-
Notifications
You must be signed in to change notification settings - Fork 1.9k
Expose isNewUser information in IDPResponse #1242
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Is there any reliable way to workaround this using the current version of the library? |
@curiousily the timestamps are reliable with the edge case issue that if a new user signs up, signs out, and signs in within two minutes they will still look "new" because the timestamps wont change. |
you guys can also send a flag in onActivityResult intent. like a boolean to represent if its new or existing. |
@samtstern, its me again. so i noticed one strange thing. my business has both website and app but use same firebase authentication table. so i signed up for a new account on our website as an email provider. checked firebase console and saw the account there as email provider. waited almost 2 hours..... then logged into app with email provider, but to my surprise i found it as a new signup. so i checked and the following was true, why ? metadata.creationTimestamp == metadata.lastSignInTimestamp after waiting almost 2 hours should this not be false. is this check only local to the mobile application ? |
Hey @samtstern, Any progress on this issue? This really degrades the experience for our users, I can't tell them to not sign up again within the next 2 minutes (if that is really the limit). |
This has been released in version |
Hi @samtstern |
@AndrazP I think I just forgot to update the README! |
See:
#1209 (comment)
Currently we tell developers to rely on the created / signed in timestamps when checking to see if a
FirebaseUser
is new or not. However these timestamps have some limitations that make them occasionally unreliable.If we could expose this information in the response we provide at the end of the AuthUI flow, that would help developers launch follow-up flows.
The text was updated successfully, but these errors were encountered: