The PeopleFinder sample uses Auth0 as its identity provider. If you don't have an Auth0 account, create one now.
PeopleFinder expects to operate over users with extended attributes like
as well as roles.
In order to set things up correctly, you can load these user definitions into your Auth0 tenant using a command-line tool. Let’s install the Aserto IDP seed tool which will help with this:
For Mac or Linux systems:
brew tap aserto-dev/tap && brew install aserto-idp-seed
To download the Windows version, or from a zip file, refer to the releases page on Github.
You’ll need an Auth0 Machine-to-Machine (M2M) Application, which has been authorized to talk to the Auth0 Management API. In the Auth0 dashboard, select an existing M2M application that has access to the Auth0 Management API, or create a new one. You will need to authorize this M2M application with at least the following scopes: read:users, create:users, and update:users. It will look something like this:
Ensure that the M2M application is authorized to call the Auth0 management API:
Ensure the scopes that are authorized include at least
update:users, so that the
aserto-idp-seed tool can read and write users. You can remove
update:users once the seed tool is done.
.env file for the Aserto IDP seed tool#
Create a new file called .env and give it the following structure:
The first three values come from the Domain, Client ID, and Client Secret of the Auth0 M2M application.
The last three values determine the name of the company our test users work at, the domain of email addresses that we will create for these users, and the password for these users. You can leave these values as the same ones above (or change the password to something even more secret :) ).
Finally, run the tool to seed the test users into your Auth0 tenant:
You should see the 272 test users being created.
See the README for the
aserto-idp-seed tool for more information.