On Tue, May 14, 2013 at 6:10 AM, Chris Gamache <[email protected]> wrote:

> Thanks for the detailed response. After I finish this email I'll dig in and
> digest all those links.
>
> Bloodhound will be running in conjunction with the other apps running
> within the enterprise. Our applications keep track of authenticated users
> using a cookie-based "token" ... I'd like to be able to allow users to
> authorize with the standard application authorization page and transition
> back and forth from Bloodhound to our application without having to
> re-login or maintain two separate credential stores. It looked like there
> was only one place I would have to override to make this happen and I could
> do it transparently.
>
> Ultimately, I want to hook Bloodhound into our oAuth 2.0 fabric. We're
> slowly converting away from the cookie token in favor of oAuth 2.0. I fear
> that would require more customization to the codebase than the simple
> cookie token would (storage for tokens/refresh tokens, redirects to
> out-of-band authentication forms, re-authorization, etc.). The plan was to
> take baby steps and dig in on oAuth after Bloodhound is well established
> within our application suite.


The AuthOpenIdPlugin might be worth looking at as an example,
https://github.com/dairiki/authopenid-plugin

Reply via email to