Skip to content

Instantly share code, notes, and snippets.

Avatar

Matias Woloski woloski

View GitHub Profile
View gist:9793195
### Keybase proof
I hereby claim:
* I am woloski on github.
* I am woloski (https://keybase.io/woloski) on keybase.
* I have a public key whose fingerprint is 0224 1D50 4856 D763 441F 190D F00A 7305 01D0 FA5F
To claim this, I am signing this object:
@woloski
woloski / always-looking-for-talent.md
Last active Aug 29, 2015
We don't hire on-demand, we continously look for great people
View always-looking-for-talent.md

Auth0 is a privately-held tech company based in Seattle, WA. We have a distributed team working remotely from Seattle, Buenos Aires and Cordoba.

We're building the company we always wanted, with people who share the same passion for technology, solutions and customers.

We continously look for:

@woloski
woloski / server.js
Created Feb 4, 2014
jwt and social auth
View server.js
app.get('/auth/facebook/callback',
passport.authenticate('facebook', { failureRedirect: '/error', session: false }),
function(req, res) {
var token = jwt.sign(req.user, secret, { expiresInMinutes: 60*5 });
res.redirect('/#jwt=' + jwt);
});
@woloski
woloski / rule-map-email-to-nameid.js
Last active Apr 25, 2018
Salesforce Auth0 rule. This is the default mapping Auth0 will use for Salesforce. You can create a new Rule and change this with whatever you want.
View rule-map-email-to-nameid.js
function (user, context, callback) {
//
// this rule can be used if you have chosen to use Username as the way to identify a user in Salesforce. Notice that we are mapping the email to the nameidentifier.
//
if (context.clientName === 'Salesforce') {
context.samlConfiguration.mappings = {
'http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier': 'email',
'User.Username': 'email',
'User.Email': 'email',
'User.FirstName': 'given_name',
@woloski
woloski / auth0.py
Last active Jun 14, 2017
this shows a very simple bare bones example of authenticating with Auth0 using standard python libraries
View auth0.py
import webapp2
import urllib2
import urllib
import json
## CHANGE THIS
CLIENT_ID = "vYPeq7LGf1utg2dbDlGKCwGKgy94lPH0"
CLIENT_SECRET = "DLQ5dWkNMwPlUWo2jqVkbG1PFyeMvV60HEJaW0FioeI4ZxGaAW73BiqRBZmRk29v"
DOMAIN = "contoso.auth0.com"
CALLBACK_URL = "http://localhost:8080/callback"
@woloski
woloski / eng.md
Last active Mar 29, 2017
We want to grow our small team at Auth0!
View eng.md

Senior Software Engineers

Remote required

Auth0 is a privately-held tech company based in Seattle, WA. We have a distributed team working remotely from Seattle, Buenos Aires and Cordoba.

We're building the company we always wanted, with people who share the same passion for technology, solutions and customers.

@woloski
woloski / custom-widget.css
Last active Dec 19, 2015
Auth0 Login Widget customization
View custom-widget.css
/* ------------------ GENERAL --------------- */
/* change default fonts */
@import url(https://fonts.googleapis.com/css?family=Open+Sans:700,800,400);
.popup {
font-family: 'Open Sans', sans-serif;
}
/* login widget width and centered position */
.popup .overlay .onestep {
@woloski
woloski / README.md
Last active Dec 18, 2015
Auth0 script for WCF Membership wrapper
View README.md
  1. Create a new Database Connection in Auth0 Dashboard
  2. Give it an arbitrary name (myapp.com)
  3. Delete the content and paste the content of the script
  4. Replace the BASE_URL with yours
  5. Click on Try button and check if it works
  6. You can now use the Login Widget through https://YOUR_SUBDOMAIN.auth0.com/login?client=YOUR_CLIENT_ID (both values can be found on Settings)
@woloski
woloski / WifCookieAuthProvider.cs
Created May 29, 2013
ServiceStack WIF cookie auth provider
View WifCookieAuthProvider.cs
using System.Linq;
using System.Threading;
using Microsoft.IdentityModel.Claims;
using ServiceStack.Common.Web;
using ServiceStack.Configuration;
using ServiceStack.ServiceInterface;
using ServiceStack.ServiceInterface.Auth;
namespace YourApp
{
@woloski
woloski / SharePoint Auth0 Output
Last active Dec 15, 2015
Auth0 SharePoint Succesful Installation
View SharePoint Auth0 Output
PS C:\> Enable-Auth0 -auth0Domain:"foo.auth0.com" -clientId:"Jr22cCJ3C....b6AXQKws" -webAppUrl:"http://sp2010app:8002" -identifierClaimType:"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" -claims:@("Email|http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress") -Verbose
VERBOSE: Adding Microsoft.Sharepoint.Powershell Snapin
VERBOSE: Leaving BeginProcessing Method of Get-SPShellAdmin.
VERBOSE: Leaving ProcessRecord Method of Get-SPShellAdmin.
VERBOSE: Leaving EndProcessing Method of Get-SPShellAdmin.
VERBOSE: Downloading federation metadata from
http://foo.woloski.auth0.com/wsfed/Jr22cCJ3C....b6AXQKws/FederationMetadata/2007-06/FederationMetadata.xml
VERBOSE: Check App exists
VERBOSE: Leaving BeginProcessing Method of Get-SPWebApplication.