Infrastructure Setup
This section provides detailed guides for setting up the infrastructure required by different identity providers. Each provider requires specific configuration and setup steps that must be completed before you can use them with the auth-middleware.
Note
The following guides focus on manual setup through web consoles. For automated infrastructure deployment, consider using Infrastructure as Code tools like Terraform, AWS CloudFormation, or Azure Resource Manager templates.
Provider-Specific Setup Guides
- AWS Cognito Infrastructure Setup
- Prerequisites
- Step 1: Create a User Pool
- Step 2: Create App Clients
- Step 3: Create User Groups
- Step 4: Create Users
- Step 5: Assign Users to Groups
- Step 6: Configure User Pool Settings
- Step 7: Testing Your Setup
- Configuration Summary
- Troubleshooting
- Security Best Practices
- Next Steps
- Azure Entra ID Infrastructure Setup
- Overview
- Coming Soon
- Google Identity Infrastructure Setup
- Overview
- Coming Soon
Overview
Each identity provider requires different infrastructure components:
- AWS Cognito
User Pool for user management
App Clients for different authentication flows
User Groups for authorization
Optional: Custom attributes and triggers
- Azure Entra ID
App Registration for your application
Service Principal configuration
Group assignments
API permissions
- Google Identity
OAuth 2.0 Client IDs
Consent screen configuration
User management through Google Workspace (optional)
Security Considerations
When setting up identity provider infrastructure, consider the following security best practices:
Principle of Least Privilege: Only grant the minimum permissions necessary
Multi-Factor Authentication: Enable MFA wherever possible
Token Rotation: Configure appropriate token expiration times
Audit Logging: Enable comprehensive logging for security monitoring
Network Security: Use HTTPS/TLS for all communications
Secret Management: Never hardcode secrets; use environment variables or secret management services
Next Steps
After completing the infrastructure setup for your chosen provider:
Configure the auth-middleware with your provider settings
Test the authentication flow
Implement authorization rules using groups and permissions
Set up monitoring and logging
Configure production security settings
For implementation details, refer to the Middleware Configuration and provider-specific documentation.