2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the Directory + subscription filter in the top menu and choose the directory that contains your tenant.
  3. Choose All services in the top-left corner of the Azure portal, and then search for and select Azure AD B2C.
  4. On the Overview page, select Identity Experience Framework.
  5. Select Policy Keys and then select Add.
  6. For Options, choose Manual.
  7. Enter a Name for the policy key. For example, WeChatSecret. The prefix B2C_1A_ is added automatically to the name of your key.
  8. In Secret, enter your client secret that you previously recorded.
  9. For Key usage, select Signature.
  10. Click Create.

Configure WeChat as an identity provider

To enable users to sign in using a WeChat account, you need to define the account as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.

You can define a WeChat account as a claims provider by adding it to the ClaimsProviders element in the extension file of your policy.

  1. Open the TrustFrameworkExtensions.xml.

  2. Find the ClaimsProviders element. If it does not exist, add it under the root element.

  3. Add a new ClaimsProvider as follows:

  4. Set client_id to the application ID from the application registration.

  5. Save the file.

Add a user journey

At this point, the identity provider has been set up, but it's not yet available in any of the sign-in pages. If you don't have your own custom user journey, create a duplicate of an existing template user journey, otherwise continue to the next step.

  1. Open the TrustFrameworkBase.xml file from the starter pack.
  2. Find and copy the entire contents of the UserJourney element that includes Id='SignUpOrSignIn'.
  3. Open the TrustFrameworkExtensions.xml and find the UserJourneys element. If the element doesn't exist, add one.
  4. Paste the entire content of the UserJourney element that you copied as a child of the UserJourneys element.
  5. Rename the Id of the user journey. For example, Id='CustomSignUpSignIn'.

Add the identity provider to a user journey

Now that you have a user journey, add the new identity provider to the user journey. You first add a sign-in button, then link the button to an action. The action is the technical profile you created earlier.

  1. Find the orchestration step element that includes Type='CombinedSignInAndSignUp', or Type='ClaimsProviderSelection' in the user journey. It's usually the first orchestration step. The ClaimsProviderSelections element contains a list of identity providers that a user can sign in with. The order of the elements controls the order of the sign-in buttons presented to the user. Add a ClaimsProviderSelection XML element. Set the value of TargetClaimsExchangeId to a friendly name.

  2. In the next orchestration step, add a ClaimsExchange element. Set the Id to the value of the target claims exchange Id. Update the value of TechnicalProfileReferenceId to the Id of the technical profile you created earlier.

The following XML demonstrates the first two orchestration steps of a user journey with the identity provider:

Configure the relying party policy

The relying party policy, for example SignUpSignIn.xml, specifies the user journey which Azure AD B2C will execute. Find the DefaultUserJourney element within relying party. Update the ReferenceId to match the user journey ID, in which you added the identity provider.

In the following example, for the CustomSignUpOrSignIn user journey, the ReferenceId is set to CustomSignUpOrSignIn:

Upload the custom policy

  1. Sign in to the Azure portal.
  2. Select the Directory + Subscription icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
  3. In the Azure portal, search for and select Azure AD B2C.
  4. Under Policies, select Identity Experience Framework.
  5. Select Upload Custom Policy, and then upload the two policy files that you changed, in the following order: the extension policy, for example TrustFrameworkExtensions.xml, then the relying party policy, such as SignUpSignIn.xml.

Auth0 Wechat Account

Test your custom policy

  1. Select your relying party policy, for example B2C_1A_signup_signin.
  2. For Application, select a web application that you previously registered. The Reply URL should show https://jwt.ms.
  3. Select the Run now button.
  4. From the sign-up or sign-in page, select WeChat to sign in with WeChat account.

Auth0 Wechat

If the sign-in process is successful, your browser is redirected to https://jwt.ms, which displays the contents of the token returned by Azure AD B2C.