Skip to content

Identity and Access Management (IdAM) Hosted pages - containing all the pages and blank configuration templates deployed to Auth0

License

Notifications You must be signed in to change notification settings

nice-digital/identity-hostedpages

Repository files navigation

Nice Identity and Access Management (IdAM) Hosted Pages

Contains the login/register/password reset etc pages deployed to Auth0. Also contains the email templates users recieve to verify their email address, to reset their password, if their account has been blocked, and if their account has been compromised. Also blank templates for the configuration of the Auth0 tenants. The actual configuration values are inserted dynamically on deployment via Octopus deploy.

Table of contents

What is it?

Pages

This repo contains a react app, created using create-react-app. It's located in the folder: /custom-pages/universal-login

That react app, builds a login page, password reset page and error page, to the location /custom-pages/pages

The whole custom-pages directory is then deployed to the Auth0 tenant.

Emails

This repo contains email templates. They are located in the folder /custom-pages/emails

You can run npm start in the emails folder to generate the emails as html files with inline css. These get built inside the emails folder but are not tracked. If you want to make changes, change the template or styles files in the src folder, not the built files.

The version of node for the emails is purposefully lower than that for the pages, as it needs to work with gulp. The versions are pinned with volta so you don't need to worry about setting them yourself, and the build steps in team city reflect this.

Other stuff

All the other files in this repo are mostly blank configuration templates deployed to Auth0 to configure the tenants. The secure configuration values are stored in Octopus Deploy and are inserted at deployment time.

Action Secret Substitution and Transformation

If the octo deployment is being created from scratch, you will need to create a step template set up called TransformActionSecrets. The scripts in their basic state will error if Auth0 tries to import them.

Each action will have two steps associated with it. One for substituting the secrets and one for transforming them.

  • The substitution is done using a standard script which comes with octo called "Variables - Substitute in Json file".
  • The transformation is done using a custom step template, the code for which is stored in the octo-step-scripts folder.

Stack

About

Identity and Access Management (IdAM) Hosted pages - containing all the pages and blank configuration templates deployed to Auth0

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published