You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Standardize titles/references to flows and use of "single-page" terminology (#7524)
* Standardize references to flows and use of single-page term
* Update application section index with new filenames
* Update auth sequence media
* fix missing link
Copy file name to clipboardexpand all lines: CONTRIBUTING.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -167,7 +167,7 @@ Description
167
167
:::
168
168
169
169
::: panel-warning Security Warning
170
-
It is important to understand that the Authorization Code flow should only be used in cases such as a Regular Web Application where the Client Secret can be safely stored. In cases such as a SinglePage Application, the Client Secret is available to the client (in the web browser), so the integrity of the Client Secret cannot be maintained. That is why the [Single-Page Login Flow](/flows/concepts/single-page-login-flow) is more appropriate in that case.
170
+
It is important to understand that the Authorization Code flow should only be used in cases such as a Regular Web Application where the Client Secret can be safely stored. In cases such as a Single-Page Application, the Client Secret is available to the client (in the web browser), so the integrity of the Client Secret cannot be maintained. That is why the [Implicit Flow](/flows/concepts/implicit) is more appropriate in that case.
Copy file name to clipboardexpand all lines: articles/api-auth/config/using-the-auth0-dashboard.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ useCase: secure-api
10
10
11
11
# Set up a Client Credentials Grant using the Dashboard
12
12
13
-
Auth0 lets you authorize applications that have the **Client Credentials** grant type enabled to call APIs using the [Machine-to-Machine (M2M) Flow](/flows/concepts/m2m-flow).
13
+
Auth0 lets you authorize applications that have the **Client Credentials** grant type enabled to call APIs using the [Client Credentials Flow](/flows/concepts/client-credentials).
14
14
15
15
By default, the **Client Credentials** grant is enabled for all Machine-to-Machine Applications and Regular Web Applications, but they are _not yet_ authorized to call any API.
16
16
@@ -29,7 +29,7 @@ To authorize the applications to call an API:
29
29
## Keep reading
30
30
31
31
:::next-steps
32
-
*[Call API using the Machine-to-Machine (M2M) Flow](/flows/guides/m2m-flow/call-api-using-m2m-flow)
32
+
*[Call API using the Client Credentials Flow](/flows/guides/client-credentials/call-api-client-credentials)
33
33
*[How to change the scopes and add custom claims to a token using Hooks](/api-auth/tutorials/client-credentials/customize-with-hooks)
34
34
*[How to add custom claims to a token using Rules](/scopes/current/sample-use-cases#add-custom-claims-to-a-token)
Copy file name to clipboardexpand all lines: articles/api-auth/config/using-the-management-api.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ useCase: secure-api
11
11
12
12
# Set up a Client Credentials Grant using the Management API
13
13
14
-
Auth0 lets you authorize applications that have the 'Client Credentials' grant type enabled to call APIs using the [Machine-to-Machine (M2M) Flow](/flows/concepts/m2m-flow).
14
+
Auth0 lets you authorize applications that have the 'Client Credentials' grant type enabled to call APIs using the [Client Credentials Flow](/flows/concepts/client-credentials).
15
15
16
16
By default, all Machine-to-Machine Applications and Regular Web Applications have the 'Client Credentials' grant enabled, but they are not authorized to call any API.
17
17
@@ -59,12 +59,12 @@ Sample response:
59
59
}
60
60
```
61
61
62
-
That's it, you are done! Now that all the elements are in place, you can request Access Tokens for your API from Auth0 using the Machine-to-Machine (M2M) Flow.
62
+
That's it, you are done! Now that all the elements are in place, you can request Access Tokens for your API from Auth0 using the Client Credentials Flow.
63
63
64
64
## Keep reading
65
65
66
66
:::next-steps
67
-
*[Call API using the Machine-to-Machine (M2M) Flow](/flows/guides/m2m-flow/call-api-using-m2m-flow)
67
+
*[Call API using the Client Credentials Flow](/flows/guides/client-credentials/call-api-client-credentials)
68
68
*[How to change the scopes and add custom claims to a token using Hooks](/api-auth/tutorials/client-credentials/customize-with-hooks)
69
69
*[How to add custom claims to a token using Rules](/scopes/current/sample-use-cases#add-custom-claims-to-a-token)
Copy file name to clipboardexpand all lines: articles/api-auth/dynamic-client-registration.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -111,7 +111,7 @@ Also, keep in mind that third-party developers are not allowed to modify the app
111
111
112
112
Now that you have a Client ID and Secret, you can configure your application to authenticate users with Auth0.
113
113
114
-
We will go through a simple example, that shows how to call an API from a client-side web app, using the [Single-Page Login Flow](/flows/guides/single-page-login-flow/call-api-using-single-page-login-flow). For a list of tutorials on how to authenticate and authorize users, based on your application type, see the [API Authorization](/api-auth) page.
114
+
We will go through a simple example, that shows how to call an API from a client-side web app, using the [Implicit Flow](/flows/guides/implicit/call-api-implicit). For a list of tutorials on how to authenticate and authorize users, based on your application type, see the [API Authorization](/api-auth) page.
115
115
116
116
First, you need to configure your application to send the user to the authorization URL:
The Hybrid Flow enables use cases where your application can immediately use an ID token to access information about the user while obtaining an authorization code that can be exchanged for an Access Token (therefore gaining access to protected resources for an extended period of time).
20
20
21
21
## Background
22
22
23
-
With the [Regular Web App Login Flow](/flows/concepts/regular-web-app-login-flow), Auth0 sends you an authorization code, which your app then sends in to retrieve tokens. Your application authenticates itself with a Client ID and Client Secret stored securely on your server.
23
+
With the [Authorization Code Flow](/flows/concepts/auth-code), Auth0 sends you an authorization code, which your app then sends in to retrieve tokens. Your application authenticates itself with a Client ID and Client Secret stored securely on your server.
24
24
25
-
On the other hand, the [Single-Page Login Flow](/flows/concepts/single-page-login-flow) allows you to request Access Tokens without needing to authenticate your application. Auth0 verifies your app's identity based on the provided redirect URI. Because of this, you shouldn't utilize long-lived Access Tokens, and you cannot use Refresh Tokens.
25
+
On the other hand, the [Implicit Flow](/flows/concepts/implicit) allows you to request Access Tokens without needing to authenticate your application. Auth0 verifies your app's identity based on the provided redirect URI. Because of this, you shouldn't utilize long-lived Access Tokens, and you cannot use Refresh Tokens.
26
26
27
27
## The Hybrid Flow
28
28
@@ -60,7 +60,7 @@ For details on how to implement this using Auth0, refer to [Execute the Hybrid F
60
60
-[Execute the Hybrid Flow](/api-auth/tutorials/hybrid-flow)
61
61
-[How to configure an API in Auth0](/apis)
62
62
-[Why you should always use Access Tokens to secure an API](/api-auth/why-use-access-tokens-to-secure-apis)
63
-
-[Application authentication for regular web apps](/flows/concepts/regular-web-app-login-flow)
64
-
-[Application authentication for single-page apps](/flows/concepts/single-page-login-flow)
63
+
-[Application authentication for regular web apps](/flows/concepts/auth-code)
64
+
-[Application authentication for single-page apps](/flows/concepts/implicit)
Copy file name to clipboardexpand all lines: articles/api-auth/grant/implicit.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ useCase:
14
14
15
15
<%= include('../../_includes/_pipeline2') %>
16
16
17
-
In order to access an API from a [client-side app](/quickstart/spa) (typically a SinglePage Application or a Mobile Application), you need to implement the OAuth 2.0 **Implicit Grant**. In this document we will see how this flow works.
17
+
In order to access an API from a [client-side app](/quickstart/spa) (typically a Single-Page Application or a Mobile Application), you need to implement the OAuth 2.0 **Implicit Grant**. In this document we will see how this flow works.
18
18
19
19
::: note
20
20
If you need a refresher on the OAuth 2.0 protocol, you can go through our [OAuth 2.0](/protocols/oauth2) article.
@@ -32,7 +32,7 @@ Once the user authenticates, the application receives the Access Token in the ha
32
32
33
33
1. Auth0 authenticates the user. The first time the user goes through this flow a consent page will be shown where the permissions, that will be given to the Application, are listed (for example: post messages, list contacts, and so forth).
34
34
35
-
1. Auth0 redirects the user to the app with an [Access Token](/tokens/overview-access-tokens) (and optionally an [ID Token](/tokens/id-token)) in the hash fragment of the URI. The app can now extract the tokens from the hash fragment. In a SinglePage Application (SPA) this would be done using Javascript and in a Mobile Application this is typically handled by interacting with a Web View.
35
+
1. Auth0 redirects the user to the app with an [Access Token](/tokens/overview-access-tokens) (and optionally an [ID Token](/tokens/id-token)) in the hash fragment of the URI. The app can now extract the tokens from the hash fragment. In a Single-Page Application (SPA) this would be done using Javascript and in a Mobile Application this is typically handled by interacting with a Web View.
36
36
37
37
1. The app can use the Access Token to call the API on behalf of the user.
Copy file name to clipboardexpand all lines: articles/api-auth/grant/password.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -17,8 +17,8 @@ useCase:
17
17
Highly trusted applications can use this flow to access APIs. In this flow the end-user is asked to fill in credentials (username/password), typically using an interactive form. This information is sent to the backend and from there to Auth0.
18
18
19
19
You should use this flow **only if** the following apply:
20
-
- The application is absolutely trusted with the user's credentials. For [Single-Page Applications](/flows/concepts/single-page-login-flow) and [Native/Mobile Apps](/flows/concepts/mobile-login-flow) we recommend using web flows instead.
21
-
- Using a redirect-based flow is not possible. If this is not the case and redirects are possible in your application, you should use the [Regular Web App Login Flow](/flows/concepts/regular-web-app-login-flow) instead.
20
+
- The application is absolutely trusted with the user's credentials. For [Single-Page Applications](/flows/concepts/implicit) and [Native/Mobile Apps](/flows/concepts/auth-code-pkce) we recommend using web flows instead.
21
+
- Using a redirect-based flow is not possible. If this is not the case and redirects are possible in your application, you should use the [Authorization Code Flow](/flows/concepts/auth-code) instead.
22
22
23
23
::: note
24
24
If you need a refresher on the OAuth 2.0 protocol, you can go through our [OAuth 2.0](/protocols/oauth2) article.
Copy file name to clipboardexpand all lines: articles/api-auth/index.md
+12-12
Original file line number
Diff line number
Diff line change
@@ -38,44 +38,44 @@ In this page you can find a list of resources that can help you secure your APIs
38
38
</p>
39
39
</li>
40
40
<li>
41
-
<i class="icon icon-budicon-715"></i><a href="/flows/guides/regular-web-app-login-flow/call-api-using-regular-web-app-login-flow">Call Your API from a Regular Web App</a>
41
+
<i class="icon icon-budicon-715"></i><a href="/flows/guides/auth-code/call-api-auth-code">Call Your API from a Regular Web App</a>
42
42
<p>
43
43
If your application executes on a server and you want to configure it to use OAuth 2.0 to access an API, read these docs.
44
44
</p>
45
45
<ul>
46
46
<li>
47
-
<i class="icon icon-budicon-695"></i><a href="/flows/concepts/regular-web-app-login-flow">Overview of the flow</a>
47
+
<i class="icon icon-budicon-695"></i><a href="/flows/concepts/auth-code">Overview of the flow</a>
48
48
</li>
49
49
<li>
50
-
<i class="icon icon-budicon-695"></i><a href/flows/guides/regular-web-app-login-flow/call-api-using-regular-web-app-login-flow">Executing the flow</a>
50
+
<i class="icon icon-budicon-695"></i><a href/flows/guides/auth-code/call-api-auth-code">Executing the flow</a>
51
51
</li>
52
52
</ul>
53
53
</li>
54
54
<li>
55
-
<i class="icon icon-budicon-715"></i><a href="/flows/guides/mobile-login-flow/call-api-using-mobile-login-flow">Call Your API from a Native/Mobile App</a>
55
+
<i class="icon icon-budicon-715"></i><a href="/flows/guides/auth-code-pkce/call-api-auth-code-pkce">Call Your API from a Native/Mobile App</a>
56
56
<p>
57
57
If your application is a native app and you want to configure it to use OAuth 2.0 to access an API, read these docs.
58
58
</p>
59
59
<ul>
60
60
<li>
61
-
<i class="icon icon-budicon-695"></i><a href="/flows/concepts/mobile-login-flow">Overview of the flow</a>
61
+
<i class="icon icon-budicon-695"></i><a href="/flows/concepts/auth-code-pkce">Overview of the flow</a>
62
62
</li>
63
63
<li>
64
-
<i class="icon icon-budicon-695"></i><a href="/flows/guides/mobile-login-flow/call-api-using-mobile-login-flow">Executing the flow</a>
64
+
<i class="icon icon-budicon-695"></i><a href="/flows/guides/auth-code-pkce/call-api-auth-code-pkce">Executing the flow</a>
65
65
</li>
66
66
</ul>
67
67
</li>
68
68
<li>
69
-
<i class="icon icon-budicon-715"></i><a href="/flows/guides/single-page-login-flow/call-api-using-single-page-login-flow">Call Your API from a Single-Page App</a>
69
+
<i class="icon icon-budicon-715"></i><a href="/flows/guides/implicit/call-api-implicit">Call Your API from a Single-Page App</a>
70
70
<p>
71
71
If your application is a JavaScript-centric app executing on the browser, and you want to configure it to use OAuth 2.0 to access an API, read these docs.
72
72
</p>
73
73
<ul>
74
74
<li>
75
-
<i class="icon icon-budicon-695"></i><a href="/flows/concepts/single-page-login-flow">Overview of the flow</a>
75
+
<i class="icon icon-budicon-695"></i><a href="/flows/concepts/implicit">Overview of the flow</a>
76
76
</li>
77
77
<li>
78
-
<i class="icon icon-budicon-695"></i><a href="/flows/guides/single-page-login-flow/call-api-using-single-page-login-flow">Executing the flow</a>
78
+
<i class="icon icon-budicon-695"></i><a href="/flows/guides/implicit/call-api-implicit">Executing the flow</a>
79
79
</li>
80
80
<li>
81
81
<i class="icon icon-budicon-695"></i><a href="/api-auth/tutorials/silent-authentication">Silent authentication for SPAs</a>
@@ -89,16 +89,16 @@ In this page you can find a list of resources that can help you secure your APIs
89
89
</ul>
90
90
</li>
91
91
<li>
92
-
<i class="icon icon-budicon-715"></i><a href="/flows/guides/m2m-flow/call-api-using-m2m-flow">Call Your API from a Machine-to-Machine App</a>
92
+
<i class="icon icon-budicon-715"></i><a href="/flows/guides/client-credentials/call-api-client-credentials">Call Your API from a Machine-to-Machine App</a>
93
93
<p>
94
94
If you want to implement server-to-server interaction, and you want to configure it to use OAuth 2.0, read these docs.
95
95
</p>
96
96
<ul>
97
97
<li>
98
-
<i class="icon icon-budicon-695"></i><a href="/flows/concepts/m2m-flow">Overview of the flow</a>
98
+
<i class="icon icon-budicon-695"></i><a href="/flows/concepts/client-credentials">Overview of the flow</a>
99
99
</li>
100
100
<li>
101
-
<i class="icon icon-budicon-695"></i><a href="/flows/guides/m2m-flow/call-api-using-m2m-flow">Executing the flow</a>
101
+
<i class="icon icon-budicon-695"></i><a href="/flows/guides/client-credentials/call-api-client-credentials">Executing the flow</a>
102
102
</li>
103
103
<li>
104
104
<i class="icon icon-budicon-695"></i><a href="/api-auth/config/using-the-auth0-dashboard">How to set up a Client Grant using the Dashboard</a>
0 commit comments