-
-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cognito client secrets - API client #174
Comments
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as off-topic.
This comment was marked as off-topic.
Do we still want to have API keys?API key is a little different than what we initially thought
Cognito already supports this for login
Do we want peopledepot API keys
|
We are going to use Cognito client secrets so that when a user logs into vrms or ctj (client systems), and the client system makes a request to authenticate that user and then show them data, we will know its coming from a client system |
We already have a work issue #242 to integrate with cognito using a client secret. It looks like that issue's dependency #241 is closed and we need to point to the new issue @ethanstrominger made #323, if the PR for it has the same problem of working only with
Putting this in the ice box until that PR is completed. |
Dependency
Overview
As discussed in #147, we need to implement app tokens in addition to user cognito tokens so we can restrict access to approved apps only. i.e. VRMS, website, CTJ.
Action Items
research ways to add app tokens in django and DRFcompare a few if there's many and write a decision record (DR) on why we should choose onecreate a work issue to implement the app tokenclient secret
, update Technical Debt (security): Implement client_secret in login #242 to point to Enable SSO for admin screen #323client secret
enabled.Resources/Instructions
The text was updated successfully, but these errors were encountered: