
Research
/Security News
Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
@logto/connector-apple
Advanced tools
The official Logto connector for Apple social sign-in.
Table of contents
If you don't know the concept of the connector or don't know how to add this connector to your Sign-in experience, please see Logto tutorial.
ℹ️ Note
Apple sign-in is required for AppStore if you have other social sign-in methods in your app. Having Apple sign-in on Android devices is great if you also provide an Android app.
You need to enroll Apple Developer Program before continuing.
⚠️ Caution
Even if you want to implement Sign in with Apple on a web app only, you still need to have an existing app that embraces the AppStore ecosystem (i.e., have a valid App ID).
You can do it via Xcode -> Project settings -> Signing & Capabilities, or visit Certificates, Identifiers & Profiles.
See the "Enable an App ID" section in Apple official docs for more info.
Logto Test
and io.logto.test
), then click "Continue".Click the identifier you just created. Check "Sign in with Apple" on the details page and click "Configure".
In the opening modal, select the App ID you just enabled Sign in with Apple.
Enter the domain of your Logto instance without protocol and port, e.g., your.logto.domain
; then enter the "Return URL" (i.e., Redirect URI), which is the Logto URL with /callback/${connector_id}
, e.g., https://your.logto.domain/callback/apple-universal
. You can get the randomly generated connector_id
after creating Apple connector in Admin Console.
Click "Next" then "Done" to close the modal. Click "Continue" on the top-right corner, then click "Save" to save your configuration.
⚠️ Caution
Apple does NOT allow Return URLs with HTTP protocol and
localhost
domain.If you want to test locally, you need to edit
/etc/hosts
file to map localhost to a custom domain and set up a local HTTPS environment. mkcert can help you for setting up local HTTPS.
To get user's email from Apple, you need to configure the scope to include email
. For both email and name, you can use name email
as the scope. See Apple official docs for more info.
ℹ️ Note
The user may choose to hide their email address from your app. In this case, you will not be able to retrieve the real email address. An email address like
random@privaterelay.appleid.com
will be returned instead.
If you have configured your app to request users' email addresses after they have already signed in with Apple, you will not be able to retrieve the email addresses for those existing users, even if they sign in again using Apple ID. To address this, you need to instruct your users to visit the Apple ID account management page and remove your application from the "Sign in with Apple" section. This can be done by selecting "Stop using Apple Sign In" on your app's detail page.
For instance, if your app requests both the users' email and name (email name
scope), the consent page that new users see during their first sign-in should look similar to this:
See developer discussion here.
That's it. The Apple connector should be available in both web and native apps. Don't forget to Enable connector in sign-in experience.
FAQs
Apple web connector implementation.
We found that @logto/connector-apple demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
Security News
Socket now integrates with Bun 1.3’s Security Scanner API to block risky packages at install time and enforce your organization’s policies in local dev and CI.
Research
The Socket Threat Research Team is tracking weekly intrusions into the npm registry that follow a repeatable adversarial playbook used by North Korean state-sponsored actors.