matrix-user-verification-service VS prosody-mod-auth-matrix-user-verification

Compare matrix-user-verification-service vs prosody-mod-auth-matrix-user-verification and see what are their differences.

matrix-user-verification-service

Service to verify details of a user based on a Open ID token. (by matrix-org)
Our great sponsors
  • SurveyJS - Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
matrix-user-verification-service prosody-mod-auth-matrix-user-verification
1 2
20 23
- -
5.2 2.7
10 months ago 5 months ago
JavaScript Lua
GNU General Public License v3.0 or later Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

matrix-user-verification-service

Posts with mentions or reviews of matrix-user-verification-service. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-26.

prosody-mod-auth-matrix-user-verification

Posts with mentions or reviews of prosody-mod-auth-matrix-user-verification. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-26.
  • black screen after deploy jitsi docker [HELP]
    1 project | /r/jitsi | 25 May 2022
    # shellcheck disable=SC2034 # Security # # Set these to strong passwords to avoid intruders from impersonating a service account # The service(s) won't start unless these are specified # Running ./gen-passwords.sh will update .env with strong passwords # You may skip the Jigasi and Jibri passwords if you are not using those # DO NOT reuse passwords # # XMPP password for Jicofo client connections JICOFO_AUTH_PASSWORD=4649c532b90811ca4625f6b35569ef28 # XMPP password for JVB client connections JVB_AUTH_PASSWORD=546a242e036677d2a4abbe8950b5713d # XMPP password for Jigasi MUC client connections JIGASI_XMPP_PASSWORD=411b401885b74a89bd2df5ae07587267 # XMPP recorder password for Jibri client connections JIBRI_RECORDER_PASSWORD=c05cb90478902293101782c934ed4e5c # XMPP password for Jibri client connections JIBRI_XMPP_PASSWORD=1bad9e65e0a5797da545c133db49ca0d # # Basic configuration options # # Directory where all configuration will be stored CONFIG=~/.jitsi-meet-cfg # Exposed HTTP port HTTP_PORT=8072 # Exposed HTTPS port HTTPS_PORT=8449 # System time zone TZ=America/La_Paz # Public URL for the web service (required) PUBLIC_URL=https://salavirtual.drguery.com # IP address of the Docker host # See the "Running behind NAT or on a LAN environment" section in the Handbook: # https://jitsi.github.io/handbook/docs/devops-guide/devops-guide-docker#running-behind-nat-or-on-a-lan-environment DOCKER_HOST_ADDRESS=192.168.2.5 # Control whether the lobby feature should be enabled or not ENABLE_LOBBY=1 # Control whether the A/V moderation should be enabled or not #ENABLE_AV_MODERATION=1 # Show a prejoin page before entering a conference ENABLE_PREJOIN_PAGE=1 # Enable the welcome page ENABLE_WELCOME_PAGE=1 # Enable the close page #ENABLE_CLOSE_PAGE=0 # Disable measuring of audio levels #DISABLE_AUDIO_LEVELS=0 # Enable noisy mic detection ENABLE_NOISY_MIC_DETECTION=1 # Enable breakout rooms #ENABLE_BREAKOUT_ROOMS=1 # # Let's Encrypt configuration # # Enable Let's Encrypt certificate generation #ENABLE_LETSENCRYPT=1 # Domain for which to generate the certificate #LETSENCRYPT_DOMAIN=meet.example.com # E-Mail for receiving important account notifications (mandatory) #[email protected] # Use the staging server (for avoiding rate limits while testing) #LETSENCRYPT_USE_STAGING=1 # # Etherpad integration (for document sharing) # # Set etherpad-lite URL in docker local network (uncomment to enable) #ETHERPAD_URL_BASE=http://etherpad.meet.jitsi:9001 # Set etherpad-lite public URL, including /p/ pad path fragment (uncomment to enable) #ETHERPAD_PUBLIC_URL=https://etherpad.my.domain/p/ # Name your etherpad instance! ETHERPAD_TITLE=Video Chat # The default text of a pad ETHERPAD_DEFAULT_PAD_TEXT="Welcome to Web Chat!\n\n" # Name of the skin for etherpad ETHERPAD_SKIN_NAME=colibris # Skin variants for etherpad ETHERPAD_SKIN_VARIANTS="super-light-toolbar super-light-editor light-background full-width-editor" # # Basic Jigasi configuration options (needed for SIP gateway support) # # SIP URI for incoming / outgoing calls #[email protected] # Password for the specified SIP account as a clear text #JIGASI_SIP_PASSWORD=passw0rd # SIP server (use the SIP account domain if in doubt) #JIGASI_SIP_SERVER=sip2sip.info # SIP server port #JIGASI_SIP_PORT=5060 # SIP server transport #JIGASI_SIP_TRANSPORT=UDP # # Authentication configuration (see handbook for details) # # Enable authentication #ENABLE_AUTH=1 # Enable guest access #ENABLE_GUESTS=1 # Select authentication type: internal, jwt, ldap or matrix #AUTH_TYPE=internal # JWT authentication # # Application identifier #JWT_APP_ID=my_jitsi_app_id # Application secret known only to your token generator #JWT_APP_SECRET=my_jitsi_app_secret # (Optional) Set asap_accepted_issuers as a comma separated list #JWT_ACCEPTED_ISSUERS=my_web_client,my_app_client # (Optional) Set asap_accepted_audiences as a comma separated list #JWT_ACCEPTED_AUDIENCES=my_server1,my_server2 # LDAP authentication (for more information see the Cyrus SASL saslauthd.conf man page) # # LDAP url for connection #LDAP_URL=ldaps://ldap.domain.com/ # LDAP base DN. Can be empty #LDAP_BASE=DC=example,DC=domain,DC=com # LDAP user DN. Do not specify this parameter for the anonymous bind #LDAP_BINDDN=CN=binduser,OU=users,DC=example,DC=domain,DC=com # LDAP user password. Do not specify this parameter for the anonymous bind #LDAP_BINDPW=LdapUserPassw0rd # LDAP filter. Tokens example: # %1-9 - if the input key is [email protected], then %1 is com, %2 is domain and %3 is mail # %s - %s is replaced by the complete service string # %r - %r is replaced by the complete realm string #LDAP_FILTER=(sAMAccountName=%u) # LDAP authentication method #LDAP_AUTH_METHOD=bind # LDAP version #LDAP_VERSION=3 # LDAP TLS using #LDAP_USE_TLS=1 # List of SSL/TLS ciphers to allow #LDAP_TLS_CIPHERS=SECURE256:SECURE128:!AES-128-CBC:!ARCFOUR-128:!CAMELLIA-128-CBC:!3DES-CBC:!CAMELLIA-128-CBC # Require and verify server certificate #LDAP_TLS_CHECK_PEER=1 # Path to CA cert file. Used when server certificate verify is enabled #LDAP_TLS_CACERT_FILE=/etc/ssl/certs/ca-certificates.crt # Path to CA certs directory. Used when server certificate verify is enabled #LDAP_TLS_CACERT_DIR=/etc/ssl/certs # Wether to use starttls, implies LDAPv3 and requires ldap:// instead of ldaps:// # LDAP_START_TLS=1 # Matrix authentication (for more information see the documention of the "Prosody Auth Matrix User Verification" at https://github.com/matrix-org/prosody-mod-auth-matrix-user-verification) # # Base URL to the matrix user verification service (without ending slash) #MATRIX_UVS_URL=https://uvs.example.com:3000 # (optional) The issuer of the auth token to be passed through. Must match what is being set as `iss` in the JWT. Defaut value is "issuer". #MATRIX_UVS_ISSUER=issuer # (optional) user verification service auth token, if authentication enabled #MATRIX_UVS_AUTH_TOKEN=changeme # (optional) Make Matrix room moderators owners of the Prosody room. #MATRIX_UVS_SYNC_POWER_LEVELS=1 # # Advanced configuration options (you generally don't need to change these) # # Internal XMPP domain XMPP_DOMAIN=meet.jitsi # Internal XMPP server XMPP_SERVER=xmpp.meet.jitsi # Internal XMPP server c2s port #XMPP_PORT=5222 # Internal XMPP server URL XMPP_BOSH_URL_BASE=http://xmpp.meet.jitsi:5280 # Internal XMPP domain for authenticated services XMPP_AUTH_DOMAIN=auth.meet.jitsi # XMPP domain for the MUC XMPP_MUC_DOMAIN=muc.meet.jitsi # XMPP domain for the internal MUC used for jibri, jigasi and jvb pools XMPP_INTERNAL_MUC_DOMAIN=internal-muc.meet.jitsi # XMPP domain for unauthenticated users XMPP_GUEST_DOMAIN=guest.meet.jitsi # Custom Prosody modules for XMPP_DOMAIN (comma separated) XMPP_MODULES= # Custom Prosody modules for MUC component (comma separated) XMPP_MUC_MODULES= # Custom Prosody modules for internal MUC component (comma separated) XMPP_INTERNAL_MUC_MODULES= # MUC for the JVB pool JVB_BREWERY_MUC=jvbbrewery # XMPP user for JVB client connections JVB_AUTH_USER=jvb # STUN servers used to discover the server's public IP JVB_STUN_SERVERS=meet-jit-si-turnrelay.jitsi.net:443 # Media port for the Jitsi Videobridge JVB_PORT=10000 # XMPP user for Jicofo client connections. # NOTE: this option doesn't currently work due to a bug JICOFO_AUTH_USER=focus # Base URL of Jicofo's reservation REST API #JICOFO_RESERVATION_REST_BASE_URL=http://reservation.example.com # Enable Jicofo's health check REST API (http://:8888/about/health) #JICOFO_ENABLE_HEALTH_CHECKS=true # XMPP user for Jigasi MUC client connections JIGASI_XMPP_USER=jigasi # MUC name for the Jigasi pool JIGASI_BREWERY_MUC=jigasibrewery # Minimum port for media used by Jigasi JIGASI_PORT_MIN=20000 # Maximum port for media used by Jigasi JIGASI_PORT_MAX=20050 # Enable SDES srtp #JIGASI_ENABLE_SDES_SRTP=1 # Keepalive method #JIGASI_SIP_KEEP_ALIVE_METHOD=OPTIONS # Health-check extension #JIGASI_HEALTH_CHECK_SIP_URI=keepalive # Health-check interval #JIGASI_HEALTH_CHECK_INTERVAL=300000 # # Enable Jigasi transcription #ENABLE_TRANSCRIPTIONS=1 # Jigasi will record audio when transcriber is on [default: false] #JIGASI_TRANSCRIBER_RECORD_AUDIO=true # Jigasi will send transcribed text to the chat when transcriber is on [default: false] #JIGASI_TRANSCRIBER_SEND_TXT=true # Jigasi will post an url to the chat with transcription file [default: false] #JIGASI_TRANSCRIBER_ADVERTISE_URL=true # Credentials for connect to Cloud Google API from Jigasi # Please read https://cloud.google.com/text-to-speech/docs/quickstart-protocol # section "Before you begin" paragraph 1 to 5 # Copy the values from the json to the related env vars #GC_PROJECT_ID= #GC_PRIVATE_KEY_ID= #GC_PRIVATE_KEY= #GC_CLIENT_EMAIL= #GC_CLIENT_ID= #GC_CLIENT_CERT_URL= # Enable recording #ENABLE_RECORDING=1 # XMPP domain for the jibri recorder XMPP_RECORDER_DOMAIN=recorder.meet.jitsi # XMPP recorder user for Jibri client connections JIBRI_RECORDER_USER=recorder # Directory for recordings inside Jibri container JIBRI_RECORDING_DIR=/config/recordings # The finalizing script. Will run after recording is complete #JIBRI_FINALIZE_RECORDING_SCRIPT_PATH=/config/finalize.sh # XMPP user for Jibri client connections JIBRI_XMPP_USER=jibri # MUC name for the Jibri pool JIBRI_BREWERY_MUC=jibribrewery # MUC connection timeout JIBRI_PENDING_TIMEOUT=90 # When jibri gets a request to start a service for a room, the room # jid will look like: [email protected]_domain # We'll build the url for the call by transforming that into: # https://xmpp_domain/subdomain/roomName # So if there are any prefixes in the jid (like jitsi meet, which # has its participants join a muc at conference.xmpp_domain) then # list that prefix here so it can be stripped out to generate # the call url correctly JIBRI_STRIP_DOMAIN_JID=muc # Directory for logs inside Jibri container JIBRI_LOGS_DIR=/config/logs # Configure an external TURN server # TURN_CREDENTIALS=secret # TURN_HOST=turnserver.example.com # TURN_PORT=443 # TURNS_HOST=turnserver.example.com # TURNS_PORT=443 # Disable HTTPS: handle TLS connections outside of this setup #DISABLE_HTTPS=1 # Enable FLoC # Opt-In to Federated Learning of Cohorts tracking #ENABLE_FLOC=0 # Redirect HTTP traffic to HTTPS # Necessary for Let's Encrypt, relies on standard HTTPS port (443) #ENABLE_HTTP_REDIRECT=1 # Send a `strict-transport-security` header to force browsers to use # a secure and trusted connection. Recommended for production use. # Defaults to 1 (send the header). # ENABLE_HSTS=1 # Enable IPv6 # Provides means to disable IPv6 in environments that don't support it (get with the times, people!) #ENABLE_IPV6=1 # Container restart policy # Defaults to unless-stopped RESTART_POLICY=unless-stopped # Authenticate using external service or just focus external auth window if there is one already. # TOKEN_AUTH_URL=https://auth.meet.example.com/{room} # Sentry Error Tracking # Sentry Data Source Name (Endpoint for Sentry project) # Example: https://public:private@host:port/1 #JVB_SENTRY_DSN= #JICOFO_SENTRY_DSN= #JIGASI_SENTRY_DSN= # Optional environment info to filter events #SENTRY_ENVIRONMENT=production # Optional release info to filter events #SENTRY_RELEASE=1.0.0 # Optional properties for shutdown api #COLIBRI_REST_ENABLED=true #SHUTDOWN_REST_ENABLED=true # Configure toolbar buttons. Add the buttons name separated with comma(no spaces between comma) #TOOLBAR_BUTTONS= # Hide the buttons at pre-join screen. Add the buttons name separated with comma #HIDE_PREMEETING_BUTTONS= ```
  • Self hosted Jitsi with JWT token support
    2 projects | /r/matrixdotorg | 26 Jun 2021
    I am trying to setup Jitsi authenticating with matrix using this code. The first requirement for this to work is to run Matrix user verification service.

What are some alternatives?

When comparing matrix-user-verification-service and prosody-mod-auth-matrix-user-verification you can also consider the following projects:

Matrix Console Web

geolocator - A utility for getting geo-location information via HTML5 and IP look-ups, geocoding, address look-ups, distance and durations, timezone information and more...

WBO - Online collaborative Whiteboard that is simple, free, easy to use and to deploy

TextBelt - Free API for outgoing SMS

Tuber - Peer-to-Peer Video Chat for Corporate LANs

ZeroNet - ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network