Error validating client secret
Here is the huge list of all strategies available for Omni Auth (it also includes those which are not related to OAuth 2).
Having a standard approach for strategies is great because you can integrate as many as you want without issue.
One of the main aspects of this protocol is the access token that is issued to the application.
This token is used by the app to perform various actions on the user’s behalf.
However, it can’t perform something that was not approved (for example, the user may only allow an app to fetch information about friends, but not post on the user’s wall).
Basically it is used as a building block to easily craft authentication strategies on top of it.I will instruct you how to integrate each strategy, set it up, and handle errors.Source code for this article is available on Git Hub. OAuth 2 is an authorization protocol that enables a third-party applications to obtain limited access to an HTTP service.Still, you have to remember that some social networks may return a different data about the authenticating user, so testing how your app works is absolutely necessary (I will show you some examples on this.)If you have never integrated OAuth 2 into an app, this all might seem complicated, but don’t worry, soon it will become very clear!
Today we are going to talk about authentication via social networks with the help of the OAuth 2 protocol.We will discuss Omni Auth and four of its strategies: Twitter, Facebook, Google+, and Linked In, allowing users to log in with any network they like.