Skip to main content

connection

Auth 0 Connection component. Auth0 is a third-party service that provides authentication and authorization as a service. It is typically used to to authenticate users.

An Auth0 connection is a bridge between Auth0 and an identity provider (IdP) that allows your application to authenticate users. Auth0 supports many types of connections, including social identity providers such as Google, Facebook, and Twitter, enterprise identity providers such as Microsoft Azure AD, and passwordless authentication methods such as email and SMS.

Usage

Before deploying this component, you need to deploy the auth0/tenant component. This components with authenticate with the Auth0 Terraform provider using the Auth0 tenant's client ID and client secret configured with the auth0/tenant component.

Stack Level: Global

Here's an example snippet for how to use this component.

# stacks/catalog/auth0/connection.yaml
components:
terraform:
auth0/connection:
vars:
enabled: true
name: "auth0"

# These must all be specified for the connection to be created
strategy: "email"
connection_name: "email"
options_name: "email"

email_from: "{{`{{ application.name }}`}} <[email protected]>"
email_subject: "Welcome to {{`{{ application.name }}`}}"
syntax: "liquid"

auth_params:
scope: "openid profile"
response_type: "code"

totp:
time_step: 895
length: 6

template_file: "templates/email.html"

# Stage-specific configuration
auth0_app_connections:
- stage: sandbox
- stage: dev
- stage: staging

Requirements

NameVersion
terraform>= 1.0.0
auth0>= 1.0.0
aws>= 4.9.0

Providers

NameVersion
auth0>= 1.0.0
aws.auth0_provider>= 4.9.0

Modules

NameSourceVersion
auth0_appscloudposse/stack-config/yaml//modules/remote-state1.5.0
auth0_tenantcloudposse/stack-config/yaml//modules/remote-state1.5.0
iam_roles../../account-map/modules/iam-rolesn/a
iam_roles_auth0_provider../../account-map/modules/iam-rolesn/a
thiscloudposse/label/null0.25.0

Resources

NameType
auth0_connection.thisresource
auth0_connection_clients.thisresource
aws_ssm_parameter.auth0_client_iddata source
aws_ssm_parameter.auth0_client_secretdata source
aws_ssm_parameter.auth0_domaindata source

Inputs

NameDescriptionTypeDefaultRequired
additional_tag_mapAdditional key-value pairs to add to each map in tags_as_list_of_maps. Not added to tags or id.
This is for some rare cases where resources want additional configuration of tags
and therefore take a list of maps with tag key, value, and additional configuration.
map(string){}no
attributesID element. Additional attributes (e.g. workers or cluster) to add to id,
in the order they appear in the list. New attributes are appended to the
end of the list. The elements of the list are joined by the delimiter
and treated as a single ID element.
list(string)[]no
auth0_app_connectionsThe list of Auth0 apps to add to this connection
list(object({
component = optional(string, "auth0/app")
environment = optional(string, "")
stage = optional(string, "")
tenant = optional(string, "")
}))
[]no
auth0_debugEnable debug mode for the Auth0 providerbooltrueno
auth0_tenant_component_nameThe name of the componentstring"auth0/tenant"no
auth0_tenant_environment_nameThe name of the environment where the Auth0 tenant component is deployed. Defaults to the environment of the current stack.string""no
auth0_tenant_stage_nameThe name of the stage where the Auth0 tenant component is deployed. Defaults to the stage of the current stack.string""no
auth0_tenant_tenant_nameThe name of the tenant where the Auth0 tenant component is deployed. Yes this is a bit redundant, since Auth0 also calls this resource a tenant. Defaults to the tenant of the current stack.string""no
auth_paramsQuery string parameters to be included as part of the generated passwordless email link.
object({
scope = optional(string, null)
response_type = optional(string, null)
})
{}no
brute_force_protectionIndicates whether to enable brute force protection, which will limit the number of signups and failed logins from a suspicious IP address.booltrueno
connection_nameThe name of the connectionstring""no
contextSingle object for setting entire context at once.
See description of individual variables for details.
Leave string and numeric variables as null to use default value.
Individual variable settings (non-null) override settings in context object,
except for attributes, tags, and additional_tag_map, which are merged.
any
{
"additional_tag_map": {},
"attributes": [],
"delimiter": null,
"descriptor_formats": {},
"enabled": true,
"environment": null,
"id_length_limit": null,
"label_key_case": null,
"label_order": [],
"label_value_case": null,
"labels_as_tags": [
"unset"
],
"name": null,
"namespace": null,
"regex_replace_chars": null,
"stage": null,
"tags": {},
"tenant": null
}
no
delimiterDelimiter to be used between ID elements.
Defaults to - (hyphen). Set to "" to use no delimiter at all.
stringnullno
descriptor_formatsDescribe additional descriptors to be output in the descriptors output map.
Map of maps. Keys are names of descriptors. Values are maps of the form
{<br/> format = string<br/> labels = list(string)<br/>}
(Type is any so the map values can later be enhanced to provide additional options.)
format is a Terraform format string to be passed to the format() function.
labels is a list of labels, in order, to pass to format() function.
Label values will be normalized before being passed to format() so they will be
identical to how they appear in id.
Default is {} (descriptors output will be empty).
any{}no
disable_signupIndicates whether to allow user sign-ups to your application.boolfalseno
email_fromWhen using an email strategy, the address to use as the senderstringnullno
email_subjectWhen using an email strategy, the subject of the emailstringnullno
enabledSet to false to prevent the module from creating any resourcesboolnullno
environmentID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT'stringnullno
id_length_limitLimit id to this many characters (minimum 6).
Set to 0 for unlimited length.
Set to null for keep the existing setting, which defaults to 0.
Does not affect id_full.
numbernullno
label_key_caseControls the letter case of the tags keys (label names) for tags generated by this module.
Does not affect keys of tags passed in via the tags input.
Possible values: lower, title, upper.
Default value: title.
stringnullno
label_orderThe order in which the labels (ID elements) appear in the id.
Defaults to ["namespace", "environment", "stage", "name", "attributes"].
You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present.
list(string)nullno
label_value_caseControls the letter case of ID elements (labels) as included in id,
set as tag values, and output by this module individually.
Does not affect values of tags passed in via the tags input.
Possible values: lower, title, upper and none (no transformation).
Set this to title and set delimiter to "" to yield Pascal Case IDs.
Default value: lower.
stringnullno
labels_as_tagsSet of labels (ID elements) to include as tags in the tags output.
Default is to include all labels.
Tags with empty values will not be included in the tags output.
Set to [] to suppress all generated tags.
Notes:
The value of the name tag, if included, will be the id, not the name.
Unlike other null-label inputs, the initial setting of labels_as_tags cannot be
changed in later chained modules. Attempts to change it will be silently ignored.
set(string)
[
"default"
]
no
nameID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a tag.
The "name" tag is set to the full id string. There is no tag with the value of the name input.
stringnullno
namespaceID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally uniquestringnullno
non_persistent_attrsIf there are user fields that should not be stored in Auth0 databases due to privacy reasons, you can add them to the DenyList here.list(string)[]no
options_nameThe name of the connection options. Required for the email strategy.string""no
regex_replace_charsTerraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set, "/[^a-zA-Z0-9-]/" is used to remove all characters other than hyphens, letters and digits.
stringnullno
regionAWS Regionstringn/ayes
set_user_root_attributesDetermines whether to sync user profile attributes at each login or only on the first login. Options include: on_each_login, on_first_login.stringnullno
stageID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release'stringnullno
strategyThe strategy to use for the connectionstring"auth0"no
syntaxThe syntax of the template bodystringnullno
tagsAdditional tags (e.g. {'BusinessUnit': 'XYZ'}).
Neither the tag keys nor the tag values will be modified by this module.
map(string){}no
templateThe template to use for the connection. If not provided, the template_file variable must be set.string""no
template_fileThe path to the template file. If not provided, the template variable must be set.string""no
tenantID element _(Rarely used, not included by default)_. A customer identifier, indicating who this instance of a resource is forstringnullno
totpThe TOTP settings for the connection
object({
time_step = optional(number, 900)
length = optional(number, 6)
})
{}no

Outputs

NameDescription
auth0_connection_idThe Auth0 Connection ID

References