This is a fork of LinkedIn OAuth2 strategy for Überauth that fixes the CSRF issue with ueberauth >= 0.0.7 versions.
-
Setup your application at LinkedIn Developers.
-
Add
:ueberauth_linkedinto your list of dependencies inmix.exs:def deps do [{:ueberauth_linkedin, "~> 0.3"}] end
-
Add the strategy to your applications:
def application do [applications: [:ueberauth_linkedin]] end
-
Add LinkedIn to your Überauth configuration:
config :ueberauth, Ueberauth, providers: [ linkedin: {Ueberauth.Strategy.LinkedIn, []} ]
-
Update your provider configuration:
config :ueberauth, Ueberauth.Strategy.LinkedIn.OAuth, client_id: System.get_env("LINKEDIN_CLIENT_ID"), client_secret: System.get_env("LINKEDIN_CLIENT_SECRET")
-
Include the Überauth plug in your controller:
defmodule MyApp.AuthController do use MyApp.Web, :controller plug Ueberauth ... end
-
Create the request and callback routes if you haven't already:
scope "/auth", MyApp do pipe_through :browser get "/:provider", AuthController, :request get "/:provider/callback", AuthController, :callback end
-
You controller needs to implement callbacks to deal with
Ueberauth.AuthandUeberauth.Failureresponses.
For an example implementation see the Überauth Example application.
Depending on the configured url you can initial the request through:
/auth/linkedin?state=csrf_token_here
Or with scope:
/auth/linkedin?state=csrf_token_here&scope=r_emailaddress
By default the requested scope is "r_basicprofile r_emailaddress". Scope can be configured either explicitly as a scope query value on the request path or in your configuration:
config :ueberauth, Ueberauth,
providers: [
linkedin: {Ueberauth.Strategy.LinkedIn, [default_scope: "r_basicprofile r_emailaddress"]}
]Please see LICENSE for licensing details.