This extension will expose an endpoint you can use from your monitoring tool to monitor your AD/LDAP Connectors
npm i -g wt-cli
wt init
wt create https://raw.githubusercontent.com/auth0/auth0-ldap-connector-health-monitor/master/index.js \
--name auth0-ldap-connector-health-monitor \
--secret AUTH0_DOMAIN="YOUR_AUTH0_DOMAIN" \
--secret AUTH0_CLIENT_ID="YOUR_AUTH0_CLIENT_ID" \
--secret AUTH0_CLIENT_SECRET="YOUR_AUTH0_CLIENT_SECRET"
The client ID and secret must be for a Machine-to-Machine Application with access to the Management API and a read:connections
grant. See https://auth0.com/docs/api/management/v2/create-m2m-app for more information.
Once the task has been deployed you can monitor any connector in your account by calling the task like this:
GET https://webtask.it.auth0.com/api/run/{YOUR_CONTAINER_NAME}/ldap-connector-health?id=con_aabbccddeeffgghh
Where id
is the connection ID of the AD/LDAP Connection in Auth0. You can query the connection ID by using the Management API.
The webtask will return the following:
- 500: Infrastructure error (configuration missing, authentication error, ...).
- 400: Connector is offline.
- 200: Connector is online.
Since the webtask is now handling the "complex logic" (authentication, parsing the response, ...) you can now use any monitoring service like Pingdom, SCOM, Runscope, ... to monitor your AD Connections.
Note: This assumes you use the cluster from Webtask.io, if you use your Auth0 container make sure to call sandbox.it.auth0.com instead of webtask.it.auth0.com
If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
Auth0 helps you to:
- Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
- Add authentication through more traditional username/password databases.
- Add support for linking different user accounts with the same user.
- Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
- Analytics of how, when and where users are logging in.
- Pull data from other sources and add it to the user profile, through JavaScript rules.
- Go to Auth0 and click Sign Up.
- Use Google, GitHub or Microsoft Account to login.
This project is licensed under the MIT license. See the LICENSE file for more info.