Hacker News new | past | comments | ask | show | jobs | submit login

You need to roll your own authorization, authentication is provided by the third party provider. Of course you need to check and verify that users authenticated correctly against the third party provider. I don’t have to tell you this as you do this for a living, but saving having to implement half of the oauth flow is a good thing, right?



Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: