Apple redirects back to your callback URL with authorization code
Application exchanges code for user information
User is created/updated in Devana.ai and logged in
User Data Mapping
Apple provides limited user information:
Apple Field
Devana.ai Field
Notes
email
email
Primary identifier
name.firstName
firstName
May be empty on subsequent logins
name.lastName
lastName
May be empty on subsequent logins
user
providerId
Unique Apple user identifier
Security Features
CSRF Protection: State parameter validation prevents cross-site request forgery
Session Management: Secure session handling with automatic cleanup
Domain Validation: Authentication tied to specific whitemark domains
Troubleshooting
Common Issues
Invalid client_id:
Verify APPLE_CLIENT_ID matches your Service ID exactly
Ensure the Service ID has "Sign In with Apple" enabled
Invalid redirect_uri:
Callback URL must match exactly what's configured in Apple Developer Console
URLs are case-sensitive and must include protocol (https://)
Invalid key:
Verify APPLE_KEY_ID matches your private key
Ensure APPLE_TEAM_ID is correct
Check that the private key file is accessible and valid
No email in profile:
Apple may not provide email on subsequent logins
Consider prompting users to verify their email address
Testing
Enable Apple SSO in your whitemark configuration
Navigate to your login page
Click "Sign in with Apple"
Complete authentication with a test Apple ID
Verify user is created and logged in successfully
Notes
Important : L'authentification Apple nécessite une validation complète en environnement de production. Veuillez effectuer des tests exhaustifs avant tout déploiement client.
Apple users may see different privacy options that can affect data availability
First-time logins typically provide more user information than subsequent logins