Skip to content

fabiograsso/expense-fga-demo

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

About this Project

This application demonstrates user authentication and fine grained authorization:

Authentication

  • Logging in to Auth0 using Redirect Mode
  • Accessing profile information that has been provided in the ID token

Authorization

  • Gated content. The /profile route is not accessible without having first logged in
  • Fine Grained Authentication. User's can only approve expense reports for their subordinates

What is Auth0?

Auth0 helps you to:

  • Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, among others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
  • Add authentication through more traditional username/password databases.
  • Add support for linking different user accounts with the same user.
  • Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
  • Analytics of how, when and where users are logging in.
  • Pull data from other sources and add it to the user profile, through JavaScript rules.

Create a Free Auth0 Account

  1. Go to Auth0 and click Sign Up.
  2. Use Google, GitHub or Microsoft Account to login.

What is Okta Fine Grained Authentication?

Fine Grained Authorization (FGA) is Okta's Fine-Grained Authorization at scale SaaS based on Google's Zanzibar. As of this writing (Feb 2024), it is currently under development. It is designed to make it easy for application builders to easily add fine-grained authorization to their apps. It offers an HTTP API and has SDKs for programming languages like Node.js/JavaScript and GoLang. More languages and also policy languages like Rego are planned for the future. It is optimized for reliability and low latency at a high scale. For latency and compliance reasons we’ll have environments per jurisdiction (e.g. US, EU, AU) and also global clusters for applications that have a global user base.

Installation

npm install

Configuration

VITE_AUTH0_TENANT_DOMAIN=<the domain of your auth0 tenant or your custom domain if there is one>
VITE_AUTH0_CLIENT_ID=<the client_id of the front end app registered in Auth0>
VITE_API_AUDIENCE=<the audience of your api as registered in Auth0>
VITE_API_BASEURL=<>

Compiles and hot-reloads for development

npm run serve

Environment Variables

To run this project, you will need to add the following environment variables to your .env file

API_KEY

ANOTHER_API_KEY

Authors

License

This project is licensed under the MIT license. See the MIT file for more info.

Issue Reporting

If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.

Acknowledgements

About

An application for demonstrating the Auth0 FGA product

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages

  • Vue 45.0%
  • TypeScript 36.3%
  • CSS 9.5%
  • JavaScript 8.6%
  • HTML 0.6%