Login with HAQM Documentation
Login with HAQM lets you protect your customer information by leveraging the user authentication system used by HAQM.com. Login with HAQM is based on OAuth 2.0, which has been broadly adopted for user authorized exchanges across sites. For more high-level details, see the Login with HAQM product overview page. For more workflow details, see the Conceptual Overview.
- Integrate Login with HAQM with your App
- Login with HAQM for TVs, Game Consoles, and Other Devices
- Understanding Login with HAQM
- Security Considerations
- Login with HAQM for WordPress
- Support and Questions
Integrate Login with HAQM with your App
To integrate Login with HAQM with your app, see the following:
- Login with HAQM for Websites
- Login with HAQM for iOS mobile apps
- Login with HAQM for Android/Fire apps
Login with HAQM for TVs, Game Consoles, and Other Devices
For sign-in on devices that are unable to launch a web browser (including Smart TVs, gaming consoles, watches, or other devices), Login with HAQM is supported using a programming model known as code-based linking (CBL).
Code-based linking is an authorization method in which your device displays an alphanumeric user code and a URL to a user who wants to Login with HAQM. The user then navigates to the URL from another device (such as a mobile phone or laptop), signs into their HAQM account if they aren’t already signed in, and enters the user code. Once they have finished, your device will recognize that they are authenticated, and will receive an access token which can be used to obtain the user’s customer profile data.
To integrate Login with HAQM with your app using CBL, see Login with HAQM for TVs and Other Devices using CBL.
Understanding Login with HAQM
The following topics show how Login with HAQM uses access tokens to allow websites to login customers and access their customer profiles .
- Login with HAQM Conceptual Overview
- Access Token
- Authorization Code
- Refresh Token
- Customer Profile
- Authorization Grants
- Security Profile
- Essential/Voluntary Scopes
Security Considerations
The customer information Login with HAQM provides to participating websites is valuable, and precautions must be taken to ensure it stays confidential. The Login with HAQM protocol makes extensive use of HTTPS to protect communications between the user and HAQM, and between your website and HAQM. These topics explain any security threats that go beyond using HTTPS, and explains how you can prevent attackers from gaining valuable customer information.
- Cross-site Request Forgery
- Impersonating a Resource Owner in Implicit Flow
- Open Redirectors
- Code Injection
Login with HAQM for WordPress
To integrate Login with HAQM for a WordPress site, see the following blog posts:
Support and Questions
For support, see the Login with HAQM area in the Developer Forums.
Last updated: Jul 09, 2021