cloudfront-auth
cloudfront-auth copied to clipboard
An AWS CloudFront Lambda@Edge function to authenticate requests using Google Apps, Microsoft, Auth0, OKTA, and GitHub login
If the user is not a public member of the organization, you can't tell if the user is a member of the organization using the old API
Due to Widen's lack of need for this project internally, we have decided to archive this project as we have not maintained it in several years and leaving this repo...
Update axios to 0.27.2 due to [CVE-2020-28168](https://nvd.nist.gov/vuln/detail/CVE-2020-28168) Remove crypto from npm packages in favor of the standard library crypto Remove querystring due to its deprecation and instead use URLSearchParams
Hi, how should I contact you to report a security issue? All best, Jasu
1. Prerequisites. Please state the needed prerequisites to run that script. I had to manually npm-install several packages before getting it working. 2. Describe whatever input is needed. What is...
The DISCOVERY_DOCUMENT does not include the api login url for okta its juts creates a random /callback url which there is no documentation on configuring
Able to see company authentication page, then enter credentials. After sending the request, I get the page below: Microsoft Azure Active Directory
If user chooses to use custom signing keys, query parameter "appid" with value of CLIENT_ID is appended to the discovery document URL. This pull request resolves issue #85.
Otherwise, when I run this on my Mac, I get an error "too many arguments": ``` Too many arguments. usage: ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519...
This pull request addresses issue #15, making it possible for the Lambda function to obtain its configuration from the AWS Systems Manager Parameter Store and AWS Secrets Manager. This makes...