/api-gateway-auth

Primary LanguageJavaMIT No AttributionMIT-0

api-gateway-auth

Feature request | Detailed blog post

This sample application showcases how to set up and automate different types of authentication supported by Amazon API Gateway HTTP API via AWS SAM

This SAM app uses java as language runtime for the lambda functions and custom resources.

Setup

All authentications methods including mTLS:

The main SAM template-all-auth.yaml is used to set up HTTP API and different types of auth mentioned above. As a pre requisite step, in order to configure JWT authorizer, you will need to run template-cognito.yaml to setup Amazon Cognito as the JWT token provider. If you wish to have and HTTP API setup with only mTLS, follow section [Only mTLS with HTTP API setup](#Only mTLS with HTTP API setup). Lets begin.

Setup JWT Token provider

This will end up creating cognito user pool which we will use to set up our HTTP API with different auths. This is needed because we will use Amazon Cognito as the JWT token provider. You can skip this step if you are not going to configure JWT Authorizer for your HTTP API in template-all-auth.yaml

    api-gateway-auth$ sam build -t template-cognito.yaml
    api-gateway-auth$ sam deploy -t .aws-sam/build/template.yaml -g

    Deploying with following values
    ===============================
    Stack name                 : jwt-auth
    Region                     : eu-west-1
    Confirm changeset          : False
    Deployment s3 bucket       : aws-sam-cli-managed-default-samclisourcebucket-randomhash
    Capabilities               : ["CAPABILITY_IAM"]
    Parameter overrides        : {'AppName': 'jwt-auth', 'ClientDomains': 'http://localhost:8080', 'AdminEmail': 'emailaddress@example.com', 'AddGroupsToScopes': 'true'}

Set up HTTP API

    api-gateway-auth$ sam build -t template-all-auth.yaml
    api-gateway-auth$ sam deploy -t .aws-sam/build/template.yaml

    Deploying with following values
    ===============================
    Stack name                 : http-api-authdemo
    Region                     : eu-west-1
    Confirm changeset          : False
    Deployment s3 bucket       : aws-sam-cli-managed-default-samclisourcebucket-randomhash
    Capabilities               : ["CAPABILITY_IAM"]
    Parameter overrides        : {'UserPoolId': 'from previous stack output', 'Audience': 'from previous stack output', 'HostedZoneId': 'Hosted zone id for custom domain', 'DomainName': 'domain name for the http api', 'TruststoreKey': 'truststore.pem'}

Only mTLS with HTTP API setup

Set up HTTP API

    api-gateway-auth$ sam build
    api-gateway-auth$ sam deploy -t

    Deploying with following values
    ===============================
    Stack name                 : http-api-authdemo
    Region                     : eu-west-1
    Confirm changeset          : False
    Deployment s3 bucket       : aws-sam-cli-managed-default-samclisourcebucket-randomhash
    Capabilities               : ["CAPABILITY_IAM"]
    Parameter overrides        : {'HostedZoneId': 'Hosted zone id for custom domain', 'DomainName': 'domain name for the http api', 'TruststoreKey': 'truststore.pem'}

Testing and validation

At this point, your stack should update successfully and you will have a HTTP API with Mutual TLS setup by default using AWS Certificate Manager Private Certificate Authority.

Stack will also generate one of the client certificates for you to validate the API and output its ARN as stack output

####Export certificate via Console:

  • Navigate to AWS Certificate Manager console. You will find a private certificate already generated with Name as ClientOneCert.

  • Select the cert and under action choose Export (Private certificates only). Enter passphrase on next screen which will be needed to decrypt the Certificate private key later.

  • Export certificate body to a file and Export certificate private key to a file

Export certificate via CLI:

aws acm export-certificate --certificate-arn <<Certificat ARN from stack output>> --passphrase $(echo -n 'your paraphrase' | base64) --no-cli-auto-prompt --region eu-west-1 | jq -r '"\(.Certificate)"' > client.pem
aws acm export-certificate --certificate-arn <<Certificat ARN from stack output>> --passphrase $(echo -n 'your paraphrase' | base64) --no-cli-auto-prompt --region eu-west-1 | jq -r '"\(.PrivateKey)"' > client.encrypted.key

Decrypt the private key

  • Decrypt private key downloaded using below command:
    openssl rsa -in <<Encrypted file>> -out client.decrypted.key

    Enter pass phrase for client.encrypted.txt:
    writing RSA key

Call the HTTP API to validate mTLS

  • Now you should be able to access the configured api with different paths and auth methods using mutual TLS.
    curl -v --cert client.pem  --key client.decrypted.key https://<<api-auth-demo.domain.com>>

Auth0 setup for REST and HTTP API

API gateway both REST and HTTP can be configured to work with Auth0. There is a sample template template-auth0.yaml which sets up sample REST and HTTP Api to work with Auth0.

Template expects two parameters:

  • IssuerUrl: The issuer of the token. Use https://YOUR_DOMAIN/. Be sure to include the trailing slash.
  • APIAudience: The identifier value of the API you created in the Auth0 API.

HTTP API will be set up using native JWT Authorizers while REST API will be set up using Token based Lambda Authorizers to integrate with Auth0.

Setup

    api-gateway-auth$ sam build -t template-auth0.yaml
    api-gateway-auth$ sam deploy -t .aws-sam/build/template.yaml

Credits

Setting up of JWT authorizer is inspired from example in sessions-with-aws-sam

Security

See CONTRIBUTING for more information.

License

This library is licensed under the MIT-0 License. See the LICENSE file.