<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Authentication for an Application with Web Client and Mobile front-ends]]></title><description><![CDATA[<p dir="auto">New to FusionAuth and exploring its use for an application.</p>
<p dir="auto">Question:</p>
<p dir="auto">Given a web client and mobile as front-ends for the same application,  is it possible for a user to register/authenticate to this application through the web client and then login to the same application with the registered user name and password using a mobile device without going through the authentication process again, or vice versa?</p>
<p dir="auto">Desired Response:</p>
<ul>
<li>
<p dir="auto">If yes, a brief description of how it works.</p>
</li>
<li>
<p dir="auto">If no, insight on how to handle this process.</p>
</li>
<li>
<p dir="auto">Direction to any documentation pertinent to either answer.</p>
</li>
</ul>
<p dir="auto">Thank you.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/900/authentication-for-an-application-with-web-client-and-mobile-front-ends</link><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 15:52:05 GMT</lastBuildDate><atom:link href="https://fusionauth.io/community/forum/topic/900.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 21 Mar 2021 02:04:28 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Sat, 10 Apr 2021 22:16:18 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/681">@mehamm</a></p>
<p dir="auto">I am working on a multi tenant guide. Thank you very much for your feedback; I'll make sure to include it.</p>
<p dir="auto">As you continue to build out your multi tenant application, please continue to post on the forum about your progress and/or any other questions. <img src="https://fusionauth.io/community/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=rcgg4tg866g" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
<p dir="auto">We often hear our multi tenant support is a differentiator for FusionAuth, and would love to make it easy/clearer for everyone.</p>
]]></description><link>https://fusionauth.io/community/forum/post/2783</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2783</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Sat, 10 Apr 2021 22:16:18 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Sat, 10 Apr 2021 01:58:58 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/645">@joshua</a></p>
<p dir="auto">Great explanation, and you're absolutely correct that I don't/shouldn't want to persist the access token in the web api.  With your help and a lot of grinding I believe I have this figured out.  One of the biggest hurdles was my misconception of how multi-tenancy works in FusionAuth.  I thought that one application could be shared across multiple tenants but they cannot.  Not a big deal because applications can be easily created with your APIs.  Just as a suggestion, maybe the FusionAuth documentation could make this a little more clear for others who are exploring your offering.</p>
<p dir="auto">Thanks for your great support!</p>
]]></description><link>https://fusionauth.io/community/forum/post/2780</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2780</guid><dc:creator><![CDATA[mehamm]]></dc:creator><pubDate>Sat, 10 Apr 2021 01:58:58 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Fri, 09 Apr 2021 22:57:37 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/681">@mehamm</a>,</p>
<p dir="auto">It sounds like you are on the right track. A few comments:</p>
<ul>
<li>The Web API should not persist the access token, but the web app definitely can (often in a session). The web app can then present the access token until it expires, in which case the web app can renew the access token with the refresh token.</li>
</ul>
<ul>
<li>"Web API verifies token against FusionAuth (my app) endpoint" -&gt; You can also verify the claims were signed by FusionAuth without calling the introspect endpoint by using a JWT library.</li>
</ul>
<ul>
<li>"Web API pulls user claims from token for role(s) and tenant, if verified returns data back to web app." -&gt; Makes sense. Make sure to check the "aud" and "iss" claims to ensure they are what you expect. You should do this even if you are using the introspect endpoint.</li>
<li>The correct tenant can be found from the client_id, since all applications are associated with one and only one tenant.<br />
If you have any specific issues, please feel free to post them in the forum (a new topic might be best).</li>
</ul>
<p dir="auto">By the way, if you are running in FusionAuth in production at scale, we encourage you to get a support contract <img src="https://fusionauth.io/community/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=rcgg4tg866g" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":slightly_smiling_face:" alt="🙂" /> . Having one allows access to the engineering team via opening support tickets. <a href="https://fusionauth.io/pricing/" rel="nofollow ugc">https://fusionauth.io/pricing/</a>.   Obviously, this is not a requirement, but should your business needs require a higher support level, it is available <img src="https://fusionauth.io/community/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f44d.png?v=rcgg4tg866g" class="not-responsive emoji emoji-android emoji--+1" style="height:23px;width:auto;vertical-align:middle" title=":+1:" alt="👍" /></p>
<p dir="auto">I hope this helps!</p>
]]></description><link>https://fusionauth.io/community/forum/post/2777</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2777</guid><dc:creator><![CDATA[joshua]]></dc:creator><pubDate>Fri, 09 Apr 2021 22:57:37 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Mon, 05 Apr 2021 22:36:08 GMT]]></title><description><![CDATA[<p dir="auto">Hi <a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/645">@Joshua</a>,</p>
<p dir="auto">Along with the web app, I have a backend <a href="http://ASP.Net" rel="nofollow ugc">ASP.Net</a> Core Web API that is secured with Authorization that the web app is accessing.  I need to be able to verify that a user is authenticated, is assigned to an appropriate role, and which tenant they are assigned to before allowing access to the api.</p>
<p dir="auto">Currently, I am trying to use the following  auth flow:</p>
<ul>
<li>
<p dir="auto">user is navigated to login page for specific tenant on web app</p>
</li>
<li>
<p dir="auto">click login button and authenticate to FusionAuth (my app) auth endpoint</p>
</li>
<li>
<p dir="auto">web app receives authentication token for user</p>
</li>
<li>
<p dir="auto">web app exchanges auth token for access/refresh token at FusionAuth (my app) endpoint</p>
</li>
<li>
<p dir="auto">web app makes call to Web API passing access token</p>
</li>
<li>
<p dir="auto">Web API verifies token against FusionAuth (my app) endpoint</p>
</li>
<li>
<p dir="auto">Web API pulls user claims from token for role(s) and tenant, if verified returns data back to web app</p>
</li>
<li>
<p dir="auto">Additionally, web app and Web API persist auth access/refresh token for future calls to the Web API so user doesn't have to repeat auth on subsequent calls, barring token expiration</p>
</li>
</ul>
<p dir="auto">I'm sure I'm making this harder than what it is but I've not used FusionAuth before.  Mostly, it seems that the difficulty is coming from the the fact that I'm using multi-tenancy in FusionAuth, otherwise it would be pretty straight forward.  I've used this pattern with Azure AD B2C, however that doesn't readily support multi-tenancy which is the the main reason I'm trying to use FusionAuth's multi-tenant support.</p>
<p dir="auto">Hope this helps you to better understand what Im trying to achieve.  It is definitely possible I'm approaching this all the wrong way, so I value your input.</p>
<p dir="auto">Thank, again.</p>
]]></description><link>https://fusionauth.io/community/forum/post/2739</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2739</guid><dc:creator><![CDATA[mehamm]]></dc:creator><pubDate>Mon, 05 Apr 2021 22:36:08 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Mon, 05 Apr 2021 18:32:04 GMT]]></title><description><![CDATA[<p dir="auto">Hi <a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/681">@mehamm</a>,</p>
<p dir="auto">OIDC is a specification - essentially it is a "thin layer" built on top of the OAuth2 protocol which formalizes identity thru the use of JWT's.</p>
<p dir="auto">This is important because it means you have the ability to use our standard clients to integrate your application.  Or, you could use any other library that supports the OIDC spec and it would be compatible with the relevant FusionAuth Integration Points.</p>
<p dir="auto"><em>A few thoughts:</em></p>
<ol>
<li>Are you looking to add third-party OIDC identification?  If so, this should point you in the right direction. <a href="https://fusionauth.io/docs/v1/tech/identity-providers/openid-connect/" rel="nofollow ugc">OIDC documentation with tutorial</a></li>
<li>A small bit about our <a href="https://fusionauth.io/docs/v1/tech/core-concepts/integration-points/#oauthoidcsaml" rel="nofollow ugc">integrations</a>.</li>
<li>Here is a listing of our <a href="https://fusionauth.io/docs/v1/tech/client-libraries/" rel="nofollow ugc">available client libraries.</a></li>
</ol>
<p dir="auto">If you had a few more details about where you are looking to go with OIDC after reviewing/implementing the above, I would be happy to see how else I might assist.</p>
<p dir="auto">Thanks,<br />
Josh</p>
]]></description><link>https://fusionauth.io/community/forum/post/2737</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2737</guid><dc:creator><![CDATA[joshua]]></dc:creator><pubDate>Mon, 05 Apr 2021 18:32:04 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Fri, 02 Apr 2021 17:49:07 GMT]]></title><description><![CDATA[<p dir="auto">Hi Josh,</p>
<p dir="auto">It has been a few days but I'm still working on this project.  I've looked at this example on FusionAuth: <em>Securing an <a href="http://ASP.NET" rel="nofollow ugc">ASP.NET</a> Core Razor Pages app with OAuth</em> that uses an OIDC configuration.  On the surface this looked like the solution l needed, however I have FusionAuth deployed on FusionAuth Cloud with multi-tenants and the configuration in this example doesn't seem to show how to support this in the OIDC configuration.  Any suggestions on how to proceed?</p>
<p dir="auto">Thank you.</p>
]]></description><link>https://fusionauth.io/community/forum/post/2724</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2724</guid><dc:creator><![CDATA[mehamm]]></dc:creator><pubDate>Fri, 02 Apr 2021 17:49:07 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Fri, 26 Mar 2021 22:16:15 GMT]]></title><description><![CDATA[<p dir="auto">Hi <a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/681">@mehamm</a>,</p>
<p dir="auto">Thanks for the additional information!   Our recommendation for mobile applications is to use an OAuth workflow similar to what is offered <a href="https://fusionauth.io/learn/expert-advice/authentication/webapp/oauth-authorization-code-grant-jwts-refresh-tokens-cookies/" rel="nofollow ugc">here</a>.  What this would mean practically, is that a mobile application developer would open a <code>web view</code> to authenticate/login with FusionAuth.</p>
<p dir="auto">What <a href="https://fusionauth.io/learn/expert-advice/authentication/webapp/oauth-authorization-code-grant-jwts-refresh-tokens-cookies/" rel="nofollow ugc">this workflow (above) </a> provides, is the security delegation benefits of the OAuth protocol.  Using this workflow (OAuth with a webview), user credentials are never stored/collected in the developer's mobile application but are instead stored/collected by FusionAuth.  Additionally, FusionAuth offers the ability to <a href="https://fusionauth.io/docs/v1/tech/themes/" rel="nofollow ugc">theme</a> your login page to style exactly like your mobile application (creating a seamless user experience).</p>
<p dir="auto">An example from a similar domain would be Financial Services.   For instance, if one collects a user's payment information for a service/product, ideally you would never store/collect/handle a credit card number, address, etc, but rather rely on a service like <code>Stripe</code> or <code>Square</code> to securely store/collect/handle that information.  FusionAuth offers a similar solution for password/credentials through an OAuth2 protocol.</p>
<p dir="auto">There are other workflows FusionAuth integrates with <a href="https://fusionauth.io/learn/expert-advice/authentication/login-authentication-workflows/" rel="nofollow ugc">here</a>.   To enable these workflows you will want to make use of our <a href="https://fusionauth.io/docs/v1/tech/client-libraries/" rel="nofollow ugc">client libraries</a>.  We are always looking to increase the number of <a href="https://fusionauth.io/docs/v1/tech/example-apps/" rel="nofollow ugc">example applications</a> to give users more ideas on how to integrate FusionAuth with various workflows.</p>
<p dir="auto">It is not my intention to be offputting, but my domain expertise is specifically related to FusionAuth.  If you select a workflow/architecture to use with FusionAuth and you are having trouble understanding which endpoint to hit in our API to log a user in (for instance), that would be a good question to ask in this community.  More in-depth architecture and integration support is certainly possible but would require an enterprise-level service contract from our Professional Services team and/or paid support account to be able to better understand your problem space and tech stack.</p>
<p dir="auto">Let me know if I have misunderstood your request; I hope this was helpful.  Best of luck!</p>
<p dir="auto">Thanks,<br />
Josh</p>
]]></description><link>https://fusionauth.io/community/forum/post/2681</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2681</guid><dc:creator><![CDATA[joshua]]></dc:creator><pubDate>Fri, 26 Mar 2021 22:16:15 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Thu, 25 Mar 2021 04:14:26 GMT]]></title><description><![CDATA[<p dir="auto">Thanks for the response Joshua.</p>
<p dir="auto">Let me try to clarify, this is a native mobile app for iOS and Android (actually Xamarin x-platform), so the mobile user isn't logging-in to a website.</p>
<p dir="auto">Further, both the web client and native mobile app will be accessing an <a href="http://ASP.Net" rel="nofollow ugc">ASP.Net</a> Core web API for interfacing with a multi-tenant (db per tenant) backend hosted on Azure.  This API is using authentication and authorization and it is really what I need to secure.</p>
<p dir="auto">In short,  I'm exploring the use of FusionAuth because of its multi-tenant authentication support and need to know where to start with implementing the authentication workflow using FusionAuth.  Thus far, I've seen a lot diagrams and general explanations about this on FusionAuth's website but no actual code on how to do it, especially related to native mobile apps.</p>
<p dir="auto">Any further help would be much appreciated.</p>
]]></description><link>https://fusionauth.io/community/forum/post/2674</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2674</guid><dc:creator><![CDATA[mehamm]]></dc:creator><pubDate>Thu, 25 Mar 2021 04:14:26 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication for an Application with Web Client and Mobile front-ends on Wed, 24 Mar 2021 23:54:36 GMT]]></title><description><![CDATA[<p dir="auto">Hi mehamm,</p>
<p dir="auto">Thanks for your question! I want to confirm a few things.</p>
<p dir="auto">Is this what you'd like to have happen?</p>
<ol>
<li>user visits <a href="http://site.com" rel="nofollow ugc">site.com</a> and signs up on their desktop</li>
<li>user installs <a href="http://site.com" rel="nofollow ugc">site.com</a> mobile app</li>
<li>user logs into <a href="http://site.com" rel="nofollow ugc">site.com</a> mobile app with the same username and password</li>
</ol>
<p dir="auto">If so, then this easily supported by FusionAuth, as both the web and the app could be talking to the same FusionAuth instance, with the same unique application that the user is registered for (on both mobile and web-based views).</p>
<p dir="auto">If you are <em>instead</em> seeking this workflow:</p>
<ol>
<li>user visits <a href="http://site.com" rel="nofollow ugc">site.com</a> and signs up on their desktop</li>
<li>user installs <a href="http://site.com" rel="nofollow ugc">site.com</a> mobile app</li>
<li>user logs into <a href="http://site.com" rel="nofollow ugc">site.com</a> using desktop</li>
<li>user is automatically logged into the application on mobile app (due to step three)</li>
</ol>
<p dir="auto">This workflow is difficult to achieve.  <a href="https://fusionauth.io/blog/2021/02/09/single-sign-on-sso-with-fusionauth/" rel="nofollow ugc">Single Sign-On</a> allows for the web client to have a single sign-on for multiple applications on a web/desktop browser using an SSO cookie.  Single Sign-On does not, however, easily allow the mobile applications/iphone app to share an SSO cookie with a web/desktop application to allow a seamless signing-in/logon between them both.</p>
<p dir="auto">I hope this helps!</p>
<p dir="auto">Thanks,<br />
Josh</p>
]]></description><link>https://fusionauth.io/community/forum/post/2673</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/2673</guid><dc:creator><![CDATA[joshua]]></dc:creator><pubDate>Wed, 24 Mar 2021 23:54:36 GMT</pubDate></item></channel></rss>