Archived Content from Web3Auth Community
This topic was originally posted by githubdiscussions on 8/17/2022.
This content has been migrated from our previous community forum to preserve valuable discussions.
We integrated with Torus last year using a custom JWT verifier. The UX is handled in-house and we provide a valid JWT downstream to getTorusKey for key material.
The latest rebrand and SDK does not seem as willing to give clients the same flexibility, or at least we aren't finding it in the docs.
Tried following BYO JWT Providers from the docs, two discoveries:
- The latest ExtraLoginOptions spec does not seem to support directly plumbing
id_tokenthrough as the doc suggests doing. - We still need to initialize our client with an
OpenLoginAdapter, which has a requireduxModefield. We were hoping this was ignored whenconnectTois called withid_tokenpresent, but that was not the case.
Can you explain the two discrepancies please? We are having troubles there.
And more generally, in the new Adapter/Provider model, is there an equivalent flow to directly calling getTorusKey on deprecated Torus client?
Originally posted by: NTonani
Check the discussion at: https://github.com/orgs/Web3Auth/discussions/423