Authentication
This documentation is for the preview version of the Dev Portal. If you are not part of the preview program, please refer to the current Dev Portal docs.
If you use a managed authentication service, such as Auth0, Clerk or OpenID you can implement this into your site and allow users to browse and interact with your documentation and API reference in a logged in state.
Configuration
To implement the authentication option for your site, add the authentication
property to the Dev Portal Configuration file. The configuration is slightly different depending on the authentication provider you use.
Protected Routes
You can protect specific routes in your documentation by adding the protectedRoutes
property to your configuration. This property takes an array of path patterns that match the routes you want to protect. When a user tries to access a protected route without being authenticated, they will be redirected to the login page.
{ // ... protectedRoutes: [ "/admin/*", // Protect all routes under /admin "/settings", // Protect the settings page "/api/*", // Protect all API-related routes "/private/:id" // Protect dynamic routes with parameters ], // ... }typescript
The path patterns follow React Router's syntax:
:param
matches a URL segment up to the next/
,?
, or#
*
matches zero or more characters up to the next/
,?
, or#
/*
matches all characters after the pattern
For example:
/users/:id
matches/users/123
or/users/abc
/docs/*
matches/docs/getting-started
or/docs/api/reference
/settings
matches only the exact path/settings
After logging in, users will be automatically redirected back to the protected route they were trying to access.
Authentication Providers
Dev Portal supports Clerk, Auth0, and any OpenID provider that supports the OpenID Connect protocol.
Not seeing your authentication provider? Let us know
Auth0
For Auth0, you will need the clientId
associated with the domain you are using.
You can find this in the Auth0 dashboard under Application Settings.
{ // ... authentication: { type: "auth0", domain: "yourdomain.us.auth0.com", clientId: "<your-auth0-clientId>", }, // ... }typescript
To setup Auth0, create a Single Page Application (SPA) application in the Auth0 dashboard. Set the following options:
- Callback URL to
https://your-site.com/oauth/callback
. - For development environments only, we recommend configuring your app to allow the a wildcard callback like
https://*.zuplo.app/oauth/callback
to allow for testing each environment. - For local development, set the callback url to
http://localhost:3000/oauth/callback
. - Add your site hostname (your-site.com) to the list of allowed CORS origins.
Clerk
For Clerk you will need the publishable key for your application. You can find this in the Clerk dashboard on the API Keys page.
{ // ... authentication: { type: "clerk", clerkPubKey: "<your-clerk-publishable-key>" }, // ... }typescript
OpenID
For authentication services that support OpenID, you will need to supply an clientId
and issuer
.
{ // ... authentication: { type: "openid", clientId: "<your-client-id>", issuer: "<the-issuer-url>" }, // ... }typescript
When configuring your OpenID provider, you will need to set the following:
- Callback or Redirect URI to
https://your-site.com/oauth/callback
. - If your provider supports wildcard callback urls, we recommend configuring your development identity provider to allow the a wildcard callback like
https://*.zuplo.app/oauth/callback
to allow for testing each environment. - For local development set the callback url to
http://localhost:3000/oauth/callback
. - Add your site hostname (your-site.com) to the list of allowed CORS origins.
User Data
After the user authenticates, the user profile is loaded via the provider's User Info endpoint. The following fields are used to display the user profile:
name
- The user's full nameemail
- The user's email addresspicture
- The user's profile picture URLemail_verified
- Whether the user's email address has been verified
If the provider does not return a field, it will be left blank.