1+ FRONTEND_URL = http://localhost:8001
2+
3+ # Amazon Cognito configuration: replace these example values with your actual AWS configuration
4+ AWS_REGION = us-east-1
5+ AWS_ACCOUNT_ID = 123456789012
6+
7+ # Amazon Cognito identity pools configuration: replace with your actual identity pool ID from the Amazon Cognito console
8+ COGNITO_IDENTITY_POOL_ID = us-east-1:a1b2c3d4-5678-90ab-cdef-EXAMPLE11111
9+
10+ # IAM role ARN for authenticated users: it grants permissions to users who have signed in
11+ AUTHENTICATED_ROLE_ARN = arn:aws:iam::123456789012:role/Cognito_IdentityPoolAuth_Role
12+ # IAM role ARN for unauthenticated users: it grants limited permissions to anonymous users
13+ UNAUTHENTICATED_ROLE_ARN = arn:aws:iam::123456789012:role/Cognito_IdentityPoolUnauth_Role
14+
15+ # Amazon Cognito user pool configuration
16+ COGNITO_USER_POOL_ID = us-east-1_EXAMPLE123
17+ COGNITO_APP_CLIENT_ID = 1234567890abcdefEXAMPLE
18+ COGNITO_APP_CLIENT_SECRET = 1a2b3c4d5e6f7g8h9i0j1k2l3m4n5o6p7q8r9s0tEXAMPLE
19+ COGNITO_DOMAIN = example-domain
20+
21+ # Social identity providers: configure the social identity providers you want to use
22+ # 1. Google OAuth 2.0 configuration: obtain these values from the Google Cloud Console
23+ GOOGLE_CLIENT_ID = 123456789012-abcdefghijklmnopqrstuvwxyzEXAMPLE.apps.googleusercontent.com
24+ GOOGLE_CLIENT_SECRET = GOCSPX-AbCdEfGhIjKlMnOpQrStUvWxYzEXAMPLE
25+
26+ # 2. Facebook login configuration: obtain these values from Facebook for developers
27+ FACEBOOK_APP_ID = 1234567890123456
28+ FACEBOOK_APP_SECRET = a1b2c3d4e5f6g7h8i9j0k1l2m3n4oEXAMPLE
29+
30+ # 3. Login with Amazon configuration: obtain these values from the Amazon Developer Portal
31+ AMAZON_CLIENT_ID = amzn1.application-oa2-client.a1b2c3d4e5f6g7h8i9j0k1l2m3n4oEXAMPLE
32+ AMAZON_CLIENT_SECRET = amzn1.oa2-cs.v1.a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6q7r8s9t0u1v2w3x4y5zEXAMPLE
33+
34+ # Enterprise identity providers: configure enterprise identity providers for corporate authentication
35+ # 1. OpenID Connect (OIDC) provider configuration: replace with your OIDC provider's configuration
36+
37+ # For Okta, these would typically be:
38+ # OIDC_AUTHORIZATION_ENDPOINT=https://your-domain.okta.com/oauth2/default/v1/authorize
39+ # OIDC_TOKEN_ENDPOINT=https://your-domain.okta.com/oauth2/default/v1/token
40+
41+ # # For Auth0, these would typtically be:
42+ # OIDC_AUTHORIZATION_ENDPOINT=https://your-domain.us.auth0.com/authorize
43+ # OIDC_TOKEN_ENDPOINT=https://your-domain.us.auth0.com/oauth/token
44+
45+ OIDC_CLIENT_ID = oidc_client_1234567890abcdefEXAMPLE
46+ OIDC_CLIENT_SECRET = oidc_secret_a1b2c3d4e5f6g7h8i9j0k1l2m3n4oEXAMPLE
47+ OIDC_AUTHORIZATION_ENDPOINT = https://your-oidc-provider.com/oauth2/authorize
48+ OIDC_TOKEN_ENDPOINT = https://your-oidc-provider.com/oauth2/token
49+ OIDC_ISSUER = https://your-oidc-provider.com
50+
51+ # 2. SAML 2.0 provider configuration: replace with your SAML provider's configuration
52+ # For Okta SAML, these would typically be:
53+ # OKTA_DOMAIN=your-domain.okta.com
54+ # OKTA_APP_ID=exkABCDEF123456789
55+ SAML_SSO_URL = https://example.com/saml/sso
56+ SAML_ENTITY_ID = urn:amazon:cognito:sp:us-east-1:a1b2c3d4-5678-90ab-cdef-EXAMPLE11111
57+ SAML_PROVIDER = ExampleSAMLProvider
58+ SAML_PROVIDER_ARN = arn:aws:iam::123456789012:saml-provider/ExampleSAMLProvider
59+
60+ # Custom developer provider configuration: replace with your custom developer provider name
61+ DEVELOPER_PROVIDER_NAME = ExampleDeveloperProvider
62+ AWS_ACCESS_KEY_ID = AKIAIOSFODNN7EXAMPLE
63+ AWS_SECRET_ACCESS_KEY = wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
0 commit comments