Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions main/docs/quickstart/backend/aspnet-core-webapi/_index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -143,8 +143,8 @@ export const sections = [
The way in which you call your API depends on the type of application you are developing and the framework you
are using. To learn more, read the relevant application Quickstart:

- [Single-Page Applications](/docs/quickstart#single-page-app)
- [Mobile / Native Application](/docs/quickstart#native-mobile-app)
- [Single-Page Applications](https://auth0.com/docs/quickstart#single-page-app)
- [Mobile / Native Application](https://auth0.com/docs/quickstart#native-mobile-app)

### Get an access token

Expand Down
6 changes: 3 additions & 3 deletions main/docs/quickstart/backend/aspnet-core-webapi/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ System requirements: .NET 6.0 | .NET 7.0 | .NET 8.0
</Card> */}

<Info>
**New to Auth0?** Learn [how Auth0 works](/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
**New to Auth0?** Learn [how Auth0 works](https://auth0.com/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](https://auth0.com/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
</Info>

## Configure Auth0 APIs
Expand All @@ -25,7 +25,7 @@ In the [APIs](https://manage.auth0.com/#/apis) section of the Auth0 dashboard, c

<Frame>![Create API](https://cdn2.auth0.com/docs/1.14550.0/media/articles/server-apis/create-api.png)</Frame>

By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).

### Define permissions

Expand All @@ -42,7 +42,7 @@ This example uses the `read:messages` scope.
This example demonstrates:

* How to check for a JSON Web Token (JWT) in the `Authorization` header of an incoming HTTP request.
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](/docs/secure/tokens/access-tokens/validate-access-tokens).
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](https://auth0.com/docs/secure/tokens/access-tokens/validate-access-tokens).

## Configure the Sample Project

Expand Down
6 changes: 3 additions & 3 deletions main/docs/quickstart/backend/django/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ System requirements: Python 3.5 and up | Django 2.2.\* | djangorestframework 3.1
</Card> */}

<Info>
**New to Auth0?** Learn [how Auth0 works](/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
**New to Auth0?** Learn [how Auth0 works](https://auth0.com/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](https://auth0.com/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
</Info>

## Configure Auth0 APIs
Expand All @@ -25,7 +25,7 @@ In the [APIs](https://manage.auth0.com/#/apis) section of the Auth0 dashboard, c

<Frame>![Create API](https://cdn2.auth0.com/docs/1.14550.0/media/articles/server-apis/create-api.png)</Frame>

By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).

### Define permissions

Expand All @@ -42,7 +42,7 @@ This example uses the `read:messages` scope.
This example demonstrates:

* How to check for a JSON Web Token (JWT) in the `Authorization` header of an incoming HTTP request.
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](/docs/secure/tokens/access-tokens/validate-access-tokens).
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](https://auth0.com/docs/secure/tokens/access-tokens/validate-access-tokens).

## Setup the Django Application

Expand Down
8 changes: 4 additions & 4 deletions main/docs/quickstart/backend/golang/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ System requirements: Go 1.21+
</Card> */}

<Info>
**New to Auth0?** Learn [how Auth0 works](/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
**New to Auth0?** Learn [how Auth0 works](https://auth0.com/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](https://auth0.com/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
</Info>

## Configure Auth0 APIs
Expand All @@ -26,7 +26,7 @@ In the [APIs](https://manage.auth0.com/#/apis) section of the Auth0 dashboard, c

<Frame>![Create API](https://cdn2.auth0.com/docs/1.14550.0/media/articles/server-apis/create-api.png)</Frame>

By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).

### Define permissions

Expand All @@ -43,7 +43,7 @@ This example uses the `read:messages` scope.
This example demonstrates:

* How to check for a JSON Web Token (JWT) in the `Authorization` header of an incoming HTTP request.
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](/docs/secure/tokens/access-tokens/validate-access-tokens).
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](https://auth0.com/docs/secure/tokens/access-tokens/validate-access-tokens).

## Validate Access Tokens

Expand Down Expand Up @@ -185,7 +185,7 @@ func EnsureValidToken() func(next http.Handler) http.Handler {



By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).

## Protect API Endpoints

Expand Down
10 changes: 5 additions & 5 deletions main/docs/quickstart/backend/java-spring-security5/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -16,10 +16,10 @@ System requirements: Java 17
This example demonstrates:

* How to check for a JSON Web Token (JWT) in the `Authorization` header of an incoming HTTP request.
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](/docs/secure/tokens/access-tokens/validate-access-tokens).
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](https://auth0.com/docs/secure/tokens/access-tokens/validate-access-tokens).

<Info>
**New to Auth0?** Learn [how Auth0 works](/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
**New to Auth0?** Learn [how Auth0 works](https://auth0.com/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](https://auth0.com/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
</Info>

<Info>
Expand All @@ -34,7 +34,7 @@ In the [APIs](https://manage.auth0.com/#/apis) section of the Auth0 dashboard, c

<Frame>![Create API](https://cdn2.auth0.com/docs/1.14550.0/media/articles/server-apis/create-api.png)</Frame>

By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).

### Define permissions

Expand Down Expand Up @@ -259,12 +259,12 @@ mvn.cmd spring-boot:run
```


The sample application will be available at `http://localhost:3010/`. Read about how to test and use your API in the [Using Your API](/docs/quickstart/backend/java-spring-security5/02-using) article.
The sample application will be available at `http://localhost:3010/`. Read about how to test and use your API in the [Using Your API](https://auth0.com/docs/quickstart/backend/java-spring-security5/02-using) article.

<Info>
##### What can you do next?

[Part 2: Using Your API](/docs/quickstart/backend/java-spring-security5/02-using)
[Part 2: Using Your API](https://auth0.com/docs/quickstart/backend/java-spring-security5/02-using)

[Edit on GitHub](https://github.com/auth0/docs/edit/master/articles/quickstart/backend/java-spring-security5/01-authorization.md)
</Info>
Expand Down
8 changes: 4 additions & 4 deletions main/docs/quickstart/backend/nodejs/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ System requirements: express-oauth2-jwt-bearer 1.0.0
</Card> */}

<Info>
**New to Auth0?** Learn [how Auth0 works](/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
**New to Auth0?** Learn [how Auth0 works](https://auth0.com/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](https://auth0.com/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
</Info>

## Configure Auth0 APIs
Expand All @@ -25,10 +25,10 @@ In the [APIs](https://manage.auth0.com/#/apis) section of the Auth0 dashboard, c

<Frame>![Create API](https://cdn2.auth0.com/docs/1.14550.0/media/articles/server-apis/create-api.png)</Frame>

By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).

<Info>
We recommend using the default RS256 [signing algorithm](/docs/get-started/applications/signing-algorithms) for your API. If you need to use the HS256 algorithm, see the [HS256 integration sample](https://github.com/auth0-samples/auth0-express-api-samples/tree/master/02-Authorization-HS256).
We recommend using the default RS256 [signing algorithm](https://auth0.com/docs/get-started/applications/signing-algorithms) for your API. If you need to use the HS256 algorithm, see the [HS256 integration sample](https://github.com/auth0-samples/auth0-express-api-samples/tree/master/02-Authorization-HS256).
</Info>

### Define permissions
Expand All @@ -46,7 +46,7 @@ This example uses the `read:messages` scope.
This example demonstrates:

* How to check for a JSON Web Token (JWT) in the `Authorization` header of an incoming HTTP request.
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](/docs/secure/tokens/access-tokens/validate-access-tokens).
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](https://auth0.com/docs/secure/tokens/access-tokens/validate-access-tokens).

## Validate Access Tokens

Expand Down
6 changes: 3 additions & 3 deletions main/docs/quickstart/backend/php/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ System requirements: PHP 7.4+ (8.0 recommended) | Auth0-PHP 8.0 | Composer
</Card> */}

<Info>
**New to Auth0?** Learn [how Auth0 works](/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
**New to Auth0?** Learn [how Auth0 works](https://auth0.com/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](https://auth0.com/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
</Info>

## Configure Auth0 APIs
Expand All @@ -25,7 +25,7 @@ In the [APIs](https://manage.auth0.com/#/apis) section of the Auth0 dashboard, c

<Frame>![Create API](https://cdn2.auth0.com/docs/1.14550.0/media/articles/server-apis/create-api.png)</Frame>

By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).

### Define permissions

Expand All @@ -42,7 +42,7 @@ This example uses the `read:messages` scope.
This example demonstrates:

* How to check for a JSON Web Token (JWT) in the `Authorization` header of an incoming HTTP request.
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](/docs/secure/tokens/access-tokens/validate-access-tokens).
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](https://auth0.com/docs/secure/tokens/access-tokens/validate-access-tokens).

## Integrating your PHP Backend API

Expand Down
6 changes: 3 additions & 3 deletions main/docs/quickstart/backend/python/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ System requirements: Python 3.6 and up | Flask 2.0 | Authlib 1.0
</Card> */}

<Info>
**New to Auth0?** Learn [how Auth0 works](/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
**New to Auth0?** Learn [how Auth0 works](https://auth0.com/docs/get-started/auth0-overview) and read about [implementing API authentication and authorization](https://auth0.com/docs/get-started/authentication-and-authorization-flow) using the OAuth 2.0 framework.
</Info>

## Configure Auth0 APIs
Expand All @@ -24,7 +24,7 @@ In the [APIs](https://manage.auth0.com/#/apis) section of the Auth0 dashboard, c

<Frame>![Create API](https://cdn2.auth0.com/docs/1.14550.0/media/articles/server-apis/create-api.png)</Frame>

By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) format, and can be accessed [here](https://{yourDomain}/.well-known/jwks.json).

### Define permissions

Expand All @@ -41,7 +41,7 @@ This example uses the `read:messages` scope.
This example demonstrates:

* How to check for a JSON Web Token (JWT) in the `Authorization` header of an incoming HTTP request.
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](/docs/secure/tokens/access-tokens/validate-access-tokens).
* How to check if the token is valid, using the [JSON Web Key Set (JWKS)](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets) for your Auth0 account. To learn more about validating Access Tokens, see [Validate Access Tokens](https://auth0.com/docs/secure/tokens/access-tokens/validate-access-tokens).

## Validate Access Tokens

Expand Down
Loading