Table: auth0_hook - Query Auth0 Hooks using SQL
Auth0 Hooks are customizable scripts executed as part of the Auth0 pipeline, allowing you to customize the behavior of Auth0. They are written in Node.js and can be used for a variety of purposes, such as enriching user profiles, denying access based on custom rules, or even integrating with other services. Hooks are a powerful tool for extending the functionality of Auth0.
Table Usage Guide
The auth0_hook
table provides insights into Hooks within Auth0. As a DevOps engineer or security analyst, explore hook-specific details through this table, including trigger, script, and associated metadata. Utilize it to uncover information about hooks, such as those with specific triggers, the content of the script, and the status of the hook.
Examples
Enabled hook scripts
Analyze the settings to understand the active hook scripts in your Auth0 environment. This can help in managing and troubleshooting your authentication workflows.
select id, name, dependencies, trigger_id, scriptfrom auth0_hookwhere enabled;
select id, name, dependencies, trigger_id, scriptfrom auth0_hookwhere enabled = 1;
Post change password script
Review the configuration for post-password-change procedures to assess the elements within your authentication system. This allows you to pinpoint the specific locations where changes have been made, enabling better security management.
select id, name, script, dependencies, enabledfrom auth0_hookwhere trigger_id = 'post-change-password';
select id, name, script, dependencies, enabledfrom auth0_hookwhere trigger_id = 'post-change-password';
User registration scripts
Analyze the settings to understand the status and dependencies of user registration scripts in Auth0. This could be beneficial in managing and optimizing the user registration process.
select id, name, script, dependencies, enabledfrom auth0_hookwhere trigger_id in ('pre-user-registration', 'post-user-registration');
select id, name, script, dependencies, enabledfrom auth0_hookwhere trigger_id in ('pre-user-registration', 'post-user-registration');
Schema for auth0_hook
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
dependencies | jsonb | Used to store additional metadata. | |
domain_name | text | =, !=, ~~, ~~*, !~~, !~~* | The name of the domain. |
enabled | boolean | Enabled should be set to true if the hook is enabled, false otherwise. | |
id | text | = | A unique ID for the hook. |
name | text | The name of the hook. | |
script | text | A script that contains the hook's code. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
trigger_id | text | The extensibility point name. Can currently be any of the following: credentials-exchange, pre-user-registration, post-user-registration, post-change-password. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- auth0
You can pass the configuration to the command with the --config
argument:
steampipe_export_auth0 --config '<your_config>' auth0_hook