Auth

Login with Zoom


To enable Zoom Auth for your project, you need to set up a Zoom OAuth application and add the application credentials to your Supabase Dashboard.

Overview

Setting up Zoom logins for your application consists of 3 parts:

Access your Zoom Developer account

Zoom Developer Portal.

Find your callback URL

The next step requires a callback URL, which looks like this: https://<project-ref>.supabase.co/auth/v1/callback

  • Go to your Supabase Project Dashboard
  • Click on the Authentication icon in the left sidebar
  • Click on Providers under the Configuration section
  • Click on Zoom from the accordion list to expand and you'll find your Callback URL, you can click Copy to copy it to the clipboard

Create a Zoom OAuth app

  • Go to marketplace.zoom.us.
  • Click on Sign In at the top right to log in.
  • Click Build App (from the dropdown Develop)
  • In the OAuth card, click Create
  • Type the name of your app
  • Choose app type
  • Click Create

Under App credentials

  • Copy and save your Client ID.
  • Copy and save your Client secret.
  • Add your Callback URL in the OAuth allow list.

Under Redirect URL for OAuth

  • Paste your Callback URL

Under Scopes

  • Click on Add scopes
  • Click on User
  • Choose user:read
  • Click Done
  • Click Continue

Enter your Zoom credentials into your Supabase project

  • Go to your Supabase Project Dashboard
  • In the left sidebar, click the Authentication icon (near the top)
  • Click on Providers under the Configuration section
  • Click on Zoom from the accordion list to expand and turn Zoom Enabled to ON
  • Enter your Zoom Client ID and Zoom Client Secret saved in the previous step
  • Click Save

Add login code to your client app

When your user signs in, call signInWithOAuth() with zoom as the provider:

1
2
3
4
5
async function signInWithZoom() { const { data, error } = await supabase.auth.signInWithOAuth({ provider: 'zoom', })}

For a PKCE flow, for example in Server-Side Auth, you need an extra step to handle the code exchange. When calling signInWithOAuth, provide a redirectTo URL which points to a callback route. This redirect URL should be added to your redirect allow list.

In the browser, signInWithOAuth automatically redirects to the OAuth provider's authentication endpoint, which then redirects to your endpoint.

1
2
3
4
5
6
await supabase.auth.signInWithOAuth({ provider, options: { redirectTo: `http://example.com/auth/callback`, },})

At the callback endpoint, handle the code exchange to save the user session.

Create a new file at app/auth/callback/route.ts and populate with the following:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
import { NextResponse } from 'next/server'// The client you created from the Server-Side Auth instructionsimport { createClient } from '@/utils/supabase/server'export async function GET(request: Request) { const { searchParams, origin } = new URL(request.url) const code = searchParams.get('code') // if "next" is in param, use it as the redirect URL const next = searchParams.get('next') ?? '/' if (code) { const supabase = await createClient() const { error } = await supabase.auth.exchangeCodeForSession(code) if (!error) { const forwardedHost = request.headers.get('x-forwarded-host') // original origin before load balancer const isLocalEnv = process.env.NODE_ENV === 'development' if (isLocalEnv) { // we can be sure that there is no load balancer in between, so no need to watch for X-Forwarded-Host return NextResponse.redirect(`${origin}${next}`) } else if (forwardedHost) { return NextResponse.redirect(`https://${forwardedHost}${next}`) } else { return NextResponse.redirect(`${origin}${next}`) } } } // return the user to an error page with instructions return NextResponse.redirect(`${origin}/auth/auth-code-error`)}

When your user signs out, call signOut() to remove them from the browser session and any objects from localStorage:

1
2
3
async function signOut() { const { error } = await supabase.auth.signOut()}

Resources