Skip to content

Commit 2d0d4e6

Browse files
authored
Add summary table of common auth providers (#180)
* Add summary table of common auth providers * Fix link
1 parent 446f7dc commit 2d0d4e6

File tree

3 files changed

+24
-1
lines changed

3 files changed

+24
-1
lines changed

installation/authentication-setup.mdx

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,28 @@ The PowerSync client SDK uses the retrieved JWT to authenticate directly against
3030

3131
Users are not persisted in PowerSync, and there is no server-to-server communication used for client authentication.
3232

33-
Some authentication providers already generate JWTs for users which PowerSync can verify directly — see the documentation for individual providers (e.g. [Supabase Auth](/installation/authentication-setup/supabase-auth), [Firebase Auth](/installation/authentication-setup/firebase-auth))
33+
## Common Authentication Providers
34+
35+
PowerSync supports JWT-based authentication from various providers. The table below shows commonly used authentication providers, their JWKS URLs, and any specific configuration requirements.
36+
37+
| Provider | JWKS URL | Configuration Notes | Documentation |
38+
| --- | --- | --- | --- |
39+
| **Supabase** | Direct integration available | Uses Supabase's **JWT Secret** | [Supabase Auth Setup](/installation/authentication-setup/supabase-auth) |
40+
| **Firebase Auth / GCP Identity Platform** | `https://www.googleapis.com/service_accounts/v1/jwk/[email protected]` | JWT Audience: Firebase project ID | [Firebase Auth Setup](/installation/authentication-setup/firebase-auth) |
41+
| **Auth0** | `https://{auth0-domain}/.well-known/jwks.json` | JWT Audience: PowerSync instance URL | [Auth0 Setup](/installation/authentication-setup/auth0) |
42+
| **Clerk** | `https://{yourClerkDomain}/.well-known/jwks.json` |Additional configuration may be required | [Clerk Documentation](https://clerk.com/docs/backend-requests/making/jwt-templates#create-a-jwt-template) |
43+
| **Stytch** | `https://{live_or_test}.stytch.com/v1/sessions/jwks/{project-id}` | Additional configuration may be required | [Stytch Documentation](https://stytch.com/docs/api/jwks-get) |
44+
| **Keycloak** | `https://{your-keycloak-domain}/auth/realms/{realm-name}/protocol/openid-connect/certs` | Additional configuration may be required | [Keycloak Documentation](https://documentation.cloud-iam.com/how-to-guides/configure-remote-jkws.html) |
45+
| **Amazon Cognito** | `https://cognito-idp.{region}.amazonaws.com/{userPoolId}/.well-known/jwks.json` | Additional configuration may be required | [Cognito Documentation](https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-verifying-a-jwt.html) |
46+
| **Azure AD** | `https://login.microsoftonline.com/{tenantId}/discovery/v2.0/keys` | Additional configuration may be required | [Azure AD Documentation](https://learn.microsoft.com/en-us/entra/identity-platform/access-tokens) |
47+
| **Google Identity** | `https://www.googleapis.com/oauth2/v3/certs` | Additional configuration may be required | [Google Identity Documentation](https://developers.google.com/identity/openid-connect/openid-connect#discovery) |
48+
| **SuperTokens** | `https://{YOUR_SUPER_TOKENS_CORE_CONNECTION_URI}/.well-known/jwks.json` | Additional configuration may be required | [SuperTokens Documentation](https://supertokens.com/docs/quickstart/integrations/aws-lambda/session-verification/using-jwt-authorizer) |
49+
| **WorkOS** | `https://api.workos.com/sso/jwks/{YOUR_CLIENT_ID}` | Additional configuration may be required | [WorkOS Documentation](https://workos.com/docs/reference/user-management/session-tokens/jwks) |
50+
| **Custom JWT** | Your own JWKS endpoint | See custom auth requirements | [Custom Auth Setup](/installation/authentication-setup/custom) |
51+
52+
## Authentication Options
53+
54+
Some authentication providers already generate JWTs for users which PowerSync can verify directly — see the documentation for individual providers (e.g. [Supabase Auth](/installation/authentication-setup/supabase-auth), [Firebase Auth](/installation/authentication-setup/firebase-auth)).
3455

3556
For others, some backend code must be added to your application backend to generate the JWTs needed for PowerSync — see [Custom](/installation/authentication-setup/custom) authentication.
3657

installation/authentication-setup/auth0.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: "Auth0"
33
mode: wide
4+
description: "Setting up Auth0 Authentication with PowerSync"
45
---
56

67
On Auth0, create a new API:

installation/authentication-setup/firebase-auth.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: "Firebase Auth"
33
mode: wide
4+
description: "Setting up Firebase Authentication with PowerSync"
45
---
56

67
Configure authentication on the PowerSync instance with the following settings:

0 commit comments

Comments
 (0)