cloudfront-auth
nginx-openid-connect

cloudfront-auth | nginx-openid-connect | |
---|---|---|
6 | 9 | |
593 | 206 | |
- | 1.9% | |
0.0 | 5.0 | |
over 2 years ago | about 2 months ago | |
JavaScript | JavaScript | |
ISC License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cloudfront-auth
-
I just want to host a static website with Cognito as a guard. How can I do it as simple as possible?
If you already have existing users in google, github, or something like that, maybe look at this https://github.com/Widen/cloudfront-auth and skip cognito.
-
Deploy EventCatalog to AWS CloudFront with Google SSO Access Control via Terraform
This article shows how to deploy your own EventCatalog in AWS CloudFront via Terraform and updates to the Catalog via CI/CD (CircleCi in this case, but can be easily applied to other CI systems). It also shows how to use Lambda@Edge to implement Google SSO / OpenID Connect via the Widen/cloudfront-auth Project.
- Google login to S3 bucket website?
-
What are you using lambda @ edge and cloudfront functions for ?
Using it to allow Google Workspace auth access control to static websites. Leverages https://github.com/Widen/cloudfront-auth
-
Protect your Amazon CloudFront content — Authorization@Edge using cookies
aws.amazon.com Recognition The earlier AWS blog that investigated wiring up Cognito authentication with Lambda@Edge: https://aws.amazon.com/blogs/networking-and-content-delivery/authorizationedge-how-to-use-lambdaedge-and-json-web-tokens-to-enhance-web-application-security/ A gist that shows how to add Basic Authentication using Lambda@Edge: https://gist.github.com/lmakarov/e5984ec16a76548ff2b278c06027f1a4 An open-source project that uses a similar approach to secure CloudFront distributions, but does not yet support Cognito (at the time of this writing): https://github.com/Widen/cloudfront-auth Additional resources Check out the code on GitHub to see how the sample solution is built. You can deploy and run the code yourself: https://github.com/aws-samples/cloudfront-authorization-at-edge. You can deploy the Amazon Cognito resources from the sample solution directly from the AWS Serverless Application Repository. 10
-
Hosting static site on S3 behind authentication
1) Make sure your bucket is private. 2) Set up CloudFront with Origin Access Identity 3) Use Lambda@Edge for authentication.
nginx-openid-connect
-
OIDC filter
Could you please suggest an OIDC filter/side-car which is capable of configure it with a custom IDP? Nginx Plus has a OIDC filter https://github.com/nginxinc/nginx-openid-connect and looking for a similar solution. I am planning to use AKS for api and Web compute. Thanks!
-
Keycloak – Open-Source Identity and Access Management Interview
> With both Apache and Nginx you can let the web server do all the OpenID Connect work for you for paths you specify.
Seems like at least the official nginx solution for this requires their paid subscription: https://github.com/nginxinc/nginx-openid-connect
Got any tips for how to do it with their open-source solution?
- User friendly reverse proxy suitable for production
-
Cosmos-Server now in version 0.3.0 with 2 Factor Authentication: A User-Friendly, Self-Hosted Alternative to using Cloudflare Tunnel to secure your applications
It's not a matter of better or worst security than Traefik or NGINX, it's that if you do not have entreprise level licence for those software, you don't actually have the security modules that protect your services (ex. https://www.nginx.com/products/nginx/) Cosmos includes a WAF by default without subscription
- Microsites/apps (?) with NextJS
-
Where and how do you store your access_token and refresh_token in Oauth2.0 authorization flow?
You can scale up it with side car pattern with K8. One product you can use is https://github.com/nginxinc/nginx-openid-connect and if you Azure they have a built in capability as well. I haven't worked with AWS for a while but probably they will have an equal solution.
- Proper way to proxy all calls to an external API through the Next.js server? (Make SSR components work with client auth cookies)
-
Is it possible to control some parameters of Nginx programatically
You could purchase NGINX Plus which allows many things to be configured via API calls.
-
Azure AD Authentication
If you have an active Nginx plus subscription the OIDC implementation will help. https://github.com/nginxinc/nginx-openid-connect
What are some alternatives?
Grant - OAuth Proxy
crossplane - Quick and reliable way to convert NGINX configurations into JSON and back.
jwt-decode - Decode JWT tokens; useful for browser applications.
keycloak-config-cli - Import YAML/JSON-formatted configuration files into Keycloak - Configuration as Code for Keycloak.
yup-oauth2 - An oauth2 client implementation providing the Device, Installed, Service Account, and several more flows.
typescript - Typescript packages and application to showcase the ZITADEL resource API
google-one-tap - Google One Tap Login
nginx-wrapper - NGINX Event Process Wrapper
express-openid-connect - An Express.js middleware to protect OpenID Connect web applications.
lua-resty-openidc - OpenID Connect Relying Party and OAuth 2.0 Resource Server implementation in Lua for NGINX / OpenResty
auth0-nodejs-webapp-sample - Auth0 Integration Samples for Node Web Applications
terraform-provider-keycloak - Terraform provider for Keycloak
