Firebase (OIDC)
With the power of OpenID Connect, Descope acts as a federated identity provider to handle user authentication while Firebase acts as the primary identity provider and the user identity information store.
We'll also show you how to handle user linking for accounts with identical emails logged in via an OIDC provider and another Firebase account that uses username and password.
The simplified flow diagram below shows this process:
Follow the steps in this guide to configure your Firebase app to use Descope Flows.
Setting up your Descope Flow
Note
If you want to use Passkeys, you can download the oidc-flow JSON from our sample app repository, which you can import into your own project.
It is important to use this Flow, as it is designed to make sure the user and their email is always verified when using passkeys as an authentication method for security reasons.
Your flows are automatically hosted with our Descope Auth Hosting Application. To learn more about our hosted app, you can read about it in our Docs page here.
If you're using the oidc-flow.json
provided above, edit the query parameter at the end of the Flow Hosting URL like so:
https://auth.descope.io/<Project ID>?flow=oidc-flow
Note
You should keep this page open, as you're going to need this information for the next parts of this guide.
If you would like to edit the UI of the passkey login screen, you can do that in the Flow Editor. Once your flow is complete and your login redirect has been configured, you'll need to connect your flow to Firebase by setting Descope up as an OIDC provider.
Setting up Descope as an OIDC Provider
Let's jump into the setup process to get Descope added as an OIDC provider in your Firebase project:
- Navigate to the Firebase Console, select Authentication under Build (in Product Categories), and go to Sign-in method.
- Select Add New Provider in the top right corner, and then click on the OpenID Connect.3. Make sure that Code flow is selected and fill in the following necessary details:
- Name: Call it Descope
- Client ID: Your Descope Project ID, which can be found under Project Settings in the Descope Console
- Issuer URL: This is the Issuer URL which is found under your SSO Configuration settings (see below)
- Client Secret: Access key generated under Access Keys in the Descope Console
Once you've gathered all of this information, put it in the Firebase console as shown below:
Once these steps have been completed, you're all set to implement the new login process and Descope Flow in your application. We'll use a sample React application and Firebase to demonstrate OIDC, which you can find on GitHub.
Firebase authentication SDK
Firebase gives total flexibility on how to configure your login pages and define the overall process, so the instructions below may differ depending on your app implementation. We will use the Firebase SDK to handle the entire OIDC authentication process, which makes it very simple to implement. It will also help us easily handle user linking, which will be discussed later on. For the login screen UI, the easiest approach is to use FirebaseUI. If you've used Firebase for a while, you may be using the legacy web namespaced API instead of the Web Modular API. For something simple like authentication, using the legacy Web namespaced API might be simpler as you won't need to refactor older code using the compat libraries.
Building out the login page with Firebase
When designing your login page with Firebase, most developers either choose to use FirebaseUI (a library for customizing your login UI, recommended) or build out the authentication process themselves. In this blog, we'll show you how to do it with FirebaseUI, and then explain how it can be implemented manually.
If you already have a functioning login page with Firebase, you can skip to the Embedding Descope in your app section of the tutorial.
Using FirebaseUI
FirebaseUI is a library provided by Firebase that you can use to quickly implement authentication functionality in your app. FirebaseUI provides pre-made user interface components for authentication and supports multiple authentication methods, including email/password, social login, and most importantly, OIDC. If you're already using FirebaseUI, you'll need to simply add your OIDC provider configuration as a sign-in option in your uiConfig:
This will allow FirebaseUI to display a button that will start the OIDC flow and allow the user to log in with Descope instead of Firebase. Under callbacks, you can also add an arrow function in your uiConfig to navigate to a different protected page like a dashboard. After these additions, your uiConfig will look something like this:
Finally, you'll need to embed the StyledFirebaseAuth react component in your page. Once embedded, you should see two buttons, one for email and password, and another for OIDC login with Descope.
If a user selects Sign in with Descope, the OIDC login flow will start and the user will be automatically redirected to the Flow Hosting URL that you previously configured in the Descope Console.
If you would like to style your buttons and change the text, you can include a fullLabel, buttonColor, and iconUrl field for each of the sign in options in your uiConfig, like so:
With the configuration above, my login page looks like this:
With FirebaseUI, that's pretty much it in regards to building out the login page with a Sign in with Descope button.
If you're building out your login page with the SDK, you can follow the instructions below. Otherwise, skip to the Embedding Descope in your app section.
Using the SDK without FirebaseUI
If you wish to design your own login page without FirebaseUI, you'll first need to initialize Descope as the provider using the following line of code:
Then, you'll need to create a function that can invoke the OIDC authentication flow. Depending on how you want to customize your login screen, you can invoke this function with a button or some other custom UI component:
All of the provider settings come from the configuration we set previously in the Firebase Console, so this simple async function is all we should need to log the user in using OIDC.
After following all of these steps, if you invoke the SignInWithDescope function, you should automatically be redirected to where your flow is.
Embedding Descope in your app
We still don't have our Descope Flow embedded anywhere in our application, as we've just been setting up the Firebase side of things so far.
In order to login with Descope Flows, you'll need to use the Descope React Component in your app. You would typically do this by creating a page in the location of the Flow Hosting URL you previously configured.
In my example, I configured it to be http://localhost:3000/login
for testing:
Therefore, I will create a new page with the /login route to contain the Descope React Component like this:
When the user is redirected to this page, they should see the screen to enable passkeys that is included in the oidc-flow.json file that's part of the GitHub repository of the sample application.
After a user successfully logs in with Descope and verifies their email, Firebase will finish the OIDC flow and generate the JWT tokens that the rest of your application and APIs already use. For the end user, the experience will be very similar to before - it will seem as if they used Firebase to login, but they used Descope with passkeys instead of using a username and password.
After following all of the steps so far, you now have full-fledged Descope powered Flows embedded in your Firebase app, enabling you to have passkeys as an alternative authentication method for your users.
Handling user linking with Firebase
We are almost done! The only remaining thing is to configure proper user linking in your app so that you don't have duplicate user records.
If you test out the login right now, you may notice that user accounts don't link together. Instead, depending on the current configuration, you'll either see that two user accounts are created with the same email but different identity providers, or that one user account is created with just the last used login provider.
To ensure that both login methods (email/password and passkeys) can be used to sign in to one particular user account, you'll need to link them using the Firebase SDK. Firebase provides the functionality to link user accounts sharing the same email address. This way, if a user logs in with an OIDC provider and another user account already exists in Firebase with the same email, Firebase can link these two accounts.
To start out, you'll want to make sure that your Firebase application supports user account linking. To do this, head back to the Firebase Console -> Authentication -> Settings and make sure that Link accounts that use the same email is selected:
If this is not enabled, whenever you log in via email/password or log in via passkeys, you'll have two separate accounts with different identity providers, which is not what we want!
Next, depending on how you've configured your login page, you'll either use FirebaseUI (which will handle the linking for you) or develop logic in your Firebase project to check for existing accounts and use the linkWithCredential function provided by Firebase to link the two accounts.
User linking with FirebaseUI
If you're using FirebaseUI, you can try to sign in with either Descope or your email/password right now. Only one user with two identity providers should exist with that email in the Firebase Console. The Firebase user ID stays the same regardless of the identity provider used during sign in.
Since we verified the user's identity in our Descope Flow by validating the same email that was used in the account linking, the user can safely continue to sign in with passkeys in the future and gain full access to their account.
It's important to understand that Firebase treats all OIDC providers as federated IdPs, meaning that during the account linking, the original user's credentials in Firebase will be replaced with the credentials from Descope. If the user attempts to sign in with their email and password again, after creating their passkey with Descope, then this screen will appear instead of a place to enter their password:
Therefore, if you're using FirebaseUI, you're all set and ready to deploy passkeys in your application for all users! However, if you've built out a custom login page with the SDK functions, read on.
User linking with the SDK
To prevent the replacement of the email/password-based account when signing in with Descope, you will have to manually manage the account linking process, which would look something like this:
- User tries to sign in with Descope.
- If an account already exists with the same email, Firebase will throw an auth/account-exists-with-different-credential error.
- You catch this error, get the pending Descope credential from the error object, and save it somewhere (e.g., in your app's state or localStorage).
- You then prompt the user to sign in with their email/password (e.g., showing a form or redirecting to FirebaseUI).
- Once the user has signed in with their email/password, you get the current user's UserCredential object.
- Then, you use the linkWithCredential method to link the Descope credential (which you saved earlier) with the existing account.
The implementation of the merging logic in your application will looks similar to what I have done below in my Login.js:
This code also includes the previously mentioned signInWithDescope function, and stores the pending credential information in a React state hook. Once you've implemented this login page successfully, your users should be able to use multiple identity providers to log in and access their accounts.
And that's it! If you're curious, you can read more about linking user accounts with different authentication methods on the Firebase docs.
If you have any other questions about Descope or our flows, feel free to reach out to us!