e4se / laravel-telegram-oidc
OpenID Telegram Connect OAuth2 Provider for Laravel Socialite
Requires
- php: ^8.1
- ext-json: *
- firebase/php-jwt: ^6.4|^7.0
- illuminate/http: ^9.0 | ^10.0 | ^11.0 | ^12.0
- illuminate/support: ^9.0 | ^10.0 | ^11.0 | ^12.0
- socialiteproviders/manager: ^4.0
Requires (Dev)
- phpunit/phpunit: ^10.5 || ^11.0 || ^12.0
README
Installation & Basic Usage
composer require e4se/laravel-telegram-oidc
Please see the Base Installation Guide, then follow the provider specific instructions below.
This provider implements Telegram's current OpenID Connect login flow documented at core.telegram.org/bots/telegram-login.
Telegram setup
Before configuring Laravel, make sure your bot is prepared in Telegram:
- Open
@BotFatherand navigate toBot Settings > Web Login - Register every allowed website origin and callback URL you plan to use
- Copy the
Client IDandClient Secretshown by BotFather
Telegram only accepts login requests and redirects for pre-registered URLs.
Add configuration to config/services.php
'telegram-oidc' => [ 'client_id' => env('TELEGRAM_OIDC_CLIENT_ID'), 'client_secret' => env('TELEGRAM_OIDC_CLIENT_SECRET'), 'redirect' => env('TELEGRAM_OIDC_REDIRECT_URI'), ],
Add provider event listener
Configure the package's listener to listen for SocialiteWasCalled events.
Laravel 11+
In Laravel 11, the default EventServiceProvider provider was removed. Instead, add the listener using the listen method on the Event facade, in your AppServiceProvider boot method.
Event::listen(function (\SocialiteProviders\Manager\SocialiteWasCalled $event) { $event->extendSocialite('telegram-oidc', \SocialiteProviders\TelegramOIDC\Provider::class); });
Laravel 10 or below
Add the event to your listen[] array in app/Providers/EventServiceProvider. See the Base Installation Guide for detailed instructions.
protected $listen = [ \SocialiteProviders\Manager\SocialiteWasCalled::class => [ // ... other providers \SocialiteProviders\TelegramOIDC\TelegramOIDCExtendSocialite::class.'@handle', ], ];
Usage
You should now be able to use the provider like you would regularly use Socialite (assuming you have the facade installed):
return Socialite::driver('telegram-oidc')->redirect();
By default the provider uses PKCE (S256) and validates the returned id_token against Telegram's JWKS,
including iss, aud, and exp, as required by the official documentation.
Returned User fields
idnamenicknameavatar
More fields are available under the user subkey:
$user = Socialite::driver('telegram-oidc')->user(); $phone_number = $user->user['phone_number'];
Telegram returns user claims directly in the id_token. Telegram does not currently expose a separate
userinfo endpoint, so this provider reads the authenticated user from the validated ID token instead.
Customizing the scopes
You may extend the default scopes (openid profile) by adding a scopes option to your OIDC service
configuration and separate multiple scopes with a space. Telegram currently documents phone and
telegram:bot_access as additional available scopes:
'telegram-oidc' => [ 'client_id' => env('TELEGRAM_OIDC_CLIENT_ID'), 'client_secret' => env('TELEGRAM_OIDC_CLIENT_SECRET'), 'redirect' => env('TELEGRAM_OIDC_REDIRECT_URI'), 'scopes' => 'phone', // or 'scopes' => env('TELEGRAM_OIDC_SCOPES'), ],
PKCE
PKCE is enabled by default to match Telegram's recommended authorization code flow. If you need to disable it for compatibility testing, you can do so explicitly:
'telegram-oidc' => [ 'client_id' => env('TELEGRAM_OIDC_CLIENT_ID'), 'client_secret' => env('TELEGRAM_OIDC_CLIENT_SECRET'), 'redirect' => env('TELEGRAM_OIDC_REDIRECT_URI'), 'use_pkce' => false, ],
Proxy and HTTP timeouts
You may route Telegram OIDC requests through a proxy directly from the provider config:
'telegram-oidc' => [ 'client_id' => env('TELEGRAM_OIDC_CLIENT_ID'), 'client_secret' => env('TELEGRAM_OIDC_CLIENT_SECRET'), 'redirect' => env('TELEGRAM_OIDC_REDIRECT_URI'), 'proxy' => env('TELEGRAM_OIDC_PROXY', env('TELEGRAM_PROXY')), 'connect_timeout' => env('TELEGRAM_OIDC_CONNECT_TIMEOUT'), 'timeout' => env('TELEGRAM_OIDC_TIMEOUT'), ],
For advanced transport customization you can still pass raw Guzzle options via guzzle. Explicit guzzle options take precedence over the top-level proxy, connect_timeout, and timeout keys:
'telegram-oidc' => [ 'client_id' => env('TELEGRAM_OIDC_CLIENT_ID'), 'client_secret' => env('TELEGRAM_OIDC_CLIENT_SECRET'), 'redirect' => env('TELEGRAM_OIDC_REDIRECT_URI'), 'proxy' => env('TELEGRAM_OIDC_PROXY'), 'guzzle' => array_filter([ 'proxy' => env('TELEGRAM_OIDC_GUZZLE_PROXY'), 'verify' => env('TELEGRAM_OIDC_VERIFY_TLS', true), ], static fn ($value) => $value !== null && $value !== ''), ],
Based on the work of Kovah