You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: articles/api/authentication/_introduction.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -48,15 +48,15 @@ An example is the [Implicit Grant](#implicit-flow).
48
48
49
49
### mTLS Authentication
50
50
51
-
Generate a certificate, either [self-signed](https://auth0.com/docs/get-started/applications/configure-mtls/configure-mtls-for-a-client#self-signed-certificates) or [certificate authority signed](https://auth0.com/docs/get-started/applications/configure-mtls/configure-mtls-for-a-client#certificate-authority-signed-certificates). Then, [set up the customer edge network](https://auth0.com/docs/get-started/applications/configure-mtls/set-up-the-customer-edge) that performs the mTLS handshake.
51
+
Generate a certificate, either [self-signed](/get-started/applications/configure-mtls/configure-mtls-for-a-client#self-signed-certificates) or [certificate authority signed](/get-started/applications/configure-mtls/configure-mtls-for-a-client#certificate-authority-signed-certificates). Then, [set up the customer edge network](/get-started/applications/configure-mtls/set-up-the-customer-edge) that performs the mTLS handshake.
52
52
53
53
Once your edge network verifies the certificate, forward the request to the Auth0 edge network with the following headers:
54
54
55
55
- The Custom Domain API key as the `cname-api-key` header.
56
56
- The client certificate as the `client-certificate` header.
57
-
- The client certificate CA verification status as the `client-certificate-ca-verified` header. For more information, see [Forward the Request](https://auth0.com/docs/get-started/applications/configure-mtls/set-up-the-customer-edge#forward-the-request-).
57
+
- The client certificate CA verification status as the `client-certificate-ca-verified` header. For more information, see [Forward the Request](/get-started/applications/configure-mtls/set-up-the-customer-edge#forward-the-request-).
58
58
59
-
To learn more, read [Authenticate with mTLS](https://auth0.com/docs/get-started/authentication-and-authorization-flow/authenticate-with-mtls).
59
+
To learn more, read [Authenticate with mTLS](/get-started/authentication-and-authorization-flow/authenticate-with-mtls).
60
60
61
61
## Parameters
62
62
@@ -99,7 +99,7 @@ The [Authentication API Debugger](/extensions/authentication-api-debugger) is an
99
99
100
100
1. At the *OAuth2 / OIDC* tab, select **OAuth2 / OIDC Login**.
101
101
102
-
### Use Authentication API Debugger
102
+
### Endpoint options
103
103
Configure other endpoints with the following options:
104
104
105
105
- Passwordless: On the *OAuth2 / OIDC* tab, set **Username** to the user's phone number if `connection=sms`, or the user's email if `connection=email`, and **Password** to the user's verification code. Click **Resource Owner Endpoint**.
@@ -110,7 +110,7 @@ Configure other endpoints with the following options:
110
110
- Legacy Delegation: On the *OAuth2 / OIDC* tab, set **Username** and **Password**. Click **Resource Owner Endpoint**.
111
111
- Legacy Resource Owner: On the *OAuth2 / OIDC* tab, set the **Username** and **Password**, then select **Resource Owner Endpoint**.
112
112
113
-
### Use Authentication API Debugger with authentications flows
113
+
### Authentications flows
114
114
115
115
Configure authentication flows with the following options:
116
116
- Authorization Code Flow: On the *OAuth2 / OIDC* tab, set the field **Authorization Code** to the code you retrieved from [Authorization Code Grant](/get-started/authentication-and-authorization-flow/authorization-code-flow), and the **Code Verifier** to the key. Click **OAuth2 Code Exchange**.
Highly Regulated Identity is currently available for Enterprise customers under Limited Early Access. To learn more about this program, contact [Auth0 Support](http://support.auth0.com/).
87
88
:::
88
-
<br></br>
89
89
90
90
Authorization Code Flow with [Pushed Authorization Requests (PAR)](/get-started/authentication-and-authorization-flow/authorization-code-flow/authorization-code-flow-with-par) uses the `/oauth/par` endpoint to allow applications to send the authorization parameters usually sent in a `GET` request to `/authorize`. PAR uses a POST method from the backend to keep parameter values secure. The `/oauth/par` endpoint accepts all authorization parameters which can be proivided to `/authorize`. Assuming the call to the `/oauth/par` endpoint is valid, Auth0 will respond with a `redirect_uri` value that can be used as a parameter for the `/authorize` endpoint.
91
91
92
92
Assuming the call to the `/oauth/par` endpoint is valid, Auth0 will respond with a `redirect_uri` value also used as a parameter for the `/authorize` endpoint. To learn more about configuring PAR, read [Configure Pushed Authorization Requests (PAR)](/get-started/applications/configure-par).
93
93
94
-
## Request Parameters
94
+
###Request Parameters
95
95
| Parameter | Description |
96
96
|:-----------------|:------------|
97
97
|`authorization_details`| Requested permissions for each resource. Similar to scopes. To learn more, read [RAR reference documention](https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow/authorization-code-flow-with-rar). |
@@ -108,7 +108,7 @@ Assuming the call to the `/oauth/par` endpoint is valid, Auth0 will respond with
108
108
|`prompt`| Can be used to force a particular prompt to display, e.g. `prompt=consent` will always display the consent prompt.|
109
109
|`organization`| ID of the organization to use when authenticating a user. When not provided, if your application is configured to **Display Organization Prompt**, the user will be able to enter the organization name when authenticating. |
110
110
111
-
## Remarks
111
+
###Remarks
112
112
- To make a call to the PAR endpoint, you must:
113
113
- Set the request content type as `application/x-www-form-urlencoded`
114
114
- Use `strings` for all passed parameters
@@ -142,7 +142,7 @@ The `/authorize` endpoint will respond based on the parameters passed to the `/o
142
142
|`client_id` <br/><spanclass="label label-danger">Required</span> | The `client_id` of your application. |
143
143
|`request_uri` <br/><spanclass="label label-danger">Required</span> | The `request_uri` value that was received from the `/oauth/par` endpoint. |
Copy file name to clipboardexpand all lines: articles/api/authentication/errors/_oauth-revoke.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -3,5 +3,5 @@
3
3
| Status | JSON Response |
4
4
| :--------------- | :------------ |
5
5
|<spanclass="badge badge-info">200</span> Success |`{"error": "invalid_request", "error_description": "..."}`</br> The <dfndata-key="refresh-token">Refresh Token</dfn> is revoked, does not exist, or was not issued to the client making the revocation request|
6
-
|<spanclass="badge badge-info">400</span> Bad Request |`{"error": "invalid_request", "error_description": "..."}`he required parameters were not sent in the request.|
7
-
|<spanclass="badge badge-info">401</span> Unauthorized |`{"error": "invalid_client", "error_description": "..."}`</br> The request is not authorized. Check that the client credentials `client_id` and client_secret` are present in the request and hold valid values. |
6
+
|<spanclass="badge badge-danger">400</span> Bad Request |`{"error": "invalid_request", "error_description": "..."}`The required parameters were not sent in the request.|
7
+
|<spanclass="badge badge-danger">401</span> Unauthorized |`{"error": "invalid_client", "error_description": "..."}`</br> The request is not authorized. Check that the client credentials `client_id` and client_secret` are present in the request and hold valid values. |
0 commit comments