Skip to content

Instantly share code, notes, and snippets.

function (user, context, callback) {
var ManagementClient = require("[email protected]").ManagementClient;
var mgt = new ManagementClient({
domain: "{auth0 domain}",
clientId: "{client ID}",
clientSecret: "{Client secret}",
audience: "https://{auth0 domain}/api/v2/"
});
// check every 15 minutes if the SSO session is still active
setInterval(function() {
// if the token is not in local storage, there is nothing to check (that is, the user is already logged out)
if (!localStorage.getItem('userToken')) return;
auth0.checkSession(function (err, data) {
if (err) {
// if we get here, it means there is no session on Auth0,
// then remove the token and redirect to #login
localStorage.removeItem('userToken');
window.location.href = '#login';
const express = require('express');
const path = require('path');
const favicon = require('serve-favicon');
const logger = require('morgan');
const cookieParser = require('cookie-parser');
const bodyParser = require('body-parser');
const session = require('express-session');
const dotenv = require('dotenv');
const passport = require('passport');
const Auth0Strategy = require('passport-auth0');
Auth0 Node 4 to 8 migration guide
function (user, context, callback) {
user.user_metadata = user.user_metadata || {};
var audience = '';
audience = audience ||
(context.request && context.request.query && context.request.query.audience) ||
(context.request && context.request.body && context.request.body.audience);
if (audience === '[API identifier]') {
user.user_metadata.apis = audience;
tenant:
device_flow:
mask: '***-***-***-***'
charset: digits
flags:
enable_dynamic_client_registration: false
enable_custom_domain_in_emails: false
allow_legacy_delegation_grant_types: false
allow_legacy_ro_grant_types: false
allow_other_legacy_grant_types: false
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>Sign In with Auth0</title>
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1, user-scalable=0" />
</head>
<body>
@Tanver-Hasan
Tanver-Hasan / gist:939276926bade328ef177762eebe8535
Last active November 13, 2020 16:57
SLACK OIDC connection with v2 Oauth2.0 API
@Tanver-Hasan
Tanver-Hasan / SAML.template
Created December 4, 2020 15:58 — forked from saltukalakus/SAML.template
How to insert AssertionConsumerServiceURL (ACS) in AuthN when Auth0 is the SAML service provider. (a.k.a. SAML enterprise connection)
<samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
@@AssertServiceURLAndDestination@@
AssertionConsumerServiceURL="https://demo-saml-sp.auth0.com/login/callback"
ID="@@ID@@"
IssueInstant="@@IssueInstant@@"
ProtocolBinding="@@ProtocolBinding@@" Version="2.0">
<saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">@@Issuer@@</saml:Issuer>
</samlp:AuthnRequest>
#!/bin/bash
#Step 1:
sudo apt-get install testdisk -y
sudo sed -Ei 's/^# deb-src /deb-src /' /etc/apt/sources.list
sudo apt-get update -y
sudo apt-get install build-essential autoconf libtool git-core -y