Git Product home page Git Product logo

template-aws-lambda-okta-auto-approval's Introduction

Indent + AWS Lambda and Okta Auto Approval

This repository contains an integration between Okta Auto Approval and Indent. Once deployed, you will be able to use this integration with Indent to:

  • GetDecision

Quicklinks

Configuration

Before you deploy these webhooks for the first time, create an S3 bucket to store Terraform state, add your credentials as GitHub Secrets, then update the bucket in main.tf once you're done.

1. Configuring the S3 bucket

  • Go to AWS S3 and select an existing bucket or create a new one.
  • Select the settings given your environment:
    • Name — easily identifiable name for the bucket (example = indent-deploy-state-123)
    • Region — where you plan to deploy the Lambda (default = us-west-2)
    • Bucket versioning — if you want to have revisions of past deployments (default = disabled)
    • Default encryption — server-side encryption for deployment files (default = Enable)

2. Configuring AWS credentials

  • Go to AWS IAM → New User and create a new user for deploys, e.g. indent-terraform-deployer
  • Configure the service account access:
    • Credential type — select Access key - Programmatic access
    • Permissions — select Attach existing policies directly and select AdministratorAccess
  • Add the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY as GitHub Secrets to this repo

3. Connecting to Okta Auto Approval
  • Go to Okta > Security > API > Tokens and create a new API Token, then give the token a descriptive name like indent-integration-okta-approval
  • Add this as OKTA_TOKEN as a GitHub Secret
  • Copy your Okta Domain URL and add this as OKTA_DOMAIN as a GitHub Secret
  • Add the number of hours you want users to retain access for under AUTO_APPROVAL_DURATION as a GitHub Secret (1 hour by default)
4. Connecting to Indent
5. Deploy

Actions secrets

Visit this link to our documentation for information on setting up GitHub Secrets in this repository.

Deployment

This repository auto-deploys to AWS Lambda when you push or merge PRs to the main branch. You can manually redeploy the webhooks by re-running the latest GitHub Action job.

template-aws-lambda-okta-auto-approval's People

Contributors

indent-bot avatar fouad avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.