aws_auth alternatives and similar packages
Based on the "Authentication" category.
Alternatively, view aws_auth alternatives based on common mentions on social networks and blogs.
-
coherence
Coherence is a full featured, configurable authentication system for Phoenix -
ueberauth
An Elixir Authentication System for Plug-based Web Applications -
phx_gen_auth
An authentication system generator for Phoenix 1.5 applications. -
guardian_db
Guardian DB integration for tracking tokens and ensuring logout cannot be replayed. -
Phauxth
Not actively maintained - Authentication library for Phoenix, and other Plug-based, web applications -
Shield
Shield is an OAuth2 Provider hex package and also a standalone microservice build top of the Phoenix Framework and 'authable' package. -
samly
Elixir Plug library to enable SAML 2.0 SP SSO in Phoenix/Plug applications. -
basic_auth
Elixir Plug to easily add HTTP basic authentication to an app -
elixir_auth_google
👤Minimalist Google OAuth Authentication for Elixir Apps. Tested, Documented & Maintained. Setup in 5 mins. 🚀 -
doorman
Tools to make Plug, and Phoenix authentication simple and flexible. -
Paseto
An Elixir implementation of Paseto (Platform-Agnostic Security Tokens) -
passwordless_auth
A library for simple passwordless authentication -
aeacus
A simple, secure, and highly configurable Elixir identity [username | email | id | etc.]/password authentication module to use with Ecto. -
phoenix_client_ssl
Set of Plugs / Lib to help with SSL Client Auth. -
ueberauth_cas
Central Authentication Service strategy for Überauth -
sigaws
An Elixir library to sign and verify HTTP requests using AWS Signature V4 -
ueberauth_active_directory
Uberauth strategy for Active Directory authentication. -
exBankID
exBankID is a simple stateless API-client for the Swedish BankID API -
zachaeus
An easy to use licensing system, using asymmetric cryptography to generate and validate licenses. -
ueberauth_foursquare
Foursquare OAuth2 Strategy for Überauth
Learn Elixir in as little as 12 Weeks
Do you think we are missing an alternative of aws_auth or a related project?
README
AWSAuth
A small library used to sign AWS request urls using AWS Signature Version 4.
Takes some inspiration from the Simplex Library.
Does both URL and Authorization Header signing.
AWSAuth.sign_url(access_key, secret_key, http_method, url, region, service, headers \\ Map.new)
access_key
: Your AWS Access key
secret_key
: Your AWS secret key
http_method
: "GET","POST","PUT","DELETE", etc
url
: The AWS url you want to sign
region
: The AWS name for the region you want to access (i.e. us-east-1). Check here for the region names
service
: The AWS service you are trying to access (i.e. s3). Check the url above for names as well.
headers
(optional): The headers that will be used in the request. Used for signing the request. For signing, host is the only one required unless using any other x-amx-* headers. If host is present here, it will override using the host in the url to attempt signing. If only the host is needed, then you don't have to supply it and the host from the url will be used.
In most cases, you would probably call it like this (examples using the example access key and secret from AWS):
signed_request = AWSAuth.sign_url("AKIAIOSFODNN7EXAMPLE", "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
"GET",
"https://examplebucket.s3.amazonaws.com/test.txt",
"us-east-1",
"s3")
"https://examplebucket.s3.amazonaws.com/test.txt?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIOSFODNN7EXAMPLE%2F20141219%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20141219T153739Z&X-Amz-Expires=86400&X-Amz-Signature=89d9f702dc8fb4fad2fd75bf07fc8468d60634f13234dd17e63835ed1fc324cd&X-Amz-SignedHeaders=host"
Or if you need to supply headers for signing, like this:
signed_request = AWSAuth.sign_url("AKIAIOSFODNN7EXAMPLE", "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
"GET",
"https://examplebucket.s3.amazonaws.com/test.txt",
"us-east-1",
"s3",
Map.new |> Map.put("x-amz-header","value"))
"https://examplebucket.s3.amazonaws.com/test.txt?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIOSFODNN7EXAMPLE%2F20141219%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20141219T153646Z&X-Amz-Expires=86400&X-Amz-Signature=b05688cc482398bf2d6ff4068560b85b310a6bb24c5d21711b7099ab5e3df510&X-Amz-SignedHeaders=host,x-amx-header"
Using the example from AWS (http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html)
signed_request = AWSAuth.sign_url("AKIAIOSFODNN7EXAMPLE", "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
"GET",
"https://examplebucket.s3.amazonaws.com/test.txt",
"us-east-1",
"s3",
Map.new,
~N[2013-05-24 00:00:00])
"https://examplebucket.s3.amazonaws.com/test.txt?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIOSFODNN7EXAMPLE%2F20130524%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20130524T000000Z&X-Amz-Expires=86400&X-Amz-Signature=aeeed9bbccd4d02ee5c0109b86d86835f995330da4c265957d157751f604d404&X-Amz-SignedHeaders=host"
AWSAuth.sign_authorization_header(access_key, secret_key, http_method, url, region, service, headers \\ Map.new, payload \\ "")
access_key
: Your AWS Access key
secret_key
: Your AWS secret key
http_method
: "GET","POST","PUT","DELETE", etc
url
: The AWS url you want to sign
region
: The AWS name for the region you want to access (i.e. us-east-1). Check here for the region names
service
: The AWS service you are trying to access (i.e. s3). Check the url above for names as well.
headers
(optional. defaults to Map.new
): The headers that will be used in the request. Used for signing the request.
For signing, host is the only one required unless using any other x-amx-* headers.
If host is present here, it will override using the host in the url to attempt signing.
Same goes for the x-amz-content-sha256 headers
If only the host and x-amz-content-sha256 headers are needed, then you don't have to supply it and the host from the url will be used and
the payload will be hashed to get the x-amz-content-sha256 header.
payload
(optional. defaults to ""
): The contents of the payload if there is one.
headers = Map.new
|> Map.put("Date", "Fri, 24 May 2013 00:00:00 GMT")
|> Map.put("x-amz-storage-class", "REDUCED_REDUNDANCY")
|> Map.put("x-amz-date", "20130524T000000Z")
signed_request = AWSAuth.sign_authorization_header("AKIAIOSFODNN7EXAMPLE", "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
"PUT",
"https://examplebucket.s3.amazonaws.com/test$file.text",
"us-east-1",
"s3",
headers,
"Welcome to Amazon S3.")
"AWS4-HMAC-SHA256 Credential=AKIAIOSFODNN7EXAMPLE/20141220/us-east-1/s3/aws4_request,SignedHeaders=date;host;x-amz-content-sha256;x-amz-date;x-amz-storage-class,Signature=dddba55b1ae5cd9233e9dc8e43a0daf6e2e120bec86294b1d80d802cab8af258"
Using the example from AWS (http://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-header-based-auth.html)
headers = Map.new
|> Map.put("Date", "Fri, 24 May 2013 00:00:00 GMT")
|> Map.put("x-amz-storage-class", "REDUCED_REDUNDANCY")
|> Map.put("x-amz-date", "20130524T000000Z")
signed_request = AWSAuth.sign_authorization_header("AKIAIOSFODNN7EXAMPLE", "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
"PUT",
"https://examplebucket.s3.amazonaws.com/test$file.text",
"us-east-1",
"s3",
headers,
"Welcome to Amazon S3.",
~N[2013-05-24 00:00:00])
"AWS4-HMAC-SHA256 Credential=AKIAIOSFODNN7EXAMPLE/20130524/us-east-1/s3/aws4_request,SignedHeaders=date;host;x-amz-content-sha256;x-amz-date;x-amz-storage-class,Signature=98ad721746da40c64f1a55b78f14c238d841ea1380cd77a1b5971af0ece108bd"