
This is useful if the dapps want to use this share to allow users to login seamlessly. For ex: you will have to pass login_hint as user's email and domain as your app domain in extraLoginOptions while using email_passwordless loginProviderĬustom Logins can get a dapp share returned to them post successful login. This can be used to pass standard oauth login options to loginProvider.

You can use any of the valid loginProvider from the supported list. LOGIN_PROVIDER_TYPE or CUSTOM_LOGIN_PROVIDER_TYPE - GOOGLE, FACEBOOK, REDDIT, DISCORD, TWITCH, APPLE, LINE, GITHUB, KAKAO, LINKEDIN, TWITTER, WEIBO, WECHAT, EMAIL_PASSWORDLESS, SMS_PASSWORDLESS, JWT * options for whitelabling default openlogin modal. * _popupUrl is for internal development use only and is used specify url of popup window * _startUrl is for internal development use only and is used specify authentication * _iframeUrl is for internal development use only and is used to override the * You can deploy your own verifiers from ""| developer dashboard} * should be custom configuration for that loginProvider * loginConfig is key value map where each key should be a valid loginProvider and value * loginConfig enables you to pass your own login verifiers configuration for various * originData contains a signature of dapp's origin url which is generated using * You don't have to pass originData explicitly if you have registered your dapp at * originData is used to verify the origin of dapp by iframe. * replaceUrlOnRedirect removes the params from the redirected url after login * Use of `'REDIRECT'` mode is recommended in browsers where popups might get blocked. * - `'REDIRECT'`: In this uxMode, user will be redirected to a new window tab for login. * - `'POPUP'`: In this uxMode, a popup will be shown to user for login. By default openlogin will self check third party cookies and proceed * Only pass no3PC to `true` when you are sure that third party cookies are not * Setting no3PC forces openlogin to assume that third party cookies are blocked * - `'testnet'`: will be used which is the beta version. * - `'cyan'`: will be used which is the production cyan version. * - `'mainnet'`: will be used which is the production version. * network specifies the openlogin iframe url url to be used. * Not required if you're passing the clientId in the web3auth core constructor. * You can get your clientId/projectId by registering your Use useCoreKitKey as true, if you're using this SDK with the Single Factor Auth SDK

Options for whitelabling default openlogin modal.

loginConfig is key value map where each key should be a valid loginProvider and value should be custom configuration for that loginProvider. LoginConfig enables you to pass your own login verifiers configuration for various loginProviders. ReplaceUrlOnRedirect removes the params from the redirected url after login

'mainnet': will be used which is the production version.Network specifies the openlogin iframe url url to be used. Not required if you're passing the clientId in the web3auth core constructor.Įnum ( testnet, mainnet, cyan, aqua, celeste) Obtain your clientId from the Web3Auth Developer Dashboard. Set payment: true in config to enable the payment support on server side, you should also provide payment related info.Client ID for web3auth. Set card: true in config to enable the cards support on server side, see demo.
