This sample demonstrates a simple self service app which utelizes management API to add a Enterprise Connection to your tenant. This sample currently supports SAML and OIDC as connection strategy.
This is build upon this sample app Express Quickstart.
To run this sample you need a M2M Application with the create:connections
and delete:connections
scope against the Auth0 Management API.
- Install the dependencies with npm:
npm install
- Rename
.env.example
to.env
and replace or check the following values.
⚠️ Note: If you downloaded this sample app directly from Auth0 Manage Dashboard, or from Auth0 Docs and you chose the Auth0 application you're creating this sample for, then you can check these are configured already:
CLIENT_ID
- your Auth0 application client idISSUER_BASE_URL
- absolute URL to your Auth0 application domain (ie:https://accountName.auth0.com
)MANAGEMENT_DOMAIN
- your Auth0 domain the management client connects againstMANAGEMENT_CLIENT_ID
- your Auth0 application client id with permissions against the Management APIMANAGEMENT_CLIENT_SECRET
- your Auth0 application client secretMANAGEMENT_SELF_SERVICE_CLIENT_ID
- your Auth0 application client id on which the created connections will be initially enabledMANAGEMENT_TESTER_CLIENT_ID
- your Auth0 application client id to test the connections. To locate this use Management API Get Clients and look for the Client "All Applications" (this one is used to test your connection after creating it)
mv .env.example .env
- Run the sample app:
npm start
The sample app will be served at localhost:3000
.
Please use the Issues queue in this repo for questions and feedback.
Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
Auth0 helps you to easily:
- implement authentication with multiple identity providers, including social (e.g., Google, Facebook, Microsoft, LinkedIn, GitHub, Twitter, etc), or enterprise (e.g., Windows Azure AD, Google Apps, Active Directory, ADFS, SAML, etc.)
- log in users with username/password databases, passwordless, or multi-factor authentication
- link multiple user accounts together
- generate signed JSON Web Tokens to authorize your API calls and flow the user identity securely
- access demographics and analytics detailing how, when, and where users are logging in
- enrich user profiles from other data sources using customizable JavaScript rules
This project is licensed under the MIT license. See the LICENSE file for more info.