AWS CloudFront Private Content

Description

Explore options for serving private content via CloudFront

This infrastructure provisioning and deployment pipeline performs an atomic deploy of private static content from a github repo to a static site (Route 53 + ACM + WAF + Cognito Federated SSO to Auth0 SAML + CloudFront + S3) when a tag (release) is applied to the repo.


Demo Private Static Site


Architecture


Prerequisites


Infrastructure Provisioning Steps

  1. manually create a public route 53 hosted zone for your domain name (e.g. mydomain.com)
  2. update DOMAIN_NAME parameter in ./run.sh with the hosted zone name
  3. provision aws resources ./run.sh deploy-infrastructure
  4. Check ACM in AWS Console to confirm Certificate validation via DNS validation has completed. May need to add DNS validation records to route 53 hosted zone.
  5. update audience in SAML IdP with UserPool Id
  6. update client_id in frontend/public/login/index.html
  7. update pipeline variables
    • REGION - default is us-east-1
    • STACK_NAME - defined in ./run.sh
    • AWS_ACCESS_KEY_ID - AccessKey output in ./tmp/${STACK_NAME}-outputs.json
    • AWS_SECRET_ACCESS_KEY - SecretKey output in ./tmp/${STACK_NAME}-outputs.json

Website Content Publishing From Local Machine Steps

  1. update website content in public directory
  2. run one of the following deployment commands:
    # format
    ./run.sh publish-content staging|prod [--blue-green-publish] [--apply-routing-rules] [--invalidate-cloudfront-cache]
    
    # example(s)
    
    # full blue/green deploy with routing rules and cloudfront cache invalidation
    ./run.sh publish-content staging --blue-green-publish --apply-routing-rules --invalidate-cloudfront-cache
    ./run.sh publish-content prod --blue-green-publish --apply-routing-rules --invalidate-cloudfront-cache
    
    # content only update to staging
    ./run.sh publish-content staging
    
    # content only update to production
    ./run.sh publish-content prod
    
  3. view changes @ https://staging.mydomain.com or https://mydomain.com
    ./run.sh open-website staging
    ./run.sh open-website production
    

Website Content Publishing via Commit Steps

  1. ensure you have develop branch checked out (this corresponds to staging environment)
  2. update website content in public directory and push to github.
  3. (optional) update redirect rules in routing-rules/routing-rules.txt
  4. push your commit(s) to remote (github)
  5. publish will run. can take up to 20 minutes to complete due CloudFront distribution update.
  6. verify updated content by visiting https://staging.mydomain.com
  7. to publish staging to production, checkout master branch and merge in develop
  8. push your commit(s) to remote (github)
  9. verify updated content by visiting https://mydomain.com and https://www.mydomain.com

Deprovisioning

  1. deprovision aws resources ./run.sh delete-infrastructure
  2. (optional) manually delete S3 website and CloudFront logs buckets.

    these are not deleted because they still contain objects

  3. (optional) run ./run.sh delete-infrastructure again to permanently delete stack

Demo

  1. visit https://allthecloudbits.com
  2. sign in with Auth0 test user. user01@example.com / password01

Staging Docs

  • AWS::Cognito::UserPool created first in order to provide required UserPoolId to SAML provider (Auth0), then AWS::Cognito::UserPoolIdentityProvider can be provisioned with SAML MetadataURL from SAML provider (Auth0)
  • Set AWS Secrets Manager Secrets. CloudFront Key Pair Private Key.
  • Set SSM parameter store itemsCloudFront Key Pair Id, Public Key.
  • Debug SAML

Detail Examples

cognito login url

https://allthecloudbits.auth.us-east-1.amazoncognito.com/login?response_type=token&client_id=3al3r1fatr213ndvp2uoqcfgi9&redirect_uri=https://allthecloudbits.com/login/redirect/

cognito userinfo url

https://allthecloudbits.auth.us-east-1.amazoncognito.com/oauth2/userInfo

Example Usage

export ACCESS_TOKEN='eyJraWQiOiJqdzNzaUhDU2NxeWVhMnliKytkeHNNZXBnVk5JSE5Bc1pQVldKUVJPUW1BPSIsImFsZyI6IlJTMjU2In0.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.X8cZNbyz8oF46MaO60gD9PDXuart0MvIqRNa7IjvbO5DuQM0uMMs6Xfb1ftcEk6iADjz-i8sEtzkd0AQXr-LdVLRLWTl7TQXICzppo2dOgRlK4HIY0RHktuDrCpciWaGmjFz35wKu0omqmzVSNFNv8Bdgv1peCeOvvQDnxeP4ewaHvpUVZbd3todkoytMoQSKBQ3DwepbHM79t_jluiamyPWzJtcHcMZ0Fdl5RQIg8_fsDq1ouuMaYfUESqpwyw0hQv39xL2VSU-RzfoS3oeqeHV85W1CMwc21t_mhTg1gYmYr7z2dTBFbYka60ip50ImEQgTrzne_hTFfiZwOD4QA'

curl -H "Authorization: Bearer ${ACCESS_TOKEN}" https://allthecloudbits.auth.us-east-1.amazoncognito.com/oauth2/userInfo

output

{
    "sub": "13ed8986-af76-43af-8e92-5d7c33584531",
    "identities": "[{\"userId\":\"auth0|5f329b4f73edc1003d5f5d73\",\"providerName\":\"auth0\",\"providerType\":\"SAML\",\"issuer\":\"urn:svc.auth0.com\",\"primary\":true,\"dateCreated\":1597158755583}]",
    "email_verified": "false",
    "email": "user01@example.com",
    "username": "auth0_auth0|5f329b4f73edc1003d5f5d73"
}

cognito logout url

https://allthecloudbits.auth.us-east-1.amazoncognito.com/logout?response_type=token&client_id=3al3r1fatr213ndvp2uoqcfgi9&redirect_uri=https://allthecloudbits.com/login/logout.html

CloudFront /api/ origin backed by API Gateway endpoint with Cognito UserPool Authorizer

echos incoming lambda proxy request event

ID_TOKEN='eyJraWQiOiJ2V2ltUXRzdXpRUUFUWUc5UGNZcjlLK1BJa25PaEhoZEZGMHE1YlVGWVMwPSIsImFsZyI6IlJTMjU2In0.eyJhdF9oYXNoIjoicWVKQVBYVDV0N3BoOXBkMUR4WDdvQSIsInN1YiI6IjE0MDFiZjYwLWNhYjUtNGFjNy1iMDBhLTM1NDM2N2Q1ZjgyNiIsImNvZ25pdG86Z3JvdXBzIjpbInVzLWVhc3QtMV95S05rUUVrS2FfYXV0aDAiXSwiZW1haWxfdmVyaWZpZWQiOmZhbHNlLCJpc3MiOiJodHRwczpcL1wvY29nbml0by1pZHAudXMtZWFzdC0xLmFtYXpvbmF3cy5jb21cL3VzLWVhc3QtMV95S05rUUVrS2EiLCJjb2duaXRvOnVzZXJuYW1lIjoiYXV0aDBfYXV0aDB8NWYzMjliNGY3M2VkYzEwMDNkNWY1ZDczIiwibm9uY2UiOiItbm9FRmtnT1dVMG1ob2FYWnFldWJzb2JrVzZPY3lFRmRZenQ0TFBlWUk0MHB5SGFuQS1sZzZYV3VoaW9TWllvT1AyXzhYZzZMYS1ZLTg3eTlHa3BJYzczTnJIeWs1X2V2SlRlOXEzX1Rkb0pUYnIzaFFKU05NbDl0ZjRKZHgzb3ZhYlg4RklzUmc5SkdxVThyTEt4VFZKa2NXZzJDZ3hDMjFQRXBDSkZDMUEiLCJhdWQiOiIxanR0NHZhNmo5a2duODRoMW42bjU2czVjdCIsImlkZW50aXRpZXMiOlt7InVzZXJJZCI6ImF1dGgwfDVmMzI5YjRmNzNlZGMxMDAzZDVmNWQ3MyIsInByb3ZpZGVyTmFtZSI6ImF1dGgwIiwicHJvdmlkZXJUeXBlIjoiU0FNTCIsImlzc3VlciI6InVybjpzdmMuYXV0aDAuY29tIiwicHJpbWFyeSI6InRydWUiLCJkYXRlQ3JlYXRlZCI6IjE1OTg0MDM3MjY0NjcifV0sInRva2VuX3VzZSI6ImlkIiwiYXV0aF90aW1lIjoxNTk4NDA0MjMzLCJleHAiOjE1OTg0MDc4MzMsImlhdCI6MTU5ODQwNDIzMywiZW1haWwiOiJ1c2VyMDFAZXhhbXBsZS5jb20ifQ.I2PKtMjfWANBuu8eybZ_EegFEQ-D7cfCD2VyHnlHFzs_CoxthugBICI_ayMdyYhsd1FXqztbrzZIy9q2eDPh1IyaIH_s2cFBiRLCcZF-P1ULd8T9xsPqoZDEbxH_gg7u6YZYBVuLo53bNTCrC9p1pSxAUyzUa68BjZyTHSf3GEW06wJqE84e1lsyQX0qE_I1IGmYZOgq1rJCsYKwQqV9KmdZBMMEOhKizN4_Nm42LTY5frTzKPgUNIuyXaPWF2Uns1MdIoM9SoI1SnYZckgrAVlh_0U-wNu6BHhK4mpYBo90HelskOWiLzJvRqgotsfMeCgAhVNtbq7v1L2K-fHadg'

curl -H "Authorization: Bearer ${ID_TOKEN}" "https://allthecloudbits.com/api/"

output

{
    "resource": "/{proxy+}",
    "path": "/api/",
    "httpMethod": "GET",
    "headers": {
        "Authorization": "Bearer eyJraWQiOiJ2V2ltUXRzdXpRUUFUWUc5UGNZcjlLK1BJa25PaEhoZEZGMHE1YlVGWVMwPSIsImFsZyI6IlJTMjU2In0.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.I2PKtMjfWANBuu8eybZ_EegFEQ-D7cfCD2VyHnlHFzs_CoxthugBICI_ayMdyYhsd1FXqztbrzZIy9q2eDPh1IyaIH_s2cFBiRLCcZF-P1ULd8T9xsPqoZDEbxH_gg7u6YZYBVuLo53bNTCrC9p1pSxAUyzUa68BjZyTHSf3GEW06wJqE84e1lsyQX0qE_I1IGmYZOgq1rJCsYKwQqV9KmdZBMMEOhKizN4_Nm42LTY5frTzKPgUNIuyXaPWF2Uns1MdIoM9SoI1SnYZckgrAVlh_0U-wNu6BHhK4mpYBo90HelskOWiLzJvRqgotsfMeCgAhVNtbq7v1L2K-fHadg",
        "CloudFront-Forwarded-Proto": "https",
        "CloudFront-Is-Desktop-Viewer": "true",
        "CloudFront-Is-Mobile-Viewer": "false",
        "CloudFront-Is-SmartTV-Viewer": "false",
        "CloudFront-Is-Tablet-Viewer": "false",
        "CloudFront-Viewer-Country": "US",
        "Host": "9t5xagyya6.execute-api.us-east-1.amazonaws.com",
        "User-Agent": "Amazon CloudFront",
        "Via": "1.1 f452d023faa737bf8fd4899df4e76a45.cloudfront.net (CloudFront), 1.1 66114286e54efb82c700272100713f2f.cloudfront.net (CloudFront)",
        "X-Amz-Cf-Id": "zOP5ckCI6uBtPDKtf-4Cmnm518dfz3TJh7gAyF0kECi2UQWPS5-poQ==",
        "X-Amzn-Trace-Id": "Root=1-5f45bf55-30c7890880da73106bac3728",
        "X-Forwarded-For": "100.11.117.63, 70.132.13.82, 52.46.46.167",
        "X-Forwarded-Port": "443",
        "X-Forwarded-Proto": "https"
    },
    "multiValueHeaders": {
        "Authorization": [
            "Bearer eyJraWQiOiJ2V2ltUXRzdXpRUUFUWUc5UGNZcjlLK1BJa25PaEhoZEZGMHE1YlVGWVMwPSIsImFsZyI6IlJTMjU2In0.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.I2PKtMjfWANBuu8eybZ_EegFEQ-D7cfCD2VyHnlHFzs_CoxthugBICI_ayMdyYhsd1FXqztbrzZIy9q2eDPh1IyaIH_s2cFBiRLCcZF-P1ULd8T9xsPqoZDEbxH_gg7u6YZYBVuLo53bNTCrC9p1pSxAUyzUa68BjZyTHSf3GEW06wJqE84e1lsyQX0qE_I1IGmYZOgq1rJCsYKwQqV9KmdZBMMEOhKizN4_Nm42LTY5frTzKPgUNIuyXaPWF2Uns1MdIoM9SoI1SnYZckgrAVlh_0U-wNu6BHhK4mpYBo90HelskOWiLzJvRqgotsfMeCgAhVNtbq7v1L2K-fHadg"
        ],
        "CloudFront-Forwarded-Proto": [
            "https"
        ],
        "CloudFront-Is-Desktop-Viewer": [
            "true"
        ],
        "CloudFront-Is-Mobile-Viewer": [
            "false"
        ],
        "CloudFront-Is-SmartTV-Viewer": [
            "false"
        ],
        "CloudFront-Is-Tablet-Viewer": [
            "false"
        ],
        "CloudFront-Viewer-Country": [
            "US"
        ],
        "Host": [
            "9t5xagyya6.execute-api.us-east-1.amazonaws.co* Connection #0 to host allthecloudbits.com left intactm"
        ],
        "User-Agent": [
            "Amazon CloudFront"
        ],
        "Via": [
            "1.1 f452d023faa737bf8fd4899df4e76a45.cloudfront.net (CloudFront),1.1 66114286e54efb82c700272100713f2f.cloudfront.net (CloudFront)"
        ],
        "X-Amz-Cf-Id": [
            "zOP5ckCI6uBtPDKtf-4Cmnm518dfz3TJh7gAyF0kECi2UQWPS5-poQ=="
        ],
        "X-Amzn-Trace-Id": [
            "Root=1-5f45bf55-30c7890880da73106bac3728"
        ],
        "X-Forwarded-For": [
            "100.11.117.63,70.132.13.82,52.46.46.167"
        ],
        "X-Forwarded-Port": [
            "443"
        ],
        "X-Forwarded-Proto": [
            "https"
        ]
    },
    "queryStringParameters": null,
    "multiValueQueryStringParameters": null,
    "pathParameters": {
        "proxy": "api"
    },
    "stageVariables": null,
    "requestContext": {
        "resourceId": "sac2jj",
        "authorizer": {
            "claims": {
                "at_hash": "qeJAPXT5t7ph9pd1DxX7oA",
                "sub": "1401bf60-cab5-4ac7-b00a-354367d5f826",
                "cognito:groups": "us-east-1_yKNkQEkKa_auth0",
                "email_verified": "false",
                "iss": "https: //cognito-idp.us-east-1.amazonaws.com/us-east-1_yKNkQEkKa",
                "cognito:username": "auth0_auth0|5f329b4f73edc1003d5f5d73",
                "nonce": "-noEFkgOWU0mhoaXZqeubsobkW6OcyEFdYzt4LPeYI40pyHanA-lg6XWuhioSZYoOP2_8Xg6La-Y-87y9GkpIc73NrHyk5_evJTe9q3_TdoJTbr3hQJSNMl9tf4Jdx3ovabX8FIsRg9JGqU8rLKxTVJkcWg2CgxC21PEpCJFC1A",
                "aud": "1jtt4va6j9kgn84h1n6n56s5ct",
                "identities": "{\"dateCreated\":\"1598403726467\",\"userId\":\"auth0|5f329b4f73edc1003d5f5d73\",\"providerName\":\"auth0\",\"providerType\":\"SAML\",\"issuer\":\"urn:svc.auth0.com\",\"primary\":\"true\"}",
                "token_use": "id",
                "auth_time": "1598404233",
                "exp": "Wed Aug 26 02:10:33 UTC 2020",
                "iat": "Wed Aug 26 01:10:33 UTC 2020",
                "email": "user01@example.com"
            }
        },
        "resourcePath": "/{proxy+}",
        "httpMethod": "GET",
        "extendedRequestId": "R2rVaGENIAMFgKA=",
        "requestTime": "26/Aug/2020:01:48:05 +0000",
        "path": "/Prod/api/",
        "accountId": "529276214230",
        "protocol": "HTTP/1.1",
        "stage": "Prod",
        "domainPrefix": "9t5xagyya6",
        "requestTimeEpoch": 1598406485719,
        "requestId": "257d7792-80e4-4948-ad5e-ad7c1fad14dc",
        "identity": {
            "cognitoIdentityPoolId": null,
            "accountId": null,
            "cognitoIdentityId": null,
            "caller": null,
            "sourceIp": "70.132.13.82",
            "principalOrgId": null,
            "accessKey": null,
            "cognitoAuthenticationType": null,
            "cognitoAuthenticationProvider": null,
            "userArn": null,
            "userAgent": "Amazon CloudFront",
            "user": null
        },
        "domainName": "9t5xagyya6.execute-api.us-east-1.amazonaws.com",
        "apiId": "9t5xagyya6"
    },
    "body": null,
    "isBase64Encoded": false
}

Auth0 SAML Configuration

{
 "audience":  "urn:amazon:cognito:sp:us-east-1_QUSNXWsxL",
// "recipient": "http://foo",
"mappings": {
//   "user_id":     "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
  "email":       "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
//   "name":        "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
//   "given_name":  "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname",
//   "family_name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname",
//   "upn":         "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn",
//   "groups":      "http://schemas.xmlsoap.org/claims/Group"
}
// "createUpnClaim":       true,
// "passthroughClaimsWithNoMapping": true,
// "mapUnknownClaimsAsIs": false,
// "mapIdentities":        true,
// "signatureAlgorithm":   "rsa-sha1",
// "digestAlgorithm":      "sha1",
// "destination":          "http://foo",
// "lifetimeInSeconds":    3600,
// "signResponse":         false,
// "typedAttributes":      true,
// "includeAttributeNameFormat":  true,
// "nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
// "nameIdentifierProbes": [
//   "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
//   "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
//   "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"
// ],
// "authnContextClassRef": "urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified",
// "logout": {
//   "callback": "http://foo/logout",
//   "slo_enabled": true
// },
// "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
}

tokens provided to application

https://allthecloudbits.com/login/#access_token=eyJraWQiOiJqdzNzaUhDU2NxeWVhMnliKytkeHNNZXBnVk5JSE5Bc1pQVldKUVJPUW1BPSIsImFsZyI6IlJTMjU2In0.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.K9tKXxDDoOPXa3CBrvGIPEUe2jP5CRf0AOL0_zhZgv9ej2kWU-gKcLLmIs9xkGwwCGciBAuI0pHugmCVYjWGYjw6UscZt54gszpKkAI0LS6Qxr5dzV9K-fC1ZbFLkrufj2xgWAmQ-un4RRcKBLUrog70WhlY5ABx-sHlVpPXAwXY9iiKaDL5NpiMFRFx4jgliulCkjCaSYYrhFzT2BP8iTpvRgvp4mhJ90AyvnFPNLrpJI6-jB_KtqGwIcS9rCCrJpA37n0qJ2KAwWm_BRJBx1_Gh3EzYdFQtfEJ8YCr3rh03zbZ-izvkqDknh49QTiYxR5MUqa16_BzBP8DqQGstQ&id_token=eyJraWQiOiJweElSWFRBMTBlakI3TUpBbnVLS0l1VHo1eTNCcFU4eTUxNUd3Y1lwSHg0PSIsImFsZyI6IlJTMjU2In0.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.J_ALJGY73WT8iz8AEzMM1LCdZTgkZeJ21Dhm05eoZd0RbyI3iChHZhR7T7wqBMzFSDdhTBvqen1rGKlZXZ25JODTRFIDJEMQqxPr1oC-8j-X4l1futecOUKlMybMuOrf01uMmJKvh6HRqNagtK_2m3saOCNBrYQmw-bEkiqjLmSo6CMyJEcQfCiWUvZ-xaev7oXY1-8KUkrP_rf_Z5Mov0V2yluFk6UP39rCEr7qUz1aKqMElqQiBNIamfoi6rB3oPM4qth1v92w_u1zrdtuCNBPlWqoKglejXfykPvH3Rjus2yW3I1ILzPLTxkt7mcfBuyjYBKV_zRxsDRmN1yo0g&token_type=Bearer&expires_in=3600

individual tokens broken out

id_token=eyJraWQiOiJweElSWFRBMTBlakI3TUpBbnVLS0l1VHo1eTNCcFU4eTUxNUd3Y1lwSHg0PSIsImFsZyI6IlJTMjU2In0.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.HTAVp_VeZYnekdMgfFqiN2P4cEkY8R9T-T72omgaKU9k00-Nv_yCCrUGukzILO6_U0-UyBHhMPVu1EBByT3fKv9rtzB_5SvTLLeQhwj82ELX9_ZIrUNgVGj_bT1NCEOoLw6_HwF-hKX4gxiSiPgkOpxEsVwDLOjNAx7Jm2Bt49gZWB1DBrIsCBeIB3tEbW-2uf46eOKsJ9PilTJIY_ePLM1zr1QOal0FDUAqT44bQaEcKPKjSpYaAD4MVHnih3KDdLqoRzedJMeaIrTW8_eMODZ7GwniVcs0mDe5Z0D1wYC8iTajOtlyHEZHhAaDdw0YGvHdVWz8eGrLmVsCSdF7DA

&access_token=eyJraWQiOiJqdzNzaUhDU2NxeWVhMnliKytkeHNNZXBnVk5JSE5Bc1pQVldKUVJPUW1BPSIsImFsZyI6IlJTMjU2In0.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.UufAOCwINbVT9E_j61wOgjpkaSuLxWej2hOT26l8mQmCWidylKFVYlyb90ynxXuOoE2vMcWiwvlwla6vH1SCaV_LvSCpQLBoXueWj97S29XxBJBlUBo8AAe8i5es8D9kbSPuwjhfmC50KgumXZWOzANrU5jrfeCRMdqPPrllNnd_3yJQTlQuLXdB9vuao8VYj71Pbb2gUC945mKyluqidl-71Hkl0FmSr0Uvwf0ILZlUwzf7uu-aOVOnSuWlz5cFjbnWT9AEaAcFYkrYCx2OiSgUb-0vsLYN1RkBoi-ZfcHVERQek5lYDimt3MwetdhgLZ0Q2vlBA9V4chkfnE3aXw

&expires_in=3600

&token_type=Bearer

setting signed cookies via server-side response

{
    "response": {
        "status": "302",
        "statusDescription": "Found",
        "headers": {
            "set-cookie": [
                {
                    "key": "Set-Cookie",
                    "value": "CloudFront-Key-Pair-Id=APKAJK35MM4IQ2LXQOFA; domain=allthecloudbits.com; path=/; httpOnly=true"
                },
                {
                    "key": "Set-Cookie",
                    "value": "CloudFront-Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly9hbGx0aGVjbG91ZGJpdHMuY29tLyoiLCJDb25kaXRpb24iOnsiRGF0ZUxlc3NUaGFuIjp7IkFXUzpFcG9jaFRpbWUiOjE1OTc0MTg1MDh9fX1dfQ__; domain=allthecloudbits.com; path=/; httpOnly=true"
                },
                {
                    "key": "Set-Cookie",
                    "value": "CloudFront-Signature=di-2bRnf~V9aUz2PzzEQ98TWvCKPeRhq~mu47Xjw5Mf358bidk2OYIF9i0aaFHUB4WSAEAtLnEnxyK~b~53Dvqt7L~VswPPE7PYfBKagC3yEUxv4NIowFrgSepI4uXeQSw2ri6jG9QKZVBnP5EPAh~QNlveFt-yUYILrKlozPa72YM6UVlxbfRWGgfcSH8bwf3Yj24CUXC4V7RzZxPlXCdIhlnNkSOzIlgFH~6pJpRuPV~etpbnZ6Pt6aIE09vynwLheYMBhet9VahevUV9U~Amj1SJpsQYLmHGx0GKo-9jJxhTaeNK3pz6OlCGYMUSPslFddjBcH1CVq5Ct8rWGaQ__; domain=allthecloudbits.com; path=/; httpOnly=true"
                }
            ],
            "location": [
                {
                    "key": "Location",
                    "value": "/"
                }
            ]
        }
    }
}

expiring signed cookies via server-side response

{
    "response": {
        "status": "200",
        "statusDescription": "OK",
        "headers": {
            "set-cookie": [
                {
                    "key": "Set-Cookie",
                    "value": "CloudFront-Key-Pair-Id=deleted; domain=allthecloudbits.com; path=/; httpOnly=true; expires=Thu, 01 Jan 1970 00:00:00 GMT"
                },
                {
                    "key": "Set-Cookie",
                    "value": "CloudFront-Policy=deleted; domain=allthecloudbits.com; path=/; httpOnly=true; expires=Thu, 01 Jan 1970 00:00:00 GMT"
                },
                {
                    "key": "Set-Cookie",
                    "value": "CloudFront-Signature=deleted; domain=allthecloudbits.com; path=/; httpOnly=true; expires=Thu, 01 Jan 1970 00:00:00 GMT"
                }
            ]
        },
        "body": "\n  <!DOCTYPE html>\n  <html lang=\"en\">\n  \n  <head>\n      <meta charset=\"UTF-8\">\n      <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n      <meta http-equiv=\"refresh\"\n          content=\"0; URL=https://allthecloudbits.auth.us-east-1.amazoncognito.com/logout?response_type=token&client_id=3al3r1fatr213ndvp2uoqcfgi9&redirect_uri=https://allthecloudbits.com/login/logout.html\" />\n      <title>logout redirect</title>\n  </head>\n  \n  <body>\n  </body>\n  \n  </html>  \n  "
    }
}

Example Encoded SAML response from Auth0

<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_101857e2132cee1fd2a3"  Version="2.0" IssueInstant="2020-08-12T17:56:57.608Z"  Destination="https://manage.auth0.com/tester/samlp"><saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">urn:svc.auth0.com</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Version="2.0" ID="_C73TgUORTRvztJhMCLnBeJoNWVfQAQac" IssueInstant="2020-08-12T17:56:57.600Z"><saml:Issuer>urn:svc.auth0.com</saml:Issuer><Signature xmlns="http://www.w3.org/2000/09/xmldsig#"><SignedInfo><CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><Reference URI="#_C73TgUORTRvztJhMCLnBeJoNWVfQAQac"><Transforms><Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></Transforms><DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><DigestValue>F/Qnx7NvFpvIea04hIz/KmxJCTI=</DigestValue></Reference></SignedInfo><SignatureValue>uA+EwWOgPlE4yVAgI8uo5mNwNn3G59CfeE+ZWJfTvDUrp5sZXyXp5axyKeElSFgX+8rTqa8msMtVrV/WcKjpfijQGPNFOcJ79Net20Mqp6RoRFYoVNXI9fNxnqmCWUXZosXQEDkMI9xdYreGZr4FJ2XFYTxDK22wDElx0RrocsuWSujTscEv76e6eQy/u+rxlvmkih9bACbgT8wTgOUeaNE5awG0HlMw/ij/FAgyfEL/foqjsqWUySVThDlCW8+HEoO3IwpNr992rgayBjN3c79jR8NMEPV3w81btwHTu3dqhLvjOdnoLweafVIxza+sbGhYPx1M1RQBU69eQ/KTsg==</SignatureValue><KeyInfo><X509Data><X509Certificate>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</X509Certificate></X509Data></KeyInfo></Signature><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">auth0|5f329b4f73edc1003d5f5d73</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2020-08-12T18:56:57.600Z" Recipient="https://manage.auth0.com/tester/samlp"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2020-08-12T17:56:57.600Z" NotOnOrAfter="2020-08-12T18:56:57.600Z"><saml:AudienceRestriction><saml:Audience>urn:amazon:cognito:sp:us-east-1_QUSNXWsxL</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2020-08-12T17:56:57.600Z" SessionIndex="_CqOmTUbS2EPBudIjs52uf7OVqBrdTpqP"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><saml:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">user01@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">user01@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/identities/default/user_id" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">5f329b4f73edc1003d5f5d73</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/identities/default/provider" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">auth0</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/identities/default/connection" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">Username-Password-Authentication</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/identities/default/isSocial" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:boolean">false</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/clientID" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">0x3e4zVFCnvHwF7UGT2GZYUHgA0Y6tJo</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/created_at" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:anyType">Tue Aug 11 2020 13:21:19 GMT+0000 (Coordinated Universal Time)</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/email_verified" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:boolean">true</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">user01@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/nickname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">user01</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/picture" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">https://s.gravatar.com/avatar/ccc49f4d58b0428b0facd78c3b898bfa?s=480&amp;r=pg&amp;d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fus.png</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/updated_at" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:anyType">Wed Aug 12 2020 17:56:57 GMT+0000 (Coordinated Universal Time)</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/user_id" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">auth0|5f329b4f73edc1003d5f5d73</saml:AttributeValue></saml:Attribute><saml:Attribute Name="http://schemas.auth0.com/identifier" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">auth0|5f329b4f73edc1003d5f5d73</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>

Decoded SAML response from Auth0

<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_101857e2132cee1fd2a3"  Version="2.0" IssueInstant="2020-08-12T17:56:57.608Z"  Destination="https://manage.auth0.com/tester/samlp">
  <saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">urn:svc.auth0.com</saml:Issuer>
  <samlp:Status>
    <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
  </samlp:Status>
  <saml:Assertion xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Version="2.0" ID="_C73TgUORTRvztJhMCLnBeJoNWVfQAQac" IssueInstant="2020-08-12T17:56:57.600Z">
    <saml:Issuer>urn:svc.auth0.com</saml:Issuer>
    <Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
      <SignedInfo>
        <CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
        <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
        <Reference URI="#_C73TgUORTRvztJhMCLnBeJoNWVfQAQac">
          <Transforms>
            <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
            <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
          </Transforms>
          <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
          <DigestValue>F/Qnx7NvFpvIea04hIz/KmxJCTI=</DigestValue>
        </Reference>
      </SignedInfo>
      <SignatureValue>uA+EwWOgPlE4yVAgI8uo5mNwNn3G59CfeE+ZWJfTvDUrp5sZXyXp5axyKeElSFgX+8rTqa8msMtVrV/WcKjpfijQGPNFOcJ79Net20Mqp6RoRFYoVNXI9fNxnqmCWUXZosXQEDkMI9xdYreGZr4FJ2XFYTxDK22wDElx0RrocsuWSujTscEv76e6eQy/u+rxlvmkih9bACbgT8wTgOUeaNE5awG0HlMw/ij/FAgyfEL/foqjsqWUySVThDlCW8+HEoO3IwpNr992rgayBjN3c79jR8NMEPV3w81btwHTu3dqhLvjOdnoLweafVIxza+sbGhYPx1M1RQBU69eQ/KTsg==</SignatureValue>
      <KeyInfo>
        <X509Data>
          <X509Certificate>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</X509Certificate>
        </X509Data>
      </KeyInfo>
    </Signature>
    <saml:Subject>
      <saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">auth0|5f329b4f73edc1003d5f5d73</saml:NameID>
      <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
        <saml:SubjectConfirmationData NotOnOrAfter="2020-08-12T18:56:57.600Z" Recipient="https://manage.auth0.com/tester/samlp"/>
      </saml:SubjectConfirmation>
    </saml:Subject>
    <saml:Conditions NotBefore="2020-08-12T17:56:57.600Z" NotOnOrAfter="2020-08-12T18:56:57.600Z">
      <saml:AudienceRestriction>
        <saml:Audience>urn:amazon:cognito:sp:us-east-1_QUSNXWsxL</saml:Audience>
      </saml:AudienceRestriction>
    </saml:Conditions>
    <saml:AuthnStatement AuthnInstant="2020-08-12T17:56:57.600Z" SessionIndex="_CqOmTUbS2EPBudIjs52uf7OVqBrdTpqP">
      <saml:AuthnContext>
        <saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef>
      </saml:AuthnContext>
    </saml:AuthnStatement>
    <saml:AttributeStatement xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
      <saml:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">user01@example.com</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">user01@example.com</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/identities/default/user_id" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">5f329b4f73edc1003d5f5d73</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/identities/default/provider" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">auth0</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/identities/default/connection" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">Username-Password-Authentication</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/identities/default/isSocial" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:boolean">false</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/clientID" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">0x3e4zVFCnvHwF7UGT2GZYUHgA0Y6tJo</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/created_at" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:anyType">Tue Aug 11 2020 13:21:19 GMT+0000 (Coordinated Universal Time)</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/email_verified" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:boolean">true</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">user01@example.com</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/nickname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">user01</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/picture" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">https://s.gravatar.com/avatar/ccc49f4d58b0428b0facd78c3b898bfa?s=480&amp;r=pg&amp;d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fus.png</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/updated_at" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:anyType">Wed Aug 12 2020 17:56:57 GMT+0000 (Coordinated Universal Time)</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/user_id" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">auth0|5f329b4f73edc1003d5f5d73</saml:AttributeValue>
      </saml:Attribute>
      <saml:Attribute Name="http://schemas.auth0.com/identifier" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml:AttributeValue xsi:type="xs:string">auth0|5f329b4f73edc1003d5f5d73</saml:AttributeValue>
      </saml:Attribute>
    </saml:AttributeStatement>
  </saml:Assertion>
</samlp:Response>

TODO

Completed

  • cognito federated sso to auth0 saml2. see Set up Auth0 as a SAML Identity Provider with an Amazon Cognito User Pool
  • configure CloudFront Error pages to redirect to cognito login URL
  • move LambdaEdgeLoginFunction out of template to individual directory and use SAM to deploy
  • DecodeVerifyJwtFunction is split into its own lambda due to lambda@edge code size constraints
  • customize cognito login hosted ui. remove signup, etc.
  • create-react-app
  • add “logout” link that removes cloudfront signed cookies. must do from server-side as client-side javascript can’t access the cookies. see Correct way to delete cookies server-side
  • src/lambda/login/index.js - get ${DomainName}, DecodeVerifyJwtFunctionName, UserPoolClientId, and CloudFront Key Pair Secrets paths from param store
  • remove unused secrets manager secrets
  • fix for allthecloudbits.com/login/auth/
    • for /login/auth/ send 200 in response with html meta refresh/redirect tag to root / instead of 302. <meta http-equiv="refresh” content=1;url="">
  • update to use CF cache policy over using the deprecated cfn properties. Try the following managed policy by setting the CachePolicyId property to Name: Managed-CachingDisabled, ID: 4135ea2d-6df8-44a3-9df3-4b5a84be39ad.
  • add cognito authorizer to api gateway /api/ endpoint.
  • store id_token and refresh_token in local storage. delete on logout
  • fix https://staging.allthecloudbits.com/. move hard coded src/lambda/basic-auth/index.js:UsersSecret to SSM parameter store. secret gets created on every deploy

Resources

Articles

Documentation

Code


Scratch

<script>document.location = "/"</script>

<meta http-equiv="Cache-Control" content="no-cache, no-store, must-revalidate" /><meta http-equiv="Pragma" content="no-cache" /><meta http-equiv="Expires" content="0" />

Cache-Control: no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: 0

ApiGatewayApi:
  Type: AWS::Serverless::Api
  Properties:
    StageName: !Sub "${Stage}"
    Cors:
      AllowMethods: "'POST,GET,PUT,DELETE'"
      AllowHeaders: "'*'"
      AllowOrigin: "'*'"    
    Auth:
      Authorizers:
        CognitoUserPoolAuth:
          UserPoolArn: !Sub "arn:aws:cognito-idp:${AWS::Region}:${AWS::AccountId}:userpool/${UserPool}"
          Identity:
            Header: Authorization

let config = null
const getConfig = async (key) => {

  if (config === null) {
    const resp = await fetch('/login/config.json')
    config = await resp.json()    
  }

  const item = config.filter((item) => (item.OutputKey === key)  )
  return (item.length > 0) ? item[0].OutputValue : null
}

const userPoolId = await getConfig('UserPoolId')
const userPoolClientId = await getConfig('UserPoolClientId')


const queryString = window.location.search;
const urlParams = new URLSearchParams(queryString);

const session = new  CognitoUserSession(
  {
    IdToken: urlParams.get('id_token'),
    AccessToken: urlParams.get('access_token'),
    RefreshToken: urlParams.get('access_token'),
  }
)
const user = new CognitoUser({
  Username:
  Pool:
})
user.setSignInUserSession(session)


const userPool = new AWSCognito.CognitoIdentityServiceProvider.CognitoUserPool({
  UserPoolId: userPoolId,
  ClientId: userPoolClientId
});
const cognitoUser = userPool.getCurrentUser();