In the left menu, navigate to APIs & Services → OAuth consent screen. Choose External and fill in the required fields (App name, support email, developer contact).
3
Navigate to APIs & Services → Credentials → Create Credentials → OAuth 2.0 Client ID. Select Web application.
4
Authorized redirect URIs, add the Authon callback URL:
https://api.authon.dev/v1/auth/oauth/redirect
5
Create. Copy the Client ID and Client Secret from the popup dialog.
Application name and Homepage URL (e.g. https://yourapp.com).
3
Authorization callback URL to:
https://api.authon.dev/v1/auth/oauth/redirect
4
Register application. Then click Generate a new client secret and copy both values.
フィールドマッピング:
Client ID←Client ID
Client Secret←Client Secret
要求スコープ:
read:useruser:email
Apple
Apple Sign In requires a Services ID and a private key for generating a client secret JWT. Configure at developer.apple.com.
注意: Apple uses two types of identifiers: App IDs (for native iOS/macOS apps) and Services IDs (for web login). To use Sign In with Apple on the web, you must create a Services ID.
1
In the Apple Developer Portal, go to Certificates, Identifiers & Profiles → Identifiers. Create or select your App ID and enable Sign In with Apple. (The App ID is used for native app login and serves as the basis for web login.)
2
On the same Identifiers page, click + to register a new identifier. Choose Services IDs and click Continue.
3
Enter a description (e.g. My App Web Login) and a unique identifier (e.g. com.yourapp.web). This identifier is the Client ID you will enter in Authon. Click Continue → Register to create it.
4
Click the newly created Services ID to edit it. Check Sign In with Apple and click Configure. Primary App ID to the App ID from Step 1. Under Domains and Subdomains add your domain. Under Return URLs add:
https://api.authon.dev/v1/auth/oauth/redirect
5
In the Apple Developer Portal sidebar, go to Keys and click + or Register a New Key.
6
Enter a key name (e.g. Authon Sign In) and check Sign In with Apple. Click Configure next to it and select the Primary App ID you created in Step 1, then Save.
7
Continue → Register to create the key. Download the .p8 file. This file can only be downloaded once, so store it securely. Note the Key ID (10 characters) shown on screen.
注意: Your Team ID is the 10-character code shown under your account name in the top-right of Apple Developer Portal, or on the Membership page.
8
Apple uses a short-lived JWT (6-month max) as the Client Secret. Fill in your Team ID, Key ID, Services ID, and .p8 file path in the script below. The resulting JWT is your Client Secret.
generate_apple_secret.py
import jwt, time
TEAM_ID = "YOUR_TEAM_ID"# 10-char Team ID from Apple Developer
KEY_ID = "YOUR_KEY_ID"# Key ID from the downloaded key
CLIENT_ID = "com.yourapp.web"# Your Services ID Bundle ID
KEY_FILE = "AuthKey_XXXXXX.p8"# Path to the .p8 private keywith open(KEY_FILE, "r") as f:
private_key = f.read()
payload = {
"iss": TEAM_ID,
"iat": int(time.time()),
"exp": int(time.time()) + 86400 * 180, # 180 days"aud": "https://appleid.apple.com",
"sub": CLIENT_ID,
}
client_secret = jwt.encode(payload, private_key, algorithm="ES256", headers={"kid": KEY_ID})
print(client_secret)
Or use this tool to generate the JWT directly in your browser — nothing is sent to any server:
Apple Client Secret Generatorruns in your browser — nothing is sent to any server
注意: Apple client secrets expire after a maximum of 6 months. You will need to regenerate and update the secret in your Authon dashboard before it expires.
9
To receive server-to-server notifications (consent revoked, account deleted), set the Notification Endpoint URL in your Services ID settings to:
https://api.authon.dev/v1/webhooks/oauth/apple
フィールドマッピング:
Client ID←Services ID Bundle ID (e.g. com.yourapp.web)
Client Secret←Generated JWT string (from the script above)
Go to the Developer Portal → Projects & Apps → select or create a project → Add App.
2
App Settings → Authentication settings, enable OAuth 2.0. Set App type to Web App.
3
Set the Callback URI to:
https://api.authon.dev/v1/auth/oauth/redirect
4
Copy the Client ID and Client Secret from the Keys and tokens tab.
注意: Twitter / X OAuth 2.0 requires a Developer Account with Elevated access for the email scope. Without it, only users.read and tweet.read are available.
In the app dashboard, go to Kakao Login → General → Activate.
3
Go to App → General → Platform Keys. Copy the REST API Key (this is your Client ID). Then go to Kakao Login → General and add the callback URL under Redirect URI:
https://api.authon.dev/v1/auth/oauth/redirect
4
Open the issued REST API Key detail page and check the Secret Key (Client Secret).
5
Under Kakao Login → Consent items, activate Nickname, Profile picture, and Kakao account (email).
6
In My Application → App Settings → Advanced, set the Unlink Notification URL to:
https://api.authon.dev/v1/webhooks/oauth/kakao
注意: The Kakao Client Secret is optional but strongly recommended for production. Without it, the Client ID alone is used for token exchange, which is less secure.
フィールドマッピング:
Client ID←REST API Key
Client Secret←Secret Key (REST API Key detail page)
Integration name, select a workspace, and choose Public integration type.
3
OAuth Domain & URIs section, add the redirect URI:
https://api.authon.dev/v1/auth/oauth/redirect
4
After creating the integration, go to its settings page and click Show next to the Client Secret to reveal it. Copy the OAuth client ID and OAuth client secret.
注意: Notion OAuth only grants access to pages and databases the user explicitly selects during the authorization flow. The user.email capability must be enabled in the integration settings to retrieve the user's email address.