After that, we will need to create an application in Authgear.
Create an application
Go to "Applications".
Click "Add Application" in the top right corner
Input name of your application, this is for reference only
Defining a custom scheme that the users will be redirected back to your app after they have authenticated with Authgear. Add the URI to "Redirect URIs". (e.g. com.myapp://host/path).
Click "Save" and keep the client id. You can also obtain the client id from the list later.
If you want to validate JWT access token in your server, select Issue JWT as access token. If you will forward incoming requests to Authgear Resolver Endpoint for authentication, leave this unchecked. See comparisons in Backend Integration.
Add authgear in dependencies. Use $branch-SNAPSHOT (e.g. main-SNAPSHOT) for the latest version in a branch or a release tag/git commit hash of the desired version.
dependencies {
// Other implementations
implementation 'com.github.authgear:authgear-sdk-android:SNAPSHOT'
}
Setup Redirect URI for Your Android App
Add the following activity entry to the AndroidManifest.xml of your app. The intent system would dispatch the redirect URI to OauthRedirectActivity and the SDK would handle the rest.
<!-- Your application configuration. Omitted here for brevity -->
<application>
<!-- Other activities or entries -->
<!-- Add the following activity -->
<activity android:name="com.oursky.authgear.OauthRedirectActivity"
android:exported="false"
android:launchMode="singleTask">
<intent-filter>
<action android:name="android.intent.action.VIEW" />
<category android:name="android.intent.category.DEFAULT" />
<category android:name="android.intent.category.BROWSABLE" />
<!-- Configure data to be the exact redirect URI your app uses. -->
<!-- Here, we are using com.myapp://host/path as configured in authgear.yaml. -->
<!-- NOTE: The redirectURI supplied in AuthorizeOptions *has* to match as well -->
<data android:scheme="com.myapp"
android:host="host"
android:pathPrefix="/path"/>
</intent-filter>
</activity>
</application>
Initialize Authgear
Add the following code to your app's Application class. If there is none, add a class that extends Application. Make sure it is declared in AndroidManifest.xml's application tag with the name attribute as described here.
public class MyAwesomeApplication extends Application {
// The client ID of the oauth client.
private static final String CLIENT_ID = "a_random_generated_string"
// Deployed authgear's endpoint
private static final String AUTHGEAR_ENDPOINT = "http://<myapp>.authgearapps.com/"
private Authgear mAuthgear;
public void onCreate() {
super.onCreate();
mAuthgear = new Authgear(this, CLIENT_ID, AUTHGEAR_ENDPOINT);
mAuthgear.configure(new OnConfigureListener() {
@Override
public void onConfigured() {
// Authgear can be used.
}
@Override
public void onConfigurationFailed(@NonNull Throwable throwable) {
Log.d(TAG, throwable.toString());
// Something went wrong, check the client ID or endpoint.
}
});
}
public Authgear getAuthgear() {
return mAuthgear;
}
}
Authorize a user
Add the following code to your view model. Do NOT call these codes in activity as this can lead to memory leak when your activity instance is destroyed. You can read more on the view model in the official documentation here.
class MyAwesomeViewModel extends AndroidViewModel {
// Other methods
// This is called when login button is clicked.
public void login() {
MyAwesomeApplication app = getApplication();
app.getAuthgear().authorize(new AuthorizeOptions(
"com.myapp://host/path",
null,
null,
null,
null
), new OnAuthorizeListener() {
@Override
public void onAuthorized(@Nullable String state) {
// The user is logged in!
}
@Override
public void onAuthorizationFailed(@NonNull Throwable throwable) {
// Something went wrong.
}
});
}
}
The above call of authorize passes in the exact redirect URI as configured in the applications and manifest, the callback then indicates authorization success or failure. By default, the callback is called on the main thread.
Using the Access Token in HTTP Requests
Call refreshAccessTokenIfNeeded every time before using the access token, the function will check and make the network call only if the access token has expired. Include the access token into the Authorization header of your application request. If you are using OKHttp in your project, you can also use the interceptor extension provided by the SDK, see detail.
// Suppose we are preparing an http request in a background thread.
// Setting up the request, e.g. preparing a URLConnection
try {
authgear.refreshAccessTokenIfNeededSync();
} catch (OauthException e) {
// The token is expired.
}
String accessToken = authgear.getAccessToken();
if (accessToken == null) {
// The user is not logged in, or the token is expired.
// It is up to the caller to decide how to handle this situation.
// Typically, the request could be aborted
// immediately as the response would be 401 anyways.
return;
}
HashMap<String, String> headers = new HashMap<>();
headers.put("authorization", "Bearer " + accessToken);
// Submit the request with the headers...
Logout
To log out the user from the current app session, you need to invoke thelogoutfunction.
class MyAwesomeViewModel extends AndroidViewModel {
// Other methods
// This is called when logout button is clicked.
public void logout() {
MyAwesomeApplication app = getApplication();
app.getAuthgear().logout(.logout(new OnLogoutListener() {
@Override
public void onLogout() {
// Logout successfully
}
@Override
public void onLogoutFailed(@NonNull Throwable throwable) {
// Failed to logout
}
});
}
}
Next steps
To protect your application server from unauthorized access. You will need to integrate your backend with Authgear.