OpenSesame is a Warden strategy for providing "walled garden" authentication for access to Rack-based applications via Omniauth. For example, your company has internal apps and/or staging enviroments for multiple projects and you want something better than HTTP basic auth. The intent is protect the visibility of your app from the outside world.
Enter OpenSesame. To authenticate, OpenSesame currently uses Omniauth and the Github API to require that a user is both logged in to Github and a member of the configurable Github organization.
In your Gemfile:
$ gem "opensesame"
Register your application(s) with Github for OAuth access. For each application, you need a name, the site url, and a callback for OAuth. The OmniAuth-Github OAuth strategy used under the hood will expect the callback at mount path + '/github/callback'. So the development version of your client application might be registered as:
Name: MyApp - local URL: http://localhost:3000 Callback URL: http://localhost:3000/opensesame/github/callback
# Rails config/initializers/opensesame.rb require 'opensesame' OpenSesame.configure do |config| config.enable Rails.env.staging? config.github ENV['GITHUB_APP_ID'], ENV['GITHUB_SECRET'] config.organization 'challengepost' config.mounted_at '/opensesame' end``` Mount OpenSesame in your Rails routes.rb: ```ruby # Rails config/routes.rb mount OpenSesame::Engine => OpenSesame.mount_prefix