Skip to content

Conversation

@bheesham
Copy link
Contributor

We're seeing a lot of requests to sso.mozilla.com, making it a prime target to move it's auth behind the WAF as well.

Jira: IAM-1856

We're seeing a lot of requests to sso.mozilla.com, making it a prime target to
move it's auth behind the WAF as well.

Jira: IAM-1856
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the OIDC domain configuration to use the WAFified Identity Provider (IdP) endpoint instead of the direct Auth0 domain. This change aims to route authentication traffic through Mozilla's Web Application Firewall (WAF) for improved security and traffic management.

  • Updated OIDC_DOMAIN from auth.mozilla.auth0.com to idp.iam.mozilla.com in both staging and production environments

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated no comments.

File Description
clouddeploy/sso-dashboard-staging.template.yaml Updates OIDC domain configuration to use WAFified IdP for staging environment
clouddeploy/sso-dashboard-prod.template.yaml Updates OIDC domain configuration to use WAFified IdP for production environment

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@bheesham
Copy link
Contributor Author

DO NOT DEPLOY! We're officially at the end of the week's deployment window.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant