mirror of
https://github.com/binwiederhier/ntfy.git
synced 2026-05-09 08:26:00 +02:00
[GH-ISSUE #695] Authenticate in the app with a token? #511
Labels
No labels
ai-generated
android-app
android-app
android-app
🪲 bug
build
build
dependencies
docs
enhancement
enhancement
🔥 HOT
in-progress 🏃
ios
prio:low
prio:low
pull-request
question
🔒 security
server
server
unified-push
web-app
website
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/ntfy#511
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @BartG95 on GitHub (Apr 4, 2023).
Original GitHub issue: https://github.com/binwiederhier/ntfy/issues/695
❓ Question
As of recently, ntfy gained the ability to authenticate with access tokens. Is it just me, or isn't that yet available in the Android app?
If not yet available, this issue might as well turn into a feature request.
@binwiederhier commented on GitHub (Apr 18, 2023):
I think that's a pretty good idea. We may want to do this when we implement the user account sync stuff (#523, /cc @wunter8). My thought was to do it similarly to the web app. You log in with username/password, and then you create a token and store that locally. This way nothing would change from the user-perspective, but if your phone gets stolen your username/password is not at risk.
@killermouse0 commented on GitHub (Nov 19, 2023):
I would also love it if it was possible to provide an Oauth Personal Access Token, because my self-hosted NTFY instance is behind an authenticating proxy (Zitadel). Might be too much of a niche request, but I'm just putting it here to gauge interest from others!
@brevilo commented on GitHub (Jan 30, 2024):
This sounds like this could take some time. Please correct me if I'm wrong but it seems like the low-hanging fruit could be to just disable the input validation on the user name field and accept an empty one, no? The token doc reads:
Sure, things can be still be optimized down the road but this looks like a simple enough change to enable token support in the app relatively quickly, further protecting original account credentials.
Thanks!