This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
terraform { | |
required_providers { | |
auth0 = { | |
source = "auth0/auth0" | |
version = "0.39.0" | |
} | |
} | |
} | |
provider "auth0" { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@startuml | |
title <size:50> Title of your diagram | |
skinparam sequence { | |
ArrowColor DeepSkyBlue | |
ActorBorderColor DeepSkyBlue | |
LifeLineBorderColor blue | |
LifeLineBackgroundColor #A9DCDF | |
ParticipantBorderColor DeepSkyBlue |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* | |
* Purpose of this script: | |
* This login script will be used to generate auth0 tokens in return of AAD id_token generated | |
* for user logged in to their Windows 10 devices. | |
* | |
* Why: | |
* This is similar to native SIWA, that a desktop windows application performs API based request to OS | |
* to authenticate current user, user sees a consent page, and after consent, application receives | |
* id_token of current user’s Azure AD account associated with Windows 11 machine. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function requireMfa(user, context, callback) { | |
// Context object Ref: https://auth0.com/docs/customize/rules/context-object | |
// It only makes sense to prompt for MFA when the user has at least one | |
// enrolled MFA factor. | |
const enforceMfaForOrgs = ['id_org1', 'id_org2']; | |
const shouldPromptMfa = context.organization && context.organization.id && enforceMfaForOrgs.indexOf(context.organization.id) >= 0; | |
const userEnrolledFactors = user.multifactor || []; | |
const canPromptMfa = userEnrolledFactors.length > 0; | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* | |
* NOTE: THIS SCRIPT IS A GUIDE ONLY AND IT IS NOT TESTED IN A PRODUCTION ENVIRONMENT | |
* | |
* HOW: | |
* 1. Azure ROPC (Resource Owner Password Credentials) flow will be used to migrate users from Azure B2C AD to Auth0. | |
* 2. Lazy migration needs to be enable on your Auth0 Database. https://auth0.com/docs/manage-users/user-migration/configure-automatic-migration-from-your-database | |
* | |
* | |
* References: |