This extension provides authorization features for Auth0 focused on RBAC and user group management.
The Authorization Extension is in maintenance mode. We do not plan on adding new features to the extension as we are working to bring features of the extension into the core Auth0 platform. Bug fixes and security patches will still be made.
We provide documentation on how to install and use the Authorization Extension on the Auth0 docs website.
We have RBAC available in Auth0 as a core feature of the platform, rather than requiring the use of this extension.
For a detailed summary of the differences between this extension and the core features of the platform, check this document.
We advise using the core capabilities rather than the extension as they are built to meet the high scalability needs of the Auth0 platform.
Due to the SameSite cookie changes in browsers, we needed a version of Hapi that supported the changes. The easiest path forward was to fork Hapi and port the changes needed over, as we are relying on an older version of Hapi that is not receiving the updates required to respect SameSite cookies.
Requires Node 12 - higher versions not yet supported. If you are using nvm
, simply run nvm use
inside the directory to switch to the correct version.
- Clone this repo.
- Run
npm ci
. - Get Argo Tunnel:
brew install cloudflare/cloudflare/cloudflared
To run the extension, you'll need a file in server/config.json
that specifies how the extension interacts with Auth0. Here is a sample for running the extension with a production tenant:
{
"AUTH0_DOMAIN": "mytenant.auth0.com",
"AUTH0_CLIENT_ID": "qwerty123",
"AUTH0_CLIENT_SECRET": "longer-secret-value",
"EXTENSION_CLIENT_ID": "abcd123",
"EXTENSION_SECRET": "longer-secret-value",
"WT_URL": "http://localhost:3000",
"PUBLIC_WT_URL": "http://localhost:3000",
"AUTH0_RTA": "https://auth0.auth0.com"
}
Copy this config into the file created at server/config.json
and modify the following values:
- Set your tenant name in the
AUTH0_DOMAIN
option. - Create a client in that tenant. This client should be an SPA (Single Page App).
- Enter the client ID and client secret as both the
AUTH0_CLIENT_ID/_SECRET
as well as theEXTENSION_CLIENT_ID/_SECRET
.
- Build the client:
npm run build
. - Start an Argo proxy via:
cloudflared --url http://localhost:3000
- Open
server/config.json
and enter the URL provided by Argo Tunnel into theWT_URL
andPUBLIC_WT_URL
options. - In another terminal, start the server in production mode with
npm run serve:prod
.
You can then open the URL provided by Argo Tunnel to use the extension.
- Start an Argo proxy via:
cloudflared --url http://localhost:3001
- In another terminal, run
WT_URL=https://<PROVIDED_BY_CLOUDFLARE>.trycloudflare.com npm run serve:dev
. Replace the URL with the one provided in the previous step. Please note that the development mode works only in Chrome.
Run tests with npm test
.