FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login
    1. Home
    2. matth
    M
    • Profile
    • Following 0
    • Followers 0
    • Topics 4
    • Posts 7
    • Best 3
    • Controversial 0
    • Groups 0

    matth

    @matth

    3
    Reputation
    1
    Profile views
    7
    Posts
    0
    Followers
    0
    Following
    Joined Last Online
    Location Colorado

    matth Unfollow Follow

    Best posts made by matth

    • Setting up a FusionAuth ODIC identity provider with Amazon Cognito

      I followed these steps to configure a FusionAuth OIDC identity provider to enable Amazon Cognito third-party login:

      Cognito Steps:

      • Choose your desired region (top right)
      • Review default settings if needed
      • Click "Manage User Pools"
      • Click "Create a user pool" or select the desired pool
      • Navigate to "Users and groups"
      • Click "Create User: if none exist (phone number format: +3035553322)
      • Navigate to "App clients"
      • Click "Add an app client"
      • Add the app client name and click "Create app client"
      • Click "Show details" for desired app client to show client id and client secret
      • Navigate to "App client settings"
      • Select user pools to enable
      • Add callback URL(s)
      • Under Allowed OAuth Flows enable "Authorization code grant"
      • Under Allowed OAuth Scopes enable openid
      • Navigate to "Domain name"
      • Add custom domain if desired

      FusionAuth Steps:

      • Navigate to "Settings"
      • Navigate to "Identity Providers"
      • From top right dro-down click "Add OpenId Connect"
      • Add the Client Id from Cognito App client
      • Use HTTP basic authentication
      • Add the Client Secret from Cognito App client
      • Visit https://cognito-idp.[region].amazonaws.com/[userPoolId]/.well-known/openid-configuration for endpoints [replace variables]
        ** If you have a domain set make sure this is reflected in the endpoints
      • Add the Authorization endpoint
      • Add the Token endpoint
      • Add the Userinfo endpoint
      • Add openid to Scope
      • Set the Linking strategy to Link on email. Create the user if they do not exist
      • A lambda is not required but may be used to map attributes from Cognito
      • Enable this identity provider for the desired applications
      posted in General Discussion
      M
      matth
    • Can I run my own database behind my FusionAuth Cloud instance?

      Short answer:

      1. No. FusionAuth does not allow customers to access FusionAuth Cloud.

      What you can do instead:

      1. You can self host and run FusionAuth right next to your existing database.

      2. You can create user attributes that tie FusionAuth users in the cloud to the users in your existing database.

      For example, you could create a user.data.profile FusionAuth user profile object with the id of the user in the existing database. And then add a column on the existing side to store the FusionAuth user id. Then use webhooks to keep any shared attributes in sync.
      https://fusionauth.io/docs/v1/tech/events-webhooks/

      1. You can import everything to FusionAuth, potentially using a Connector.
        https://fusionauth.io/docs/v1/tech/connectors/

      In all cases you'll need to migrate the auth related portions of the database to FusionAuth.

      Here's a guide for that: https://fusionauth.io/docs/v1/tech/migration-guide/general

      One final thought is you could wrap FusionAuth and your legacy database into a single API (that you write; possibly set up a proxy) so even if there are two databases/applications containing user data, it will look like one to all consumers of it.

      posted in Q&A
      M
      matth
    • Using SAMLTEST.ID as the IdP with FusionAuth SAML v2

      In your instance of FusionAuth navigate to "Settings" > "Identity Providers" and click to add the "SAML v2" identity provider.

      Screen Shot 2022-08-09 at 4.51.41 PM.png

      In the setup screen for the SAML v2 IdP set the "IdP endpoint" to https://samltest.id/idp/profile/Redirect/SSO

      Set the "NameID format" to emailAddress

      Screen Shot 2022-08-09 at 8.05.56 PM.png

      You will also want to check under the "Options" tab and toggle "Use NameID for email" to on.

      Save this configuration.

      Then in FusionAuth, go to "Settings" > "Key Master" and click to "Import Certificate".

      Use the certificate under SAMLtest’s IdP from https://samltest.id/download/

      Save the certificate in FusionAuth.

      Then go back to the your SAML v2 IdP settings and add the recently saved certificate to the "Verification key".

      Screen Shot 2022-08-09 at 8.06.44 PM.png

      Be sure to enable this IdP for your test application.

      You should then see the "Login with SAML" button available for when on the FusionAuth hosted login page.

      Screen Shot 2022-08-09 at 5.16.20 PM.png

      Before you can finish testing the login you''ll need to click the green magnifying glass for your SAML v2 IdP and copy the Metadata URL under SAML v2 Integration details.

      Then visit https://samltest.id/upload.php and add the metadata url so SAMLTEST.ID can trust requests from FusionAuth.

      Now you can click to "Login with SAML" and you should be redirected to the SAMLTEST.ID login page assuming you have set everything correctly.

      Screen Shot 2022-08-09 at 5.07.33 PM.png

      Finish logging in by using any set of credentials provided on that page.

      You should then be redirected back to your application and a corresponding user successfully created in FusionAuth.

      If you would like to map attributes from the SAML response to the User object in FusionAuth you will need to use a SAML reconcile lambda.

      https://fusionauth.io/docs/v1/tech/lambdas/samlv2-response-reconcile

      There are also other examples for testing the SAMLv2 IdP funcitionality provided by FusionAuth.

      Be sure to visit our documentation for more details.

      https://fusionauth.io/docs/v1/tech/identity-providers/samlv2/

      posted in General Discussion
      M
      matth

    Latest posts made by matth

    • RE: Can I terminate TLS at FusionAuth?

      @dan this is accurate and related post here: https://fusionauth.io/community/forum/topic/2579/runtime-exceptions-with-ssl-enabled/3

      HiTrust regulations requirements is the reason it must be done this way.

      posted in Q&A
      M
      matth
    • RE: Can I terminate TLS at FusionAuth?

      @dan Is this speaking to an installed version rather than a container? We are running the container using port 9013 configured for SSL per the configuration reference and a load balancer in front of it handling exposing it on 443 so that the FusionAuth app is kept at 9013 for the load balancer to communicate with. The only difference is the load balancer is a separate resource in AWS since I'm not running it installed directly on an EC2 instance. My local I'm talking to 9013 directly, having issue in both environments though runtime wise, also running the container so there's also no risk of escalation there.

      posted in Q&A
      M
      matth
    • RE: Do cloud hosting have strict user count limit for Medium and Large size?

      @sys-admin Sizing your cloud environment depends on a few factors.

      While the numbers you found provide some good guidelines, not hard limits, we also want to consider the login behavior of your active users and total data requirements.

      Can you provide more details on your specific use case such as the RPS you need to support and if you have a concept of things like login storm events?

      Happy to jump on a call and discuss what will make for an ideal setup.

      Feel free to email me directly, matt@fusionauth.io.

      Thanks,
      --Matt

      posted in Q&A
      M
      matth
    • Using SAMLTEST.ID as the IdP with FusionAuth SAML v2

      In your instance of FusionAuth navigate to "Settings" > "Identity Providers" and click to add the "SAML v2" identity provider.

      Screen Shot 2022-08-09 at 4.51.41 PM.png

      In the setup screen for the SAML v2 IdP set the "IdP endpoint" to https://samltest.id/idp/profile/Redirect/SSO

      Set the "NameID format" to emailAddress

      Screen Shot 2022-08-09 at 8.05.56 PM.png

      You will also want to check under the "Options" tab and toggle "Use NameID for email" to on.

      Save this configuration.

      Then in FusionAuth, go to "Settings" > "Key Master" and click to "Import Certificate".

      Use the certificate under SAMLtest’s IdP from https://samltest.id/download/

      Save the certificate in FusionAuth.

      Then go back to the your SAML v2 IdP settings and add the recently saved certificate to the "Verification key".

      Screen Shot 2022-08-09 at 8.06.44 PM.png

      Be sure to enable this IdP for your test application.

      You should then see the "Login with SAML" button available for when on the FusionAuth hosted login page.

      Screen Shot 2022-08-09 at 5.16.20 PM.png

      Before you can finish testing the login you''ll need to click the green magnifying glass for your SAML v2 IdP and copy the Metadata URL under SAML v2 Integration details.

      Then visit https://samltest.id/upload.php and add the metadata url so SAMLTEST.ID can trust requests from FusionAuth.

      Now you can click to "Login with SAML" and you should be redirected to the SAMLTEST.ID login page assuming you have set everything correctly.

      Screen Shot 2022-08-09 at 5.07.33 PM.png

      Finish logging in by using any set of credentials provided on that page.

      You should then be redirected back to your application and a corresponding user successfully created in FusionAuth.

      If you would like to map attributes from the SAML response to the User object in FusionAuth you will need to use a SAML reconcile lambda.

      https://fusionauth.io/docs/v1/tech/lambdas/samlv2-response-reconcile

      There are also other examples for testing the SAMLv2 IdP funcitionality provided by FusionAuth.

      Be sure to visit our documentation for more details.

      https://fusionauth.io/docs/v1/tech/identity-providers/samlv2/

      posted in General Discussion
      M
      matth
    • Can I run my own database behind my FusionAuth Cloud instance?

      Short answer:

      1. No. FusionAuth does not allow customers to access FusionAuth Cloud.

      What you can do instead:

      1. You can self host and run FusionAuth right next to your existing database.

      2. You can create user attributes that tie FusionAuth users in the cloud to the users in your existing database.

      For example, you could create a user.data.profile FusionAuth user profile object with the id of the user in the existing database. And then add a column on the existing side to store the FusionAuth user id. Then use webhooks to keep any shared attributes in sync.
      https://fusionauth.io/docs/v1/tech/events-webhooks/

      1. You can import everything to FusionAuth, potentially using a Connector.
        https://fusionauth.io/docs/v1/tech/connectors/

      In all cases you'll need to migrate the auth related portions of the database to FusionAuth.

      Here's a guide for that: https://fusionauth.io/docs/v1/tech/migration-guide/general

      One final thought is you could wrap FusionAuth and your legacy database into a single API (that you write; possibly set up a proxy) so even if there are two databases/applications containing user data, it will look like one to all consumers of it.

      posted in Q&A
      M
      matth
    • Setting up a FusionAuth ODIC identity provider with Amazon Cognito

      I followed these steps to configure a FusionAuth OIDC identity provider to enable Amazon Cognito third-party login:

      Cognito Steps:

      • Choose your desired region (top right)
      • Review default settings if needed
      • Click "Manage User Pools"
      • Click "Create a user pool" or select the desired pool
      • Navigate to "Users and groups"
      • Click "Create User: if none exist (phone number format: +3035553322)
      • Navigate to "App clients"
      • Click "Add an app client"
      • Add the app client name and click "Create app client"
      • Click "Show details" for desired app client to show client id and client secret
      • Navigate to "App client settings"
      • Select user pools to enable
      • Add callback URL(s)
      • Under Allowed OAuth Flows enable "Authorization code grant"
      • Under Allowed OAuth Scopes enable openid
      • Navigate to "Domain name"
      • Add custom domain if desired

      FusionAuth Steps:

      • Navigate to "Settings"
      • Navigate to "Identity Providers"
      • From top right dro-down click "Add OpenId Connect"
      • Add the Client Id from Cognito App client
      • Use HTTP basic authentication
      • Add the Client Secret from Cognito App client
      • Visit https://cognito-idp.[region].amazonaws.com/[userPoolId]/.well-known/openid-configuration for endpoints [replace variables]
        ** If you have a domain set make sure this is reflected in the endpoints
      • Add the Authorization endpoint
      • Add the Token endpoint
      • Add the Userinfo endpoint
      • Add openid to Scope
      • Set the Linking strategy to Link on email. Create the user if they do not exist
      • A lambda is not required but may be used to map attributes from Cognito
      • Enable this identity provider for the desired applications
      posted in General Discussion
      M
      matth