Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: Add Single-Sign-On to API documentation #2670

Merged
merged 3 commits into from
Nov 26, 2024

Conversation

chronark
Copy link
Collaborator

@chronark chronark commented Nov 20, 2024

This PR adds the Single-Sign-On.mdx file to the API documentation.

Summary by CodeRabbit

  • Documentation
    • Enhanced clarity and updated terminology in the Single Sign-On (SSO) guide.
    • Revised title and description for conciseness and accuracy.
    • Expanded best practices section with new recommendations on secure protocols and privacy compliance.
    • Updated implementation examples for AWS SSO API and REST API SSO authentication with modern libraries and practices.
    • Refined FAQ section for improved readability and clarity, with new questions added.

Copy link

vercel bot commented Nov 20, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
engineering ✅ Ready (Inspect) Visit Preview 💬 Add feedback Nov 25, 2024 4:41pm
play ✅ Ready (Inspect) Visit Preview 💬 Add feedback Nov 25, 2024 4:41pm
www ✅ Ready (Inspect) Visit Preview 💬 Add feedback Nov 25, 2024 4:41pm
2 Skipped Deployments
Name Status Preview Comments Updated (UTC)
dashboard ⬜️ Ignored (Inspect) Visit Preview Nov 25, 2024 4:41pm
workflows ⬜️ Ignored (Inspect) Visit Preview Nov 25, 2024 4:41pm

Copy link

changeset-bot bot commented Nov 20, 2024

⚠️ No Changeset found

Latest commit: 542cdb2

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

Copy link
Contributor

coderabbitai bot commented Nov 20, 2024

📝 Walkthrough
📝 Walkthrough

Walkthrough

The changes made to the document on Single Sign-On (SSO) focus on improving clarity and updating terminology. Key modifications include rephrasing the title and description, revising key-value pairs in the definition section, and updating the historical context. The usage section has been refined to emphasize SSO's role in user experience, while best practices have been expanded. The FAQ section has been clarified, and implementation examples have been modernized with updated code snippets. Overall, the document has been comprehensively updated to reflect current SSO practices.

Changes

File Path Change Summary
apps/www/content/glossary/single-sign-on.mdx - Title changed from "Single Sign-On API: Comprehensive Guide" to "Single Sign On: API Development Guide".
- Description rephrased for clarity.
- Key-value pairs updated for accuracy, including changes from "Authentication Flow" to "Definition" and "Token-Based" to "Unified Authentication".
- Historical context updated from "Enterprise Single-Sign-On" to "Federated Single Sign On".
- Usage section tags updated and description refined.
- Best practices expanded with new recommendations.
- FAQ section reworded for clarity.
- Implementation examples and code snippets updated for modern practices.

Suggested labels

🕹️ oss.gg, :joystick: 150 points, hacktoberfest

Suggested reviewers

  • mcstepp
  • perkinsjr
  • MichaelUnkey

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

github-actions bot commented Nov 20, 2024

Thank you for following the naming conventions for pull request titles! 🙏

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 5

🧹 Outside diff range and nitpick comments (1)
apps/www/content/glossary/single-sign-on.mdx (1)

2-3: Enhance description clarity for target audience

The current description is somewhat vague. Consider specifying the target audience and their expected takeaways.

-description: Unlock SSO API power. Learn REST API SSO authentication, AWS SSO API implementation. Explore real-world examples.
+description: A comprehensive guide for developers implementing SSO in their applications, covering REST API authentication, AWS SSO integration, and practical implementation examples.
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 039cf73 and 58b8170.

📒 Files selected for processing (1)
  • apps/www/content/glossary/single-sign-on.mdx (1 hunks)

Comment on lines 30 to 32
- Implement strong encryption methods to secure user credentials during the SSO process.
- Ensure the SSO solution complies with privacy regulations and standards.
- Use token-based authentication methods, like OAuth, for secure and efficient SSO implementation.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Expand security best practices

The current best practices section misses critical security considerations.

Add these important security practices:

 - Implement strong encryption methods to secure user credentials during the SSO process.
 - Ensure the SSO solution complies with privacy regulations and standards.
 - Use token-based authentication methods, like OAuth, for secure and efficient SSO implementation.
+- Implement proper session management with secure session timeouts
+- Use HTTPS for all SSO-related communications
+- Implement rate limiting to prevent brute force attacks
+- Maintain detailed audit logs for security monitoring
+- Implement Multi-Factor Authentication (MFA) options
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
- Implement strong encryption methods to secure user credentials during the SSO process.
- Ensure the SSO solution complies with privacy regulations and standards.
- Use token-based authentication methods, like OAuth, for secure and efficient SSO implementation.
- Implement strong encryption methods to secure user credentials during the SSO process.
- Ensure the SSO solution complies with privacy regulations and standards.
- Use token-based authentication methods, like OAuth, for secure and efficient SSO implementation.
- Implement proper session management with secure session timeouts
- Use HTTPS for all SSO-related communications
- Implement rate limiting to prevent brute force attacks
- Maintain detailed audit logs for security monitoring
- Implement Multi-Factor Authentication (MFA) options

Comment on lines 180 to 186
@app.route('/authorize')
def authorize():
token = google.authorize_access_token()
resp = google.get('userinfo')
user_info = resp.json()
# do something with the user_info
return 'Logged in successfully.'
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add error handling and session management to authorization endpoint

The current implementation lacks proper error handling and session management.

 @app.route('/authorize')
 def authorize():
+    try:
         token = google.authorize_access_token()
         resp = google.get('userinfo')
         user_info = resp.json()
-        # do something with the user_info
-        return 'Logged in successfully.'
+        
+        # Validate user_info
+        if not user_info.get('email_verified'):
+            raise ValueError('Email not verified')
+            
+        # Store in session securely
+        session['user'] = {
+            'email': user_info['email'],
+            'name': user_info['name']
+        }
+        
+        return redirect(url_for('dashboard'))
+    except Exception as e:
+        logger.error(f"Authorization failed: {str(e)}")
+        return redirect(url_for('login', error='Authorization failed'))

Committable suggestion skipped: line range outside the PR's diff.

Comment on lines 71 to 76
# Initialize the SSO Client
sso_client = boto3.client('sso', region_name='us-west-2')

# List the available SSO instances
instances = sso_client.list_instances()
print(instances)
# List the available accounts
response = sso_client.list_accounts()
print(response)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Enhance AWS SSO example with error handling and security best practices

The current AWS SSO example lacks essential error handling and security configurations.

Consider updating the example to include:

 # Initialize the SSO Client
-sso_client = boto3.client('sso', region_name='us-west-2')
+session = boto3.Session(
+    region_name='us-west-2',
+    profile_name='sso_user'  # Use named profile for better security
+)
+sso_client = session.client(
+    'sso',
+    config=boto3.Config(
+        retries=dict(max_attempts=3),  # Add retry configuration
+        connect_timeout=5,
+        read_timeout=5
+    )
+)

-# List the available accounts
-response = sso_client.list_accounts()
-print(response)
+try:
+    response = sso_client.list_accounts(
+        MaxResults=100,  # Implement pagination
+        NextToken=None
+    )
+    accounts = response['accountList']
+    while 'NextToken' in response:
+        response = sso_client.list_accounts(
+            MaxResults=100,
+            NextToken=response['NextToken']
+        )
+        accounts.extend(response['accountList'])
+except sso_client.exceptions.UnauthorizedException:
+    logger.error("Authentication failed. Please check your credentials.")
+    raise
+except sso_client.exceptions.TooManyRequestsException:
+    logger.error("Rate limit exceeded. Implement exponential backoff.")
+    raise
+except Exception as e:
+    logger.error(f"Unexpected error: {str(e)}")
+    raise

Committable suggestion skipped: line range outside the PR's diff.

Comment on lines 163 to 173
google = oauth.register(
name='google',
client_id='YOUR_CLIENT_ID',
client_secret='YOUR_CLIENT_SECRET',
access_token_url='https://accounts.google.com/o/oauth2/token',
access_token_params=None,
authorize_url='https://accounts.google.com/o/oauth2/auth',
authorize_params=None,
api_base_url='https://www.googleapis.com/oauth2/v1/',
client_kwargs={'scope': 'openid profile email'},
)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Security: Protect sensitive configuration in Python example

The OAuth configuration contains sensitive information that should not be hardcoded.

Update the example to use environment variables:

 google = oauth.register(
     name='google',
-    client_id='YOUR_CLIENT_ID',
-    client_secret='YOUR_CLIENT_SECRET',
+    client_id=os.getenv('GOOGLE_CLIENT_ID'),
+    client_secret=os.getenv('GOOGLE_CLIENT_SECRET'),
     access_token_url='https://accounts.google.com/o/oauth2/token',
     access_token_params=None,
     authorize_url='https://accounts.google.com/o/oauth2/auth',
     authorize_params=None,
     api_base_url='https://www.googleapis.com/oauth2/v1/',
-    client_kwargs={'scope': 'openid profile email'},
+    client_kwargs={
+        'scope': 'openid profile email',
+        'verify': True  # Enable SSL verification
+    },
 )
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
google = oauth.register(
name='google',
client_id='YOUR_CLIENT_ID',
client_secret='YOUR_CLIENT_SECRET',
access_token_url='https://accounts.google.com/o/oauth2/token',
access_token_params=None,
authorize_url='https://accounts.google.com/o/oauth2/auth',
authorize_params=None,
api_base_url='https://www.googleapis.com/oauth2/v1/',
client_kwargs={'scope': 'openid profile email'},
)
google = oauth.register(
name='google',
client_id=os.getenv('GOOGLE_CLIENT_ID'),
client_secret=os.getenv('GOOGLE_CLIENT_SECRET'),
access_token_url='https://accounts.google.com/o/oauth2/token',
access_token_params=None,
authorize_url='https://accounts.google.com/o/oauth2/auth',
authorize_params=None,
api_base_url='https://www.googleapis.com/oauth2/v1/',
client_kwargs={
'scope': 'openid profile email',
'verify': True # Enable SSL verification
},
)

Comment on lines 91 to 110
app.get('/sso-auth', (req, res) => {
const options = {
method: 'POST',
url: 'https://sso-provider.com/api/token',
headers: {
'Content-Type': 'application/json',
},
body: JSON.stringify({
grant_type: 'password',
username: 'user',
password: 'pass',
}),
};

request(options, (error, response, body) => {
if (error) throw new Error(error);
console.log(body);
res.send('Authentication successful');
});
});
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Security: Remove hardcoded credentials and update dependencies

The current implementation has several security concerns:

  1. Hardcoded credentials in the code
  2. Usage of deprecated 'request' package
  3. Missing input validation

Update the example to use secure practices:

-const request = require('request');
+const axios = require('axios');  // Modern HTTP client
+require('dotenv').config();  // For environment variables

 app.get('/sso-auth', (req, res) => {
-  const options = {
-    method: 'POST',
-    url: 'https://sso-provider.com/api/token',
-    headers: {
-      'Content-Type': 'application/json',
-    },
-    body: JSON.stringify({
-      grant_type: 'password',
-      username: 'user',
-      password: 'pass',
-    }),
-  };
-
-  request(options, (error, response, body) => {
-    if (error) throw new Error(error);
-    console.log(body);
-    res.send('Authentication successful');
-  });
+  try {
+    // Validate input parameters
+    const { username, password } = req.body;
+    if (!username || !password) {
+      return res.status(400).json({ error: 'Missing credentials' });
+    }
+
+    const response = await axios.post(
+      process.env.SSO_PROVIDER_URL,
+      {
+        grant_type: 'password',
+        username,
+        password,
+      },
+      {
+        headers: {
+          'Content-Type': 'application/json',
+          'Authorization': `Basic ${Buffer.from(
+            `${process.env.CLIENT_ID}:${process.env.CLIENT_SECRET}`
+          ).toString('base64')}`,
+        },
+      }
+    );
+
+    // Store token securely
+    req.session.token = response.data.access_token;
+    res.json({ message: 'Authentication successful' });
+  } catch (error) {
+    console.error('Authentication failed:', error);
+    res.status(401).json({ error: 'Authentication failed' });
+  }
});

Committable suggestion skipped: line range outside the PR's diff.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Outside diff range and nitpick comments (1)
apps/www/content/glossary/single-sign-on.mdx (1)

54-54: Consider adding real-world implementation scenarios

While the explanations are clear, the documentation would benefit from including:

  1. Enterprise SSO implementation examples
  2. Multi-tenant SSO scenarios
  3. Microservices authentication patterns

Would you like me to provide examples for these scenarios?

Also applies to: 58-58, 62-62

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 58b8170 and b5b8abb.

📒 Files selected for processing (1)
  • apps/www/content/glossary/single-sign-on.mdx (1 hunks)
🔇 Additional comments (5)
apps/www/content/glossary/single-sign-on.mdx (5)

2-3: LGTM: Title and description improvements

The updated title and description provide better clarity and focus on the essential aspects of SSO API implementation.


30-32: Consider expanding security best practices

While the current best practices are good, they could be enhanced further based on industry standards.

This issue was previously identified in a past review comment. The suggestion to add session management, HTTPS requirement, rate limiting, audit logging, and MFA options is still valid.


71-76: Enhance AWS SSO example with security best practices

The current implementation lacks error handling and security configurations.

This issue was previously identified in a past review comment. The suggestion to add retry configuration, proper error handling, pagination, and logging is still valid.


163-173: Security: Move sensitive configuration to environment variables

The OAuth configuration contains hardcoded credentials which is a security risk.

This issue was previously identified in a past review comment. The suggestion to use environment variables and enable SSL verification is still valid.


180-186: Add error handling and session management to authorization endpoint

The current implementation lacks proper error handling and session management.

This issue was previously identified in a past review comment. The suggestion to add proper error handling, email verification, and secure session management is still valid.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Outside diff range and nitpick comments (3)
apps/www/content/glossary/single-sign-on.mdx (3)

5-5: Add relevant categories for better discoverability

The categories array is empty. Consider adding relevant categories such as "Authentication", "Security", "API Development" to improve document discoverability.


76-89: Add type hints and docstring to improve code documentation

The AWS Cognito example would benefit from better documentation and type hints.

 # Initialize a Cognito Identity Provider client
-client = boto3.client('cognito-idp')
+from typing import Dict, Any
+
+def authenticate_user(username: str, password: str) -> Dict[str, Any]:
+    """
+    Authenticate a user using AWS Cognito User Pool.
+    
+    Args:
+        username (str): The username to authenticate
+        password (str): The user's password
+        
+    Returns:
+        Dict[str, Any]: The authentication response from Cognito
+    """
+    client = boto3.client('cognito-idp')
+    return client.initiate_auth(
+        ClientId='CLIENT_ID',
+        AuthFlow='USER_SRP_AUTH',
+        AuthParameters={
+            'USERNAME': username,
+            'PASSWORD': password
+        }
+    )

-response = client.initiate_auth(
-    ClientId='CLIENT_ID',
-    AuthFlow='USER_SRP_AUTH',
-    AuthParameters={
-        'USERNAME': 'example_username',
-        'PASSWORD': 'example_password'
-    }
-)
-
-print(response)
+# Example usage
+response = authenticate_user('example_username', 'example_password')
+print(response)

146-157: Add type hints and proper return types

The Flask routes would benefit from type hints and proper return types.

+from flask import Response, jsonify
+from typing import Dict, Any

 @app.route('/login')
-def login():
+def login() -> Response:
     redirect_uri = url_for('authorize', _external=True)
     return google.authorize_redirect(redirect_uri)

 @app.route('/authorize')
-def authorize():
+def authorize() -> Response:
     token = google.authorize_access_token()
     resp = google.get('userinfo')
     user_info = resp.json()
-    # Use user_info for your application logic
-    return user_info
+    return jsonify(user_info)
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between b5b8abb and 542cdb2.

📒 Files selected for processing (1)
  • apps/www/content/glossary/single-sign-on.mdx (1 hunks)
🔇 Additional comments (2)
apps/www/content/glossary/single-sign-on.mdx (2)

54-67: Well-structured and accurate conceptual explanation

The conceptual explanation of SSO is clear, accurate, and well-structured. It effectively covers the key concepts and benefits.


165-167: Clear and effective conclusion

The conclusion effectively summarizes the key points about SSO implementation and its benefits.

Comment on lines +102 to +116
async function ssoLogin() {
const googleIssuer = await Issuer.discover('https://accounts.google.com');
const client = new googleIssuer.Client({
client_id: 'YOUR_CLIENT_ID',
client_secret: 'YOUR_CLIENT_SECRET',
redirect_uris: ['http://localhost/callback'],
response_types: ['code'],
});

const authorizationUrl = client.authorizationUrl({
scope: 'openid email profile',
});

console.log('Visit this URL to log in:', authorizationUrl);
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add error handling and TypeScript support

The JavaScript example needs proper error handling and could benefit from TypeScript types.

+interface OAuthConfig {
+  client_id: string;
+  client_secret: string;
+  redirect_uris: string[];
+  response_types: string[];
+}

-async function ssoLogin() {
+async function ssoLogin(): Promise<string> {
+  try {
     const googleIssuer = await Issuer.discover('https://accounts.google.com');
     const client = new googleIssuer.Client({
       client_id: 'YOUR_CLIENT_ID',
       client_secret: 'YOUR_CLIENT_SECRET',
       redirect_uris: ['http://localhost/callback'],
       response_types: ['code'],
-    });
+    } as OAuthConfig);

     const authorizationUrl = client.authorizationUrl({
       scope: 'openid email profile',
     });

-    console.log('Visit this URL to log in:', authorizationUrl);
+    return authorizationUrl;
+  } catch (error) {
+    console.error('Failed to initialize SSO:', error);
+    throw new Error('SSO initialization failed');
+  }
 }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
async function ssoLogin() {
const googleIssuer = await Issuer.discover('https://accounts.google.com');
const client = new googleIssuer.Client({
client_id: 'YOUR_CLIENT_ID',
client_secret: 'YOUR_CLIENT_SECRET',
redirect_uris: ['http://localhost/callback'],
response_types: ['code'],
});
const authorizationUrl = client.authorizationUrl({
scope: 'openid email profile',
});
console.log('Visit this URL to log in:', authorizationUrl);
}
interface OAuthConfig {
client_id: string;
client_secret: string;
redirect_uris: string[];
response_types: string[];
}
async function ssoLogin(): Promise<string> {
try {
const googleIssuer = await Issuer.discover('https://accounts.google.com');
const client = new googleIssuer.Client({
client_id: 'YOUR_CLIENT_ID',
client_secret: 'YOUR_CLIENT_SECRET',
redirect_uris: ['http://localhost/callback'],
response_types: ['code'],
} as OAuthConfig);
const authorizationUrl = client.authorizationUrl({
scope: 'openid email profile',
});
return authorizationUrl;
} catch (error) {
console.error('Failed to initialize SSO:', error);
throw new Error('SSO initialization failed');
}
}

@perkinsjr perkinsjr changed the title Add Single-Sign-On to API documentation chore: Add Single-Sign-On to API documentation Nov 25, 2024
@chronark chronark merged commit 4461210 into main Nov 26, 2024
27 of 29 checks passed
@chronark chronark deleted the richard/add-single-sign-on branch November 26, 2024 08:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant