Auth0 Extension that adds authorization features to your account
OTHER License
This extension provides authorization features for Auth0 focused on RBAC and user group management.
The Authorization Extension is in maintenance mode. We do not plan on adding new features to the extension as we are working to bring features of the extension into the core Auth0 platform. Bug fixes and security patches will still be made.
We provide documentation on how to install and use the Authorization Extension on the Auth0 docs website.
We have RBAC available in Auth0 as a core feature of the platform, rather than requiring the use of this extension.
For a detailed summary of the differences between this extension and the core features of the platform, check this document.
We advise using the core capabilities rather than the extension as they are built to meet the high scalability needs of the Auth0 platform.
hapi
?Due to the SameSite cookie changes in browsers, we needed a version of Hapi that supported the changes. The easiest path forward was to fork Hapi and port the changes needed over, as we are relying on an older version of Hapi that is not receiving the updates required to respect SameSite cookies.
Requires Node 12 - higher versions not yet supported. If you are using nvm
, simply run nvm use
inside the directory to switch to the correct version.
npm ci
.brew install cloudflare/cloudflare/cloudflared
To run the extension, you'll need a file in server/config.json
that specifies how the extension interacts with Auth0. Here is a sample for running the extension with a production tenant:
{
"AUTH0_DOMAIN": "mytenant.auth0.com",
"AUTH0_CLIENT_ID": "qwerty123",
"AUTH0_CLIENT_SECRET": "longer-secret-value",
"EXTENSION_CLIENT_ID": "abcd123",
"EXTENSION_SECRET": "longer-secret-value",
"WT_URL": "http://localhost:3000",
"PUBLIC_WT_URL": "http://localhost:3000",
"AUTH0_RTA": "https://auth0.auth0.com"
}
Copy this config into the file created at server/config.json
and modify the following values:
AUTH0_DOMAIN
option.AUTH0_CLIENT_ID/_SECRET
as well as the EXTENSION_CLIENT_ID/_SECRET
.npm run build
.cloudflared --url http://localhost:3000
server/config.json
and enter the URL provided by Argo Tunnel into the WT_URL
and PUBLIC_WT_URL
options.npm run serve:prod
.You can then open the URL provided by Argo Tunnel to use the extension.
cloudflared --url http://localhost:3001
WT_URL=https://<PROVIDED_BY_CLOUDFLARE>.trycloudflare.com npm run serve:dev
. Replace the URL with the one provided in the previous step. Please note that the development mode works only in Chrome.Run tests with npm test
.