You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Authentication API updates
HRI addition
* Updates for Auth API Exp
HRI update
Break out client grants
#Learn More standardization
Error pages into Markdown tables
* Commits
Clean-up
Final markdown tables
addition of fapi to glossary for HRI entry
* Update _device-code.md
Duplicate Learn More
* Updates after local run review
* Last commits for final fixes
Fixes for the nav, flow files, updated error codes
* Update articles/api/authentication/index.md
Co-authored-by: Patrick Dillon <[email protected]>
* Revoke has been added the the Refresh Token page
* Update _introduction.md
* First batch of commits
* Small edits for older content
* Last commits from HRI
* Last edits for the smaller project
* Remove pending redirect
---------
Co-authored-by: Patrick Dillon <[email protected]>
Co-authored-by: Nick Gagliardi <[email protected]>
Copy file name to clipboardexpand all lines: articles/_includes/_test-this-endpoint.md
+1-2
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,4 @@
1
-
You can use our **Authentication API Debugger** extension to test this endpoint. To do so, you need to be logged in and have installed the [Authentication API Debugger extension](/extensions/authentication-api-debugger).
2
-
1
+
<!-- markdownlint-disable MD024 MD034 MD041-->
3
2
Click on **Install Debugger** to go to the article that explains how (you only have to do this once).
Copy file name to clipboardexpand all lines: articles/api/authentication/_change-password.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ curl --request POST \
56
56
57
57
Send a change password email to the user's provided email address and `connection`.
58
58
59
-
Optionally, you may provide an Organization ID to support Organization-specific variables in [customized email templates](https://auth0.com/docs/customize/email/email-templates#common-variables) and to include the `organization_id` and `organization_name` parameters in the **Redirect To** URL.
59
+
Optionally, you may provide an Organization ID to support Organization-specific variables in [customized email templates](/customize/email/email-templates#common-variables) and to include the `organization_id` and `organization_name` parameters in the **Redirect To** URL.
60
60
61
61
Note: This endpoint only works for database connections.
62
62
@@ -79,9 +79,9 @@ Note: This endpoint only works for database connections.
79
79
*`X-RateLimit-Reset`: Remaining time until the rate limit (`X-RateLimit-Limit`) resets. The value is in [UTC epoch seconds](https://en.wikipedia.org/wiki/Unix_time).
80
80
81
81
82
-
### More Information
82
+
### Learn More
83
83
84
84
-[Changing a User's Password](/connections/database/password-change)
85
85
-[Password Strength in Auth0 Database Connections](/connections/database/password-strength)
86
86
-[Password Options in Auth0 Database Connections](/connections/database/password-options)
87
-
-[Auth0 API Rate Limit Policy](/policies/rate-limits)
87
+
-[Auth0 API Rate Limit Policy](/troubleshoot/customer-support/operational-policies/rate-limit-policy/rate-limit-configurations)
Copy file name to clipboardexpand all lines: articles/api/authentication/_introduction.md
+31-9
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
The Authentication API enables you to manage all aspects of user identity when you use Auth0. It offers endpoints so your users can log in, sign up, log out, access APIs, and more.
4
4
5
-
The API supports various identity protocols, like <dfndata-key="openid">[OpenID Connect](/protocols/oidc)</dfn>, [OAuth 2.0](/protocols/oauth2), and <dfndata-key="security-assertion-markup-language">[SAML](/protocols/saml)</dfn>.
5
+
The API supports various identity protocols, like <dfndata-key="openid">[OpenID Connect](/protocols/oidc)</dfn>, <dfndata-key="oath2"> [OAuth 2.0](/protocols/oauth2)</dfn>, <dfndata-key="fapi">[FAPI](/secure/highly-regulated-identity#advanced-security-with-openid-connect-fapi-)</dfn> and <dfndata-key="security-assertion-markup-language">[SAML](/protocols/saml)</dfn>.
6
6
7
7
:::note
8
8
This API is designed for people who feel comfortable integrating with RESTful APIs. If you prefer a more guided approach check out our [Quickstarts](/quickstarts) or our [Libraries](/libraries).
@@ -32,7 +32,7 @@ Generate a [client assertion](https://auth0.com/docs/get-started/authentication-
32
32
33
33
### Client ID and Client Secret
34
34
35
-
Send the Client ID and Client Secret. The method you can use to send this data is determined by the [Token Endpoint Authentication Method](https://auth0.com/docs/get-started/applications/confidential-and-public-applications/view-application-type) configured for your application.
35
+
Send the Client ID and Client Secret. The method you can use to send this data is determined by the [Token Endpoint Authentication Method](/get-started/applications/confidential-and-public-applications/view-application-type) configured for your application.
36
36
37
37
If you are using **Post**, you must send this data in the JSON body of your request.
38
38
@@ -44,7 +44,7 @@ An example is the [Revoke Refresh Token endpoint](#revoke-refresh-token). This o
44
44
45
45
Send the Client ID. For public applications (applications that cannot hold credentials securely, such as SPAs or mobile apps), we offer some endpoints that can be accessed using only the Client ID.
46
46
47
-
An example is the [Implicit Grant](#implicit-grant).
47
+
An example is the [Implicit Grant](#implicit-flow).
48
48
49
49
### mTLS Authentication
50
50
@@ -85,16 +85,38 @@ Each request should be sent with a Content-Type of `application/json`.
85
85
86
86
You can test the endpoints using the [Authentication API Debugger](/extensions/authentication-api-debugger).
87
87
88
-
### Test with the Authentication API Debugger
88
+
### Authentication API Debugger
89
89
90
90
The [Authentication API Debugger](/extensions/authentication-api-debugger) is an Auth0 extension you can use to test several endpoints of the Authentication API.
91
91
92
-
If it's the first time you use it, you have to install it using the [dashboard](${manage_url}/#/extensions). Once you do, you are ready to configure your app's settings and run your tests.
1. On the *Configuration* tab, set the fields **Application** (select the application you want to use for the test) and **Connection** (the name of the social connection to use).
97
+
98
+
1. Copy the <dfndata-key="callback">**Callback URL**</dfn> and set it as part of the **Allowed Callback URLs** of your [Application Settings](${manage_url}/#/applications).
99
+
100
+
1. At the *OAuth2 / OIDC* tab, select **OAuth2 / OIDC Login**.
101
+
102
+
### Use Authentication API Debugger
103
+
Configure other endpoints with the following options:
104
+
105
+
- Passwordless: On the *OAuth2 / OIDC* tab, set **Username** to the user's phone number if `connection=sms`, or the user's email if `connection=email`, and **Password** to the user's verification code. Click **Resource Owner Endpoint**.
106
+
- SAML SSO: On the *Other Flows* tab, select **SAML**.
107
+
- WS-Federation: On the *Other Flows* tab, select **WS-Federation**.
108
+
- Logout: On the *Other Flows* tab, select **Logout**, or **Logout (Federated)** to log the user out of the identity provider as well.
109
+
- Legacy Login: On the *OAuth2 / OIDC* tab, set the fields **ID Token**, **Refresh Token** and **Target Client ID**. Click **Delegation**.
110
+
- Legacy Delegation: On the *OAuth2 / OIDC* tab, set **Username** and **Password**. Click **Resource Owner Endpoint**.
111
+
- Legacy Resource Owner: On the *OAuth2 / OIDC* tab, set the **Username** and **Password**, then select **Resource Owner Endpoint**.
112
+
113
+
### Use Authentication API Debugger with authentications flows
114
+
115
+
Configure authentication flows with the following options:
116
+
- Authorization Code Flow: On the *OAuth2 / OIDC* tab, set the field **Authorization Code** to the code you retrieved from [Authorization Code Grant](/get-started/authentication-and-authorization-flow/authorization-code-flow), and the **Code Verifier** to the key. Click **OAuth2 Code Exchange**.
117
+
- Authorization Code Flow + PKCE: On the *OAuth2 / OIDC* tab, set the field **Authorization Code** to the code you retrieved from [Authorization Code Grant](/get-started/authentication-and-authorization-flow/authorization-code-flow-with-pkce), and the **Code Verifier** to the key. Click **OAuth2 Code Exchange**.
118
+
- Client Credential Flow: On the *OAuth2 / OIDC* tab, select **OAuth2 Client Credentials**.
93
119
94
-
Note that its URL varies according to your tenant's region:
0 commit comments