Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

More resilient auth #1

Open
paulberg opened this issue Jun 26, 2019 · 0 comments
Open

More resilient auth #1

paulberg opened this issue Jun 26, 2019 · 0 comments

Comments

@paulberg
Copy link

The authentication here is no longer recommended and the newer Oauth2 recommendations are to use both state and client secrets. I have implemented such an authentication here: https://github.com/holy-order-of-the-lambda-cube/CognitoOauth2S3Website

The differences between the two projects are too divergent for a pull request but the essence of the lambda@edge function is similar and I was able to do a client secret directly from lambda to avoid exposing the secret to the browser.

I can change the licensing if necessary if you would like to adapt my script to include here for a much more secure authentication.

@paulberg paulberg changed the title More resiliant auth More resilient auth Jun 28, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant