Skip to content
This repository has been archived by the owner on Feb 11, 2023. It is now read-only.

Commit

Permalink
Replace ampersand
Browse files Browse the repository at this point in the history
  • Loading branch information
payton authored Feb 7, 2018
1 parent 186c5bc commit 1400d6f
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Session duration is defined as the number of seconds that JWT is valid for. Afte
1. Execute `make` in the downloaded directory. NPM will run to download dependencies and a RSA key will be generated.
1. Choose `Github` as the authorization method and enter the values for Client ID, Client Secret, Redirect URI, Session Duration and Organization
- cloudfront-auth will check that users are a member of the entered Organization.
1. Upload the resulting `cloudfront-auth.zip` file using the AWS Lambda console and jump to the [configuration step](#configure-lambda-&-cloudfront)
1. Upload the resulting `cloudfront-auth.zip` file using the AWS Lambda console and jump to the [configuration step](#configure-lambda-and-cloudfront)

#### Login using Google

Expand All @@ -36,7 +36,7 @@ Session duration is defined as the number of seconds that JWT is valid for. Afte
1. Enter your JSON Email Lookup URL (example below) that consists of a single JSON array of emails to search through
1. Google Groups Lookup
1. [Use Google Groups to authorize users](https://github.com/Widen/cloudfront-auth/wiki/Google-Groups-Setup)
1. Upload the resulting `cloudfront-auth.zip` file using the AWS Lambda console and jump to the [configuration step](#configure-lambda-&-cloudfront)
1. Upload the resulting `cloudfront-auth.zip` file using the AWS Lambda console and jump to the [configuration step](#configure-lambda-and-cloudfront)

#### Login using Microsoft Azure

Expand All @@ -47,9 +47,9 @@ Session duration is defined as the number of seconds that JWT is valid for. Afte
1. Above where you selected `Keys`, go to `Reply URLs` and enter your Cloudfront hostname with your preferred path value for the authorization callback. Example: https://my-cloudfront-site.example.com/_callback
1. Execute `make` in the downloaded directory. NPM will run to download dependencies and a RSA key will be generated.
1. Choose `Microsoft` as the authorization method and enter the values for [Tenant](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-howto-tenant), Client ID (*Application ID*), Client Secret (*previously created key*), Redirect URI and Session Duration
1. Upload the resulting `cloudfront-auth.zip` file using the AWS Lambda console and jump to the [configuration step](#configure-lambda-&-cloudfront)
1. Upload the resulting `cloudfront-auth.zip` file using the AWS Lambda console and jump to the [configuration step](#configure-lambda-and-cloudfront)

### Configure Lambda & CloudFront
### Configure Lambda and CloudFront

1. Upload __cloudfront-auth.zip__ to Lambda using the [AWS Console](https://console.aws.amazon.com/lambda/home):
1. Choose _Create function_
Expand Down

0 comments on commit 1400d6f

Please sign in to comment.