Skip to content
This repository has been archived by the owner on Feb 11, 2023. It is now read-only.

Commit

Permalink
Add Microsoft AuthN methods
Browse files Browse the repository at this point in the history
  • Loading branch information
payton authored Feb 7, 2018
1 parent f8ba023 commit c372515
Showing 1 changed file with 4 additions and 0 deletions.
4 changes: 4 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,10 @@ Session duration is defined as the number of seconds that JWT is valid for. Afte
1. Above where you selected `Keys`, go to `Reply URLs` and enter your Cloudfront hostname with your preferred path value for the authorization callback. Example: https://my-cloudfront-site.example.com/_callback
1. Execute `make` in the downloaded directory. NPM will run to download dependencies and a RSA key will be generated.
1. Choose `Microsoft` as the authorization method and enter the values for [Tenant](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-howto-tenant), Client ID (*Application ID*), Client Secret (*previously created key*), Redirect URI and Session Duration
1. Select the preferred authentication method
1. Azure AD Membership (default)
1. JSON Username Lookup
1. Enter your JSON Username Lookup URL (example below) that consists of a single JSON array of usernames to search through
1. Upload the resulting `cloudfront-auth.zip` file using the AWS Lambda console and jump to the [configuration step](#configure-lambda-and-cloudfront)

### Configure Lambda and CloudFront
Expand Down

0 comments on commit c372515

Please sign in to comment.