<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: OdedBD</title>
    <description>The latest articles on DEV Community by OdedBD (@bdoded).</description>
    <link>https://dev.to/bdoded</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F25015%2F058acdb5-feae-4e58-9545-4ba674d37d38.jpeg</url>
      <title>DEV Community: OdedBD</title>
      <link>https://dev.to/bdoded</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bdoded"/>
    <language>en</language>
    <item>
      <title>Load external data into OPA: The Good, The Bad, and The Ugly</title>
      <dc:creator>OdedBD</dc:creator>
      <pubDate>Mon, 04 Apr 2022 14:48:28 +0000</pubDate>
      <link>https://dev.to/permit_io/load-external-data-into-opa-the-good-the-bad-and-the-ugly-26lc</link>
      <guid>https://dev.to/permit_io/load-external-data-into-opa-the-good-the-bad-and-the-ugly-26lc</guid>
      <description>&lt;p&gt;There are several ways to create a data fetching mechanism for OPA - each of them has its pros and cons. To make sense of these different methods, I've decided to create this guide that will help you figure out which data fetching method would be best for you, with full knowledge of each method’s ‘good, bad, and ugly’ aspects.&lt;br&gt;
 &lt;/p&gt;
&lt;h1&gt;
  
  
  TL;DR - 
&lt;/h1&gt;

&lt;p&gt;The methods that we are going to review are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Including data in JWT tokens&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Overload input for OPA within the query&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Polling for data using Bundles&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Pushing data into OPA using the API&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Pulling data using OPA during Policy Evaluation&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;OPAL (Open Policy Administration Layer)&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Before we dive into details, let’s first cover some basics - &lt;/p&gt;
&lt;h2&gt;
  
  
  What is OPA
&lt;/h2&gt;

&lt;p&gt;Authorization is becoming increasingly complicated - applications are getting bigger and require handling more users than ever before, policies are becoming more complex and dependent on multiple factors (Like a client’s location, time of the action, user roles, and relations to resources).&lt;br&gt;
This is where OPA (Open Policy Agent) comes in - OPA is a great open-source tool that allows us to evaluate complicated policies. It’s fast, part of the CNCF (Which means it adheres to CNCF’s guidelines and standards), and is used for handling permissions in some of the largest companies in the world (e.g. Netflix, Pinterest, and others). You can check out an introduction to OPA &lt;a href="https://www.permit.io/blog/introduction-to-opa" rel="noopener noreferrer"&gt;here&lt;/a&gt;. &lt;br&gt;
⁠&lt;/p&gt;
&lt;h2&gt;
  
  
  How OPA Works with Data
&lt;/h2&gt;

&lt;p&gt;Managing policies with OPA often requires relevant contextual data - Information about the user, the resource they are trying to access, etc. Without this information, OPA will not be able to make the right decisions when it comes to deciding on policies. &lt;br&gt;
For example - a policy that states “Only paying users can access this feature” requires OPA to have information on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Who my users are&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Which one of them is a paying user, and which isn’t&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A policy that states “Users in the application can only access their own photos, or those of their children” requires OPA to know:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Who are the application’s users&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Which user is a parent, which user is a child, and which user relates to who&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Which photo belongs to each user&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Having access to this contextual data is thus critical for OPA to be able to make its decisions. &lt;/p&gt;

&lt;p&gt;The bottom-line question is - how can we bring this data into OPA, and which way is the most effective to do so? &lt;/p&gt;
&lt;h2&gt;
  
  
  The data fetching mechanism: Basic requirements
&lt;/h2&gt;

&lt;p&gt; &lt;br&gt;
Before we dive into the different methods of fetching data for OPA, let’s agree on a couple of basic guidelines for how this data fetching mechanism should work:&lt;br&gt;
It's necessary to be able to handle data about policies on a large scale&lt;/p&gt;

&lt;p&gt;Because data can come from many sources, thus getting very complex very quickly, we want this mechanism to be as easily manageable as possible.&lt;/p&gt;

&lt;p&gt;The data fetching mechanism needs to be operational in real-time (This is a crucial component that will allow us to avoid a &lt;a href="https://storage.googleapis.com/pub-tools-public-publication-data/pdf/41f08f03da59f5518802898f68730e247e23c331.pdf" rel="noopener noreferrer"&gt;“New enemy attack”&lt;/a&gt; - a situation where a user with revoked permission can still access sensitive data because the permissions have not been updated in time between the different parts of the system).&lt;/p&gt;

&lt;p&gt;It should be easy to maintain because the need for access control is here to stay and is likely to evolve in the future.&lt;/p&gt;

&lt;p&gt;Now that we've established some basic requirements, let’s dive into the various data fetching mechanisms we can utilize to solve our issue in the most efficient way.&lt;/p&gt;

&lt;p&gt;Let’s dive in!&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  1. Including data in JWT tokens:
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Far131kmbns6u3bk7o5pc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Far131kmbns6u3bk7o5pc.png" alt="Including data in JWT tokens" width="654" height="630"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://tools.ietf.org/html/rfc7519" rel="noopener noreferrer"&gt;JSON Web Tokens (JWT)&lt;/a&gt; allow you to securely transmit signed JSON data between software systems and are usually produced during the authentication process. JWTs can be sent to OPA as inputs thus enabling OPA to make decisions about a Policy query.&lt;/p&gt;

&lt;p&gt;For example, this is what a &lt;a href="https://jwt.io/#debugger-io?token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwicm9sZXMiOlsiYWRtaW4iXSwicmVsYXRlZF9pbWFnZXMiOlsiaW1hZ2UxLnBuZyIsImltYWdlMi5wbmciXSwiaWF0IjoxNTE2MjM5MDIyfQ.Qkur5-lKPBMhZLqgl-BjkZzyjiHVSoq1p1C36vUiuQU" rel="noopener noreferrer"&gt;JWT with authorization data looks like&lt;/a&gt;:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjcuh4sl91hxe76qlm0s2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjcuh4sl91hxe76qlm0s2.png" alt="JWT Example" width="591" height="617"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The first part is the algorithm for the secure signing, and in the middle, we can see the roles and related images for our authorization.&lt;/p&gt;

&lt;p&gt;The good:&lt;br&gt;
JWTs are an easy-to-use well-known technology that you probably already utilize in your system (as part of the authentication layer).&lt;/p&gt;

&lt;p&gt;The bad:&lt;br&gt;
JWTs have a size limit - not everything can be decoded into a JWT, while it looks OK in the example presented above, if a user &lt;a href="https://jwt.io/#debugger-io?token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.{"sub":"1234567890","name":"John Doe","roles":["admin"],"related_images":["image0.png","image1.png","image2.png","image3.png","image4.png","image5.png","image6.png","image7.png","image8.png","image9.png","image10.png","image11.png","image12.png","image13.png","image14.png","image15.png","image16.png","image17.png","image18.png","image19.png","image20.png","image21.png","image22.png","image23.png","image24.png","image25.png","image26.png","image27.png","image28.png","image29.png","image30.png","image31.png","image32.png","image33.png","image34.png","image35.png","image36.png","image37.png","image38.png","image39.png","image40.png","image41.png","image42.png","image43.png","image44.png","image45.png","image46.png","image47.png","image48.png","image49.png","image50.png","image51.png","image52.png","image53.png","image54.png","image55.png","image56.png","image57.png","image58.png","image59.png","image60.png","image61.png","image62.png","image63.png","image64.png","image65.png","image66.png","image67.png","image68.png","image69.png","image70.png","image71.png","image72.png","image73.png","image74.png","image75.png","image76.png","image77.png","image78.png","image79.png","image80.png","image81.png","image82.png","image83.png","image84.png","image85.png","image86.png","image87.png","image88.png","image89.png","image90.png","image91.png","image92.png","image93.png","image94.png","image95.png","image96.png","image97.png","image98.png","image99.png","image100.png","image101.png","image102.png","image103.png","image104.png","image105.png","image106.png","image107.png","image108.png","image109.png","image110.png","image111.png","image112.png","image113.png","image114.png","image115.png","image116.png","image117.png","image118.png","image119.png","image120.png","image121.png","image122.png","image123.png","image124.png","image125.png","image126.png","image127.png","image128.png","image129.png","image130.png","image131.png","image132.png","image133.png","image134.png","image135.png","image136.png","image137.png","image138.png","image139.png","image140.png","image141.png","image142.png","image143.png","image144.png","image145.png","image146.png","image147.png","image148.png","image149.png","image150.png","image151.png","image152.png","image153.png","image154.png","image155.png","image156.png","image157.png","image158.png","image159.png","image160.png","image161.png","image162.png","image163.png","image164.png","image165.png","image166.png","image167.png","image168.png","image169.png","image170.png","image171.png","image172.png","image173.png","image174.png","image175.png","image176.png","image177.png","image178.png","image179.png","image180.png","image181.png","image182.png","image183.png","image184.png","image185.png","image186.png","image187.png","image188.png","image189.png","image190.png","image191.png","image192.png","image193.png","image194.png","image195.png","image196.png","image197.png","image198.png","image199.png","image200.png","image201.png","image202.png","image203.png","image204.png","image205.png","image206.png","image207.png","image208.png","image209.png","image210.png","image211.png","image212.png","image213.png","image214.png","image215.png","image216.png","image217.png","image218.png","image219.png","image220.png","image221.png","image222.png","image223.png","image224.png","image225.png","image226.png","image227.png","image228.png","image229.png","image230.png","image231.png","image232.png","image233.png","image234.png","image235.png","image236.png","image237.png","image238.png","image239.png","image240.png","image241.png","image242.png","image243.png","image244.png","image245.png","image246.png","image247.png","image248.png","image249.png","image250.png","image251.png","image252.png","image253.png","image254.png","image255.png","image256.png","image257.png","image258.png","image259.png","image260.png","image261.png","image262.png","image263.png","image264.png","image265.png","image266.png","image267.png","image268.png","image269.png","image270.png","image271.png","image272.png","image273.png","image274.png","image275.png","image276.png","image277.png","image278.png","image279.png","image280.png","image281.png","image282.png","image283.png","image284.png","image285.png","image286.png","image287.png","image288.png","image289.png","image290.png","image291.png","image292.png","image293.png","image294.png","image295.png","image296.png","image297.png","image298.png","image299.png","image300.png","image301.png","image302.png","image303.png","image304.png","image305.png","image306.png","image307.png","image308.png","image309.png","image310.png","image311.png","image312.png","image313.png","image314.png","image315.png","image316.png","image317.png","image318.png","image319.png","image320.png","image321.png","image322.png","image323.png","image324.png","image325.png","image326.png","image327.png","image328.png","image329.png","image330.png","image331.png","image332.png","image333.png","image334.png","image335.png","image336.png","image337.png","image338.png","image339.png","image340.png","image341.png","image342.png","image343.png","image344.png","image345.png","image346.png","image347.png","image348.png","image349.png","image350.png","image351.png","image352.png","image353.png","image354.png","image355.png","image356.png","image357.png","image358.png","image359.png","image360.png","image361.png","image362.png","image363.png","image364.png","image365.png","image366.png","image367.png","image368.png","image369.png","image370.png","image371.png","image372.png","image373.png","image374.png","image375.png","image376.png","image377.png","image378.png","image379.png","image380.png","image381.png","image382.png","image383.png","image384.png","image385.png","image386.png","image387.png","image388.png","image389.png","image390.png","image391.png","image392.png","image393.png","image394.png","image395.png","image396.png","image397.png","image398.png","image399.png","image400.png","image401.png","image402.png","image403.png","image404.png","image405.png","image406.png","image407.png","image408.png","image409.png","image410.png","image411.png","image412.png","image413.png","image414.png","image415.png","image416.png","image417.png","image418.png","image419.png","image420.png","image421.png","image422.png","image423.png","image424.png","image425.png","image426.png","image427.png","image428.png","image429.png","image430.png","image431.png","image432.png","image433.png","image434.png","image435.png","image436.png","image437.png","image438.png","image439.png","image440.png","image441.png","image442.png","image443.png","image444.png","image445.png","image446.png","image447.png","image448.png","image449.png","image450.png","image451.png","image452.png","image453.png","image454.png","image455.png","image456.png","image457.png","image458.png","image459.png","image460.png","image461.png","image462.png","image463.png","image464.png","image465.png","image466.png","image467.png","image468.png","image469.png","image470.png","image471.png","image472.png","image473.png","image474.png","image475.png","image476.png","image477.png","image478.png","image479.png","image480.png","image481.png","image482.png","image483.png","image484.png","image485.png","image486.png","image487.png","image488.png","image489.png","image490.png","image491.png","image492.png","image493.png","image494.png","image495.png","image496.png","image497.png","image498.png","image499.png","image500.png","image501.png","image502.png","image503.png","image504.png","image505.png","image506.png","image507.png","image508.png","image509.png","image510.png","image511.png","image512.png","image513.png","image514.png","image515.png","image516.png","image517.png","image518.png","image519.png","image520.png","image521.png","image522.png","image523.png","image524.png","image525.png","image526.png","image527.png","image528.png","image529.png","image530.png","image531.png","image532.png","image533.png","image534.png","image535.png","image536.png","image537.png","image538.png","image539.png","image540.png","image541.png","image542.png","image543.png","image544.png","image545.png","image546.png","image547.png","image548.png","image549.png","image550.png","image551.png","image552.png","image553.png","image554.png","image555.png","image556.png","image557.png","image558.png","image559.png","image560.png","image561.png","image562.png","image563.png","image564.png","image565.png","image566.png","image567.png","image568.png","image569.png","image570.png","image571.png","image572.png","image573.png","image574.png","image575.png","image576.png","image577.png","image578.png","image579.png","image580.png","image581.png","image582.png","image583.png","image584.png","image585.png","image586.png","image587.png","image588.png","image589.png","image590.png","image591.png","image592.png","image593.png","image594.png","image595.png","image596.png","image597.png","image598.png","image599.png","image600.png","image601.png","image602.png","image603.png","image604.png","image605.png","image606.png","image607.png","image608.png","image609.png","image610.png","image611.png","image612.png","image613.png","image614.png","image615.png","image616.png","image617.png","image618.png","image619.png","image620.png","image621.png","image622.png","image623.png","image624.png","image625.png","image626.png","image627.png","image628.png","image629.png","image630.png","image631.png","image632.png","image633.png","image634.png","image635.png","image636.png","image637.png","image638.png","image639.png","image640.png","image641.png","image642.png","image643.png","image644.png","image645.png","image646.png","image647.png","image648.png","image649.png","image650.png","image651.png","image652.png","image653.png","image654.png","image655.png","image656.png","image657.png","image658.png","image659.png","image660.png","image661.png","image662.png","image663.png","image664.png","image665.png","image666.png","image667.png","image668.png","image669.png","image670.png","image671.png","image672.png","image673.png","image674.png","image675.png","image676.png","image677.png","image678.png","image679.png","image680.png","image681.png","image682.png","image683.png","image684.png","image685.png","image686.png","image687.png","image688.png","image689.png","image690.png","image691.png","image692.png","image693.png","image694.png","image695.png","image696.png","image697.png","image698.png","image699.png","image700.png","image701.png","image702.png","image703.png","image704.png","image705.png","image706.png","image707.png","image708.png","image709.png","image710.png","image711.png","image712.png","image713.png","image714.png","image715.png","image716.png","image717.png","image718.png","image719.png","image720.png","image721.png","image722.png","image723.png","image724.png","image725.png","image726.png","image727.png","image728.png","image729.png","image730.png","image731.png","image732.png","image733.png","image734.png","image735.png","image736.png","image737.png","image738.png","image739.png","image740.png","image741.png","image742.png","image743.png","image744.png","image745.png","image746.png","image747.png","image748.png","image749.png","image750.png","image751.png","image752.png","image753.png","image754.png","image755.png","image756.png","image757.png","image758.png","image759.png","image760.png","image761.png","image762.png","image763.png","image764.png","image765.png","image766.png","image767.png","image768.png","image769.png","image770.png","image771.png","image772.png","image773.png","image774.png","image775.png","image776.png","image777.png","image778.png","image779.png","image780.png","image781.png","image782.png","image783.png","image784.png","image785.png","image786.png","image787.png","image788.png","image789.png","image790.png","image791.png","image792.png","image793.png","image794.png","image795.png","image796.png","image797.png","image798.png","image799.png","image800.png","image801.png","image802.png","image803.png","image804.png","image805.png","image806.png","image807.png","image808.png","image809.png","image810.png","image811.png","image812.png","image813.png","image814.png","image815.png","image816.png","image817.png","image818.png","image819.png","image820.png","image821.png","image822.png","image823.png","image824.png","image825.png","image826.png","image827.png","image828.png","image829.png","image830.png","image831.png","image832.png","image833.png","image834.png","image835.png","image836.png","image837.png","image838.png","image839.png","image840.png","image841.png","image842.png","image843.png","image844.png","image845.png","image846.png","image847.png","image848.png","image849.png","image850.png","image851.png","image852.png","image853.png","image854.png","image855.png","image856.png","image857.png","image858.png","image859.png","image860.png","image861.png","image862.png","image863.png","image864.png","image865.png","image866.png","image867.png","image868.png","image869.png","image870.png","image871.png","image872.png","image873.png","image874.png","image875.png","image876.png","image877.png","image878.png","image879.png","image880.png","image881.png","image882.png","image883.png","image884.png","image885.png","image886.png","image887.png","image888.png","image889.png","image890.png","image891.png","image892.png","image893.png","image894.png","image895.png","image896.png","image897.png","image898.png","image899.png","image900.png","image901.png","image902.png","image903.png","image904.png","image905.png","image906.png","image907.png","image908.png","image909.png","image910.png","image911.png","image912.png","image913.png","image914.png","image915.png","image916.png","image917.png","image918.png","image919.png","image920.png","image921.png","image922.png","image923.png","image924.png","image925.png","image926.png","image927.png","image928.png","image929.png","image930.png","image931.png","image932.png","image933.png","image934.png","image935.png","image936.png","image937.png","image938.png","image939.png","image940.png","image941.png","image942.png","image943.png","image944.png","image945.png","image946.png","image947.png","image948.png","image949.png","image950.png","image951.png","image952.png","image953.png","image954.png","image955.png","image956.png","image957.png","image958.png","image959.png","image960.png","image961.png","image962.png","image963.png","image964.png","image965.png","image966.png","image967.png","image968.png","image969.png","image970.png","image971.png","image972.png","image973.png","image974.png","image975.png","image976.png","image977.png","image978.png","image979.png","image980.png","image981.png","image982.png","image983.png","image984.png","image985.png","image986.png","image987.png","image988.png","image989.png","image990.png","image991.png","image992.png","image993.png","image994.png","image995.png","image996.png","image997.png","image998.png","image999.png"],"iat":1516239022}.KGrocKdxHn_ZCkgfl5SAbKxCm8tbqVOBslU_x3SrYAg" rel="noopener noreferrer"&gt;has 1000 files&lt;/a&gt; the JWT length changes from 239 characters to 20,057 - and that’s considering a simple file name. With the full path, it’s even longer. Additionally, a JWT created during the authentication phase doesn’t include all the necessary information required to make the policy decision -  especially if you are using a vendor like Auth0 to authenticate. In addition, storing data in JWTs means we have to refresh the token (read as login/logout) every time we want to update the data. &lt;/p&gt;

&lt;p&gt;The ugly:&lt;br&gt;
You might think it’s a good idea to start with JWTs because you don’t have a lot of data - as time goes by the amount of data grows exponentially, and the situation easily spirals out of control, with an enormous amount of JWTs floating around in each request. &lt;/p&gt;

&lt;p&gt;Bottom-line:&lt;br&gt;
JWTs are ideal for simple identity-related data, and in general, it’s best to think of the claims and data in the JWT as hints about identity (given by the Identity-Management and Authentication layers) rather than verbatim data for authorization.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  2. Overload input for OPA within the query:
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpbanaskj2vd000gw0io6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpbanaskj2vd000gw0io6.png" alt="Overload input for OPA within the query" width="654" height="630"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Another option is to attach input for every policy query to OPA, adding the relevant data to it.  &lt;br&gt;
It will look something like this in python pseudocode wrapping OPA:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;def delete_image(user_id, image_id):
    policy_json_data = {}
    policy_json_data[“user_roles”] = get_user_roles(user_id) # returns list of roles like [“editor”]
    policy_json_data[”user_images”] = get_user_images(user_id) # returns list of images [“img.png”]

# sends request that looks like this:
# localhost:8181 -i -d ‘{"roles": ["pro"], "related_images": ["image0.png", "image1.png"], image_id: “image2.png”}’ -H 'Content-Type: application/json'
# and returns true / false
    permitted = check_opa_policy(policy_json_data, “delete”, image_id) 
    if not permitted:
        raise(AuthorizationError)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The good:&lt;br&gt;
Using this method is simple, and it ensures that only the relevant data is cherry-picked for each query sent, thus avoiding loading/storing a lot of data in OPA.&lt;br&gt;
 &lt;br&gt;
The bad:&lt;br&gt;
This method prevents us from following one of the most important best practices in building authorization - decoupling policy and code. As our code now has to take on the responsibility of tailoring the data for OPA. Having policy and code mixed together in one layer creates a situation where we struggle to upgrade, add capabilities and monitor the code overall as it is replicated between different microservices. Each change would require us to refactor large areas of code that only drift further from one another as these microservices develop.&lt;/p&gt;

&lt;p&gt;The ugly:&lt;br&gt;
Having so much code repetition is an antithesis to the &lt;a href="https://en.wikipedia.org/wiki/Don%27t_repeat_yourself" rel="noopener noreferrer"&gt;DRY&lt;/a&gt; principle - creating a multitude of complications and difficulties as our application evolves. Considering the example code above for instance, a very similar code will be written to delete_image, update_image, and get_image.&lt;/p&gt;

&lt;p&gt;Bottom-line:&lt;br&gt;
In general, it is best to leave this method for simple cases or to augment more advanced cases with cherry-picking.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  3. Polling for data using Bundles
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feg63nn96nxolj31grutf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feg63nn96nxolj31grutf.png" alt="Polling for data using Bundles" width="654" height="630"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The bundle feature periodically checks and downloads policy bundles from a centralized server, which can include both data and policies. An example of a simple way to implement this solution would be running an Nginx container that serves the bundle files and configuring OPA to fetch data from it (using s3 buckets is also a common pattern). The configuration for OPA will be as follows:&lt;br&gt;
&lt;br&gt;
 &lt;/p&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;services:
  nginx:
    url: https://my-nginx.example.com
    credentials:
      bearer:
        token: dGVzdGluZzp0ZXN0aW5n
        scheme: Basic

bundles:
  authz:
    service: nginx
    resource: /bundle.tar.gz
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;The good:&lt;br&gt;
It allows you to load large amounts of data (much larger than the 2 previous methods), it has a delta bundle feature that lets you sync only new data (but not policy), it lets you have one source of truth, and it is more readable than JWTs.&lt;br&gt;
 &lt;br&gt;
The bad:&lt;br&gt;
Using bundles doesn’t cut it when we have data that changes rapidly, as it requires triggering a full policy update for every small change - Making this a very inefficient process.&lt;/p&gt;

&lt;p&gt;The ugly:&lt;br&gt;
Even with the new delta bundle feature, you still need to manage and create the bundles on your own, and it works with polling which isn’t real-time.&lt;/p&gt;

&lt;p&gt;In addition, being dependent on a polling interval means you have to choose between rapid polling which can result in high costs or slow polling which can lead to delays and risk of inconsistency.&lt;/p&gt;

&lt;p&gt;The bottom line:&lt;br&gt;
For cases where updates to data mainly come as part of the CI/CD cycle, bundles are a great option.  Bundles can also work well for static or rather static applications. For modern dynamic applications, this option might be too slow/inefficient on its own. &lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  4. Pushing data into OPA using the API
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft9irp12udfrrqxgha8ha.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft9irp12udfrrqxgha8ha.png" alt="Pushing data into OPA using the API" width="654" height="630"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can also push policy data into OPA with an API request - this approach is similar in most aspects to the bundle API, except it allows you to optimize for update latency and network traffic. It will look something like this in python pseudo-code:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;def send_user_update_to_opa():
    requests.put(f”{opa_url}/users”, params={users: [user1,user2]})

def callback_on_new_user():
    all_users = get_all_users()
    send_update_to_opa(all_users)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;In this example, we are updating the user list of OPA for each callback on new user creation.&lt;/p&gt;

&lt;p&gt;The good:&lt;br&gt;
This way you don’t need to load the entire bundle at every update, you can also update part of it, which is much more performant in terms of memory and network usage - as well as giving you more control of how you manage distributed data into OPA.&lt;/p&gt;

&lt;p&gt;The bad:&lt;br&gt;
Applying this method to import new kinds of data from different data sources is going to require a continuous effort of writing enormous amounts of code.&lt;/p&gt;

&lt;p&gt;The ugly:&lt;br&gt;
This method requires continuous maintenance - you can’t just set it up and forget about it. If left abandoned, this code will very quickly become obsolete. &lt;/p&gt;

&lt;p&gt;The bottom line: &lt;br&gt;
Great way to load data into OPA in a dynamic fashion, but requires a lot of development and administration in all but very simple cases.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  5. Pulling data using OPA during Policy Evaluation
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu433tzpk0er2ekgqw5rc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu433tzpk0er2ekgqw5rc.png" alt="Pulling data using OPA during Policy Evaluation" width="654" height="630"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;OPA includes a function (&lt;code&gt;http.send()&lt;/code&gt;) that allows it to reach out to external HTTP servers during evaluation and request additional data. It will look something like this in Rego pseudo-code:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
default allow = false
 
allow = true {
    input.method == "GET"
    input.path = ["getSalary", user]
    managers := http.send(get_managers_url)
    managers := managers[input.user][_]
    contains(managers, user)
}

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You can see the call to http.send(get_managers_url) that returns the list of the managers to help evaluate the policy. Similarly, you can embed more functions into OPA as a plugin to fetch data as part of a query from other sources.&lt;/p&gt;

&lt;p&gt;The good:&lt;br&gt;
This is a solid option to use when you have a very large volume of data that is required to make permission decisions, and you cannot load it all into OPA.&lt;/p&gt;

&lt;p&gt;The bad:&lt;br&gt;
Using this method puts a strain on OPA as it always comes with network latency that slows all of your policy evaluations. Additionally, this method is prone to network errors.  &lt;/p&gt;

&lt;p&gt;The ugly:&lt;br&gt;
Error handling with rego isn’t simple at all, and relying on this feature can lead to some &lt;a href="https://github.com/open-policy-agent/opa/pull/2763" rel="noopener noreferrer"&gt;frustrating results&lt;/a&gt;. While OPA and Rego can be used to evaluate policies very quickly, you may want to avoid adding more logic than you need.&lt;/p&gt;

&lt;p&gt;The bottom line: &lt;br&gt;
This is a great way to load data into OPA in a highly dynamic way without writing a lot of code. That being said, this solution is not applicable when the relevant data requires parsing or edge case handling, which Rego lacks. &lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  6. OPAL (Open Policy Administration Layer):
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdd6vutu871xkn5ayvt27.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdd6vutu871xkn5ayvt27.png" alt="OPAL Open Policy Administration Layer" width="654" height="630"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;OPAL &lt;a href="https://github.com/permitio/opal" rel="noopener noreferrer"&gt;is an open-source project&lt;/a&gt; for administering authorization and access control for OPA. OPAL responds to policy and data changes, pushes live updates to OPA agents, and thus brings open policy up to the speed needed by live applications.&lt;/p&gt;

&lt;p&gt;To run OPAL with OPA you can simply &lt;a href="https://github.com/permitio/opal/blob/master/docs/HOWTO/get_started_with_opal_docker_compose_tutorial.md" rel="noopener noreferrer"&gt;use the Docker example&lt;/a&gt;. Send an &lt;a href="https://github.com/permitio/opal/blob/master/docs/HOWTO/trigger_data_updates.md" rel="noopener noreferrer"&gt;update to OPAL on every change in your data&lt;/a&gt; or connect your data source's webhook with OPAL and let OPAL stream the updates to OPA.&lt;/p&gt;

&lt;p&gt;The good:&lt;br&gt;
OPAL includes live updates and Git tracking (GitOps) and saves you the hassle of having to write all the code by yourself like in the ‘Pushing Data with API’ option.&lt;/p&gt;

&lt;p&gt;The bad:&lt;br&gt;
OPAL is a fairly new library, it might take some time to learn and some work to integrate into your project.&lt;/p&gt;

&lt;p&gt;The ugly:&lt;br&gt;
First of all, OPAL is beautiful (But being one of the contributors to this open source project I might be biased). That being said, the architecture can be a bit more complicated than bundle server/JWTs, so you might need to take your time and make sure you understand it.&lt;/p&gt;

&lt;p&gt;The bottom line:&lt;br&gt;
OPAL is inspired by the way companies like Netflix work with OPA, but it requires some work to set up. Simple applications will do better with one of the other methods, but for full modern applications, OPAL is probably the more robust/reliable option. &lt;/p&gt;



&lt;h1&gt;
  
  
  Conclusion
&lt;/h1&gt;

&lt;p&gt;There are various methods to build data fetching mechanisms - each of them having their own pros and cons. &lt;/p&gt;

&lt;p&gt;Some of these methods (Including data in JWT tokens and using Overload input for OPA within the query) could only prove useful in simple cases, some (Polling for data using Bundles) lack effectiveness in dynamic applications. Pushing data with API is a good solution to load data into OPA in a dynamic fashion while requiring a lot of development and administration, and Pulling data using OPA during Policy Evaluation is not applicable when the relevant data requires parsing or edge case handling. OPAL has the advantage of being a more robust/reliable solution, but it requires you to adopt new open-source-based technology.&lt;br&gt;
The most important thing to take from this review is understanding the complexities and challenges of building data fetching mechanisms correctly, and understanding that every method has its pros and cons. &lt;br&gt;
⁠&lt;br&gt;
⁠Still not sure which method is the right one for you and your architecture? Need someone to brainstorm with? Don’t be shy - reach out to us on our &lt;a href="https://bit.ly/permitcommunity" rel="noopener noreferrer"&gt;Slack community&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>opa</category>
      <category>authorization</category>
      <category>tutorial</category>
      <category>authz</category>
    </item>
    <item>
      <title>A Guide for an Awesome Custom Auth0 Universal login</title>
      <dc:creator>OdedBD</dc:creator>
      <pubDate>Wed, 26 Jan 2022 10:13:52 +0000</pubDate>
      <link>https://dev.to/permit_io/a-guide-for-an-awesome-custom-auth0-universal-login-100h</link>
      <guid>https://dev.to/permit_io/a-guide-for-an-awesome-custom-auth0-universal-login-100h</guid>
      <description>&lt;p&gt;Your login and sign-up screens are the gateway to your app - the first thing a person sees before entering your actual application. So, they better look amazing, if you want an awesome app.&lt;/p&gt;

&lt;p&gt;While creating our own login screen at Permit.io, I had to review and collect data from multiple different guides, so I finally decided to incorporate them into one unified guide that will help you transform your own login screen completely.&lt;/p&gt;

&lt;p&gt;In this guide, we will cover:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;5 reasons why you should customize the default Auth0 login&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;How to edit the default Auth0 login template&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;How to edit the Auth0 default title and description&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Which customization features are yet to be available&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Using Auth0 authentication has its advantages - It’s fast, secure, and highly functional. &lt;br&gt;
That being said, you can’t have the first thing your user sees when entering your app look like this: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgor1u6wx8wlnzprzny4r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgor1u6wx8wlnzprzny4r.png" alt="Auth0 Default" width="484" height="279"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  5 reasons why you should customize the default Auth0 login -
&lt;/h2&gt;

&lt;p&gt;While functional, using the default Auth0 login screen has some key issues:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;While the login / sign-up screen is a crucial step in a user’s onboarding process, the default Auth0 login screen lacks some important elements - The company name is there, but the &lt;strong&gt;overall look is different&lt;/strong&gt;. This makes the login screen seem like a &lt;strong&gt;foreign entity inside your application&lt;/strong&gt;. And that’s not a good user experience. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The default option Auth0 provides in login through an &lt;strong&gt;external domain&lt;/strong&gt; that belongs to Auth0, meaning each time someone wants to log in to use your application they are &lt;strong&gt;redirected to a domain outside that of your company&lt;/strong&gt;. Your users might have no idea what Auth0 is, or why they are referred to this external website to provide their login information. This looks both unprofessional and unsecure. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This sense of unfamiliarity creates another issue: because the login screen doesn’t look like the rest of your company’s user interface, and it is based on a domain outside your company, &lt;strong&gt;it can be easily interpreted by the user as a &lt;a href="https://auth0.com/blog/phishing-attacks-with-auth0-facts-first/" rel="noopener noreferrer"&gt;phishing attack&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The message displayed reads: “Log in to ‘Company Name’ to continue to ‘Application Name’”. Not only is this not the most inviting message, changing it is no trivial task (As we will see later on).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The login interface uses only a small percentage of your screen, the rest of it being just one color, making it look quite dull and uninviting on one of the most important screens in your entire app. &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;While the good news is that most of these features are customizable, the bad news is that implementing these customizations is no easy feat, and far from intuitive. Hence this guide 😉&lt;br&gt;
&lt;br&gt;
&lt;/p&gt;

&lt;h2&gt;
  
  
  What can we do about this?
&lt;/h2&gt;

&lt;p&gt;Overcoming these issues took me a while, but we were very pleased with the end result:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm77d3eml74gn8fqw2dkh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm77d3eml74gn8fqw2dkh.png" alt="Finished Result" width="800" height="626"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So how did we get here? Let’s review the steps:&lt;/strong&gt;&lt;/p&gt;



&lt;h2&gt;
  
  
  1. Enabling custom domains
&lt;/h2&gt;

&lt;p&gt;As we have stated before, having your login/signup based in a domain outside your company creates various issues. Apart from that, Auth0 only allows you to customize your login screen by using a custom domain - which is a paid feature. &lt;/p&gt;

&lt;p&gt;To do this - &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Choose the correct tenant (most likely production).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In the left sidebar go to &lt;strong&gt;Branding&lt;/strong&gt; &amp;gt; &lt;strong&gt;Custom Domains&lt;/strong&gt;.&lt;br&gt;
(If you haven’t upgraded your plan to include custom domain support, you will need to do that first).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpeaa719787nxqwc7ywy7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpeaa719787nxqwc7ywy7.png" alt="Custom Domain" width="800" height="216"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Approve your custom domain through the instructions provided by Auth0 to prove that you actually own it (This includes adding some TXT entries to the domain).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This is what an approved custom domain should look like (notice the &lt;strong&gt;ready&lt;/strong&gt; status):&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feayg9xm9wpe41hhbzeg3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feayg9xm9wpe41hhbzeg3.png" alt="Ready" width="800" height="357"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  2. Editing the login template
&lt;/h2&gt;

&lt;p&gt;Now that we have a custom domain, we can get to editing the login screen itself. &lt;/p&gt;

&lt;p&gt;If you check out &lt;a href="https://auth0.com/docs/brand-and-customize/universal-login-page-templates" rel="noopener noreferrer"&gt;Auth0’s documentation&lt;/a&gt; you will notice they suggest using POST requests to update the template. This means posting all of the code for the entire page every time we want to make the smallest of changes. That can be a huge hassle. &lt;/p&gt;

&lt;p&gt;To overcome this issue, I used &lt;a href="https://github.com/auth0/auth0-cli" rel="noopener noreferrer"&gt;Auth0 CLI&lt;/a&gt; (That’s still in beta, but works &lt;em&gt;almost&lt;/em&gt; perfectly) which utilizes &lt;a href="https://storybook.js.org/" rel="noopener noreferrer"&gt;Storybook&lt;/a&gt;. Auth0 CLI allows you to edit the login template from your code editor while previewing those changes in Storybook as you go along.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to do this:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Download Auth0 CLI:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On Mac:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;brew tap auth0/auth0-cli &amp;amp;&amp;amp; brew install auth0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;On Linux:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;brew tap auth0/auth0-cli &amp;amp;&amp;amp; brew install auth0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;On windows (With Scoop):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;scoop bucket add auth0 https://github.com/auth0/scoop-auth0-cli.git 
⁠scoop install auth0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Check &lt;a href="https://github.com/auth0/auth0-cli" rel="noopener noreferrer"&gt;this link&lt;/a&gt; for more options.&lt;br&gt;
⁠&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Login to your account using the following command: &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;auth0 login&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Run the following command: &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;auth0 branding templates update&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;This will open your default code editor (I recommend &lt;a href="https://stackoverflow.com/a/36644561/1037613" rel="noopener noreferrer"&gt;setting VSCode as your default editor&lt;/a&gt;), and a Storybook window in your browser, previewing the current state of your login screen. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;When you make changes in your code editor, you see them updated live in the Storybook preview window. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbtazd3t9u63xi10jnet5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbtazd3t9u63xi10jnet5.png" alt="Storybook Preview" width="800" height="344"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This is how the StoryBook preview looks like&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Remember to add &lt;code&gt;{%- auth0:head -%}&lt;/code&gt; in the HTML head tag 
⁠and &lt;code&gt;{%- auth0:widget -%}&lt;/code&gt; where you want the Auth0 widget to be injected. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is an example of a basic template that displays the Auth0 login, (we also shared our full template at the end of this guide):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;⁠html
&amp;lt;!DOCTYPE html&amp;gt;&amp;lt;html&amp;gt;
  &amp;lt;head&amp;gt;
    {%- auth0:head -%}
  &amp;lt;/head&amp;gt;
  &amp;lt;body&amp;gt;
    {%- auth0:widget -%}
  &amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;When you close the editor, Auth0 CLI will ask you if you want to update the login template. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F35xifmzii1j5oes0azyj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F35xifmzii1j5oes0azyj.png" alt="Approve" width="800" height="64"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Approve, and you’re done!&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Important note:&lt;/strong&gt;&lt;br&gt;
The authentication widget previewed on Storybook is not identical to the actual one that is going to appear on your website. These could also display a bit differently on mobile/different screens - so make sure to recheck everything in your real environment after updating your template. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwnk9xk1jbfzcrxt7t4u1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwnk9xk1jbfzcrxt7t4u1.png" alt="Versus" width="793" height="693"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Note the Storybook preview (Left) vs. the actual version (right).&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;⁠&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Editing Auth0 widget default title and description
&lt;/h2&gt;

&lt;p&gt;⁠In this part, I’ll explain how to change the default text templates provided in the Auth0 login screen through API management. The default text will look like this:&lt;/p&gt;

&lt;p&gt;Log in to `Company Name’ to continue to ‘Application Name’&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;To do this:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;First, you will need to get your API management token: Go to
&lt;strong&gt;Applications&lt;/strong&gt; &amp;gt; &lt;strong&gt;APIs&lt;/strong&gt;, click on Auth0 Management API. Go to the API Explorer tag, and copy the token by clicking the copy icon on the right. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbwul1trqbiqrm7mi3s6v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbwul1trqbiqrm7mi3s6v.png" alt="Copy" width="32" height="35"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6z1awlo8n799vritoiyo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6z1awlo8n799vritoiyo.png" alt="APIs" width="800" height="150"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqyuwzc70uabvz5llgr6i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqyuwzc70uabvz5llgr6i.png" alt="API Managment" width="800" height="286"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go to the &lt;a href="https://auth0.com/docs/brand-and-customize/text-customization-new-universal-login/prompt-login" rel="noopener noreferrer"&gt;Auth0 “prompt: login” Documentation&lt;/a&gt;, and get the names of the strings you want to change. For example, the key for the following login screen string:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;Log in to ${companyName} to continue to ${clientName}&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Is &lt;code&gt;description&lt;/code&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Go to “Set custom text for a specific prompt” in &lt;a href="https://auth0.com/docs/api/management/v2#!/Prompts/put_custom_text_by_language" rel="noopener noreferrer"&gt;Auth0’s API management docs&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;On the top left side of the screen, click “&lt;strong&gt;Set API Token&lt;/strong&gt;”, and paste the API token you copied. &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhrxmhcpyauoo8vqbik1k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhrxmhcpyauoo8vqbik1k.png" alt="API Token" width="184" height="57"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Select the prompt you would like to make changes to (in our case: login)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Select the language (in our case: EN - English)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Under “body” - add all of the changes you wish to make in this prompt (in our case: description and title) &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftmcr7enwynly2a9ua0nk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftmcr7enwynly2a9ua0nk.png" alt="Custom Text" width="748" height="792"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NOTE:&lt;/strong&gt; If you want to change more than one prompt, you have to make both changes first, and then save them together. If you do them separately the first will revert to its original state.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;TRY&lt;/strong&gt; to save your changes.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjones20x7yk6x4hzv5d4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjones20x7yk6x4hzv5d4.png" alt="Try" width="328" height="120"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You may want to repeat this process to edit your signup widget as well. To do this, locate the text you want to change here, and repeat the process while choosing signup instead of login &lt;br&gt;
in all the steps.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
&lt;a&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Things you cannot do with Auth0 universal login
&lt;/h2&gt;

&lt;p&gt;As of the writing of this guide, a feature to change the login widget to request the user to repeat the password on signup is not yet available. A &lt;a href="https://github.com/auth0/lock/issues/61" rel="noopener noreferrer"&gt;GitHub issue for this&lt;/a&gt; has been open since 2014, yet no relevant action was taken.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;I hope this guide enabled you to set up your own authentication via Auth0. *&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Usually, once you have authentication set up, the next step is to do authorization!&lt;br&gt;
⁠Check out our blog post on the &lt;a href="https://www.permit.io/blog/5-best-practices-for-building-cloud-native-permissions" rel="noopener noreferrer"&gt;5 best practices for building cloud-native permissions&lt;/a&gt;, or visit &lt;a href="//permit.io"&gt;permit.io&lt;/a&gt; to learn more about getting permissions as a service.&lt;/p&gt;

&lt;p&gt;&lt;a&gt;&lt;/a&gt;&lt;br&gt;
You can check out our own template &lt;a href="https://gist.github.com/obsd/9f05d322a03f47d54b302754e9e000df" rel="noopener noreferrer"&gt;on Github&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;---canonical_url:&lt;a href="https://www.permit.io/blog/custom-auth0-universal-login" rel="noopener noreferrer"&gt;https://www.permit.io/blog/custom-auth0-universal-login&lt;/a&gt;&lt;/p&gt;

</description>
      <category>authentication</category>
      <category>login</category>
      <category>tutorial</category>
      <category>auth0</category>
    </item>
  </channel>
</rss>
