cloudfront-auth icon indicating copy to clipboard operation
cloudfront-auth copied to clipboard

An AWS CloudFront Lambda@Edge function to authenticate requests using Google Apps, Microsoft, Auth0, OKTA, and GitHub login

Results 44 cloudfront-auth issues
Sort by recently updated
recently updated
newest added

If the user is not a public member of the organization, you can't tell if the user is a member of the organization using the old API

Due to Widen's lack of need for this project internally, we have decided to archive this project as we have not maintained it in several years and leaving this repo...

Update axios to 0.27.2 due to [CVE-2020-28168](https://nvd.nist.gov/vuln/detail/CVE-2020-28168) Remove crypto from npm packages in favor of the standard library crypto Remove querystring due to its deprecation and instead use URLSearchParams

Hi, how should I contact you to report a security issue? All best, Jasu

1. Prerequisites. Please state the needed prerequisites to run that script. I had to manually npm-install several packages before getting it working. 2. Describe whatever input is needed. What is...

The DISCOVERY_DOCUMENT does not include the api login url for okta its juts creates a random /callback url which there is no documentation on configuring

Able to see company authentication page, then enter credentials. After sending the request, I get the page below: Microsoft Azure Active Directory

If user chooses to use custom signing keys, query parameter "appid" with value of CLIENT_ID is appended to the discovery document URL. This pull request resolves issue #85.

Otherwise, when I run this on my Mac, I get an error "too many arguments": ``` Too many arguments. usage: ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519...

This pull request addresses issue #15, making it possible for the Lambda function to obtain its configuration from the AWS Systems Manager Parameter Store and AWS Secrets Manager. This makes...