Adopt OIDC-Conformant Authentication
Auth0 is a certified OpenID Connect (OIDC) provider. As part of Auth0’s efforts to improve security and standards-based interoperability, we roll out new features exclusively on authentication flows that strictly conform to OIDC specifications.
We will explain the differences between the OIDC-conformant and legacy pipelines and provide suggestions on how to adapt your existing applications. If you are a developer and/or IT administrator who manages Auth0 integrations in your applications using the OAuth 2.0 Authorization Framework. This information is not applicable if you are using SAML or WS-Federation. All authentication flows are described through HTTP requests rather than in the context of any particular language or library implementation.
All new features target only the OIDC-conformant pipeline, and all legacy Auth0 SDK versions are deprecated, do not receive updates for new features or non-critical security issues, and will eventually be discontinued. In addition, all documentation, libraries, and examples outside of this guide apply to only the OIDC-conformant pipeline. Because of this, we strongly recommend adopting the OIDC-conformant pipeline even if you do not need to leverage any new features or functionality in the immediate future.
Apply the OIDC-conformant pipeline
Depending on the age of your tenant, you may have different options for applying the OIDC-conformant pipeline.
New tenants
If you create a new tenant using the Auth0 Dashboard, the OIDC-conformant pipeline is used by default. This has been a default setting for the Dashboard since early 2019.
Older tenants
If you want to force all changes outlined in this guide at the same time for a given application so you can encounter all breaking changes during configuration rather than run time, you must:
Go to Dashboard > Applications > Applications, and select the desired application.
Scroll to Advanced Settings and go to the OAuth tab.
Enable the OIDC Conformant toggle switch and click Save Changes.
If you want to use the OIDC-conformant pipeline on a per-authentication-request basis and your application needs to call an API with a JWT access token, initiate the request to the /social
endpoint with an audience
parameter.
If you want to use the OIDC-conformant pipeline on a per-authentication-request basis and your application doesn't need to call an API, use the following audience
parameter:
https://{yourDomain}/userinfo
Was this helpful?
Differences
Enabling the OIDC-conformant pipeline results in the following changes to the legacy pipeline.
APIs
Applications and APIs (resources) should be defined as separate Auth0 entities. To learn more, read OIDC-Conformant Adoption: APIs.
Access tokens
APIs should be secured with access tokens instead of ID tokens. To learn more about the differences, read Tokens.
A defined set of standard claims about users can be returned in ID Tokens or in the response from
/userinfo
.Custom claims must conform to a named format. To learn more, read Create Namespaced Custom Claims.
Responses from
/userinfo
will conform to the OIDC specification, similar to the contents of ID tokensScopes can be used to request either standard claims or custom API permissions.
To learn more, read OIDC-Conformant Adoptions: Access Tokens.
Authorization flows
Authorization Code Flow: Structural differences exist in the authentication request, authentication response, code exchange request, code exchange response, ID token structure, and access token structure.
Client Credentials Flow: New flow enabled, which allows applications to authenticate as themselves (rather than on behalf of a user) to programmatically and securely obtain access to an API.
Implicit Flow: Structural differences exist in the authentication request, authentication response, ID token structure, and access token structure. Specifically:
response_type=token
only returns an access token. To get an ID token, useresponse_type=id_token
orresponse_type=token id_token
.ID tokens will be signed asymmetrically using RS256.
Authentication requests made without a nonce parameter will be rejected. To learn more, read Mitigate Replay Attacks When Using Implicit Flow.
Refresh tokens will no longer be returned when using the Implicit Flow for authentication.
Resource Owner Password Flow: Structural differences exist in the authentication request, authentication response, ID token structure, and access token structure. Specifically:
the legacy resource owner endpoint is disabled, which also disables passwordless authentication for embedded login from that endpoint. To implement Passwordless with embedded login, you must use the Embedded Passwordless API or our SDKs, depending on your application type.
the
device
parameter is now considered invalid when requesting a refresh token using theoffline_access
scope.
Delegation
Deprecated:
/delegation
endpoint, except when used to get third-party API tokens.OIDC-conformant applications cannot be the source or target of delegation requests.
To learn more, read OIDC-Conformant Adoption: Delegation.
Endpoints
Deprecated:
/tokeninfo
endpointDisabled: the
/oauth/access_token
endpoint (used for social authentication from native mobile applications).Deprecated:
/ssodata
endpointDeprecated:
/delegation
endpoint except when used to get third-party API tokens.
Refresh tokens
Refresh tokens will no longer be returned when using the Implicit Flow for authentication.
Refresh tokens can be used for confidential applications, but refresh token rotation can increase security for most flows and should always be used for public applications when using the Authorization Code Flow with PKCE. To learn about confidential applications, read Confidential and Public Applications. To learn more about refresh token rotation, read, Refresh Token Rotation.
When getting new tokens, you should use the
/oauth/token
endpoint.The
device
parameter is no longer needed when requesting a refresh token using theoffline_access
scope in authentication requests.
To learn more, read OIDC-Conformation Adoption: Refresh Tokens.
Single Sign-on (SSO)
SSO can be performed only from Auth0 login pages, which means that you must employ Universal Login.
To determine whether users are logged in via SSO, you must use silent authentication. To learn more, read Configure Silent Authentication.
Deprecated:
/ssodata
endpoint andgetSSOData()
method fromLock/auth0.js
.
To learn more, read OIDC-Conformant Adoption: Single Sign-On.
Additional features
Create third-party applications for your APIs and display consent dialogs for authorization. To learn more, read User Consent and Third-Party Applications.
Restrict user profile information provided to applications upon authentication. To learn more, read User Profiles.
Dynamically register applications. To learn more, read Dynamic Client Registration.