- Authentication request
- Authentication response
- structure
- structure
Authentication request
Legacy
device parameter is only needed if requesting a by passing the offline_access scope.
OIDC-conformant
- The endpoint to execute credential exchanges is
/oauth/token. - Auth0’s own grant type is used to authenticate users from a specific connection (
realm). The standard OIDC password grant is also supported, but it does not accept Auth0-specific parameters such asrealm. favorite_coloris no longer a valid scope.- The
deviceparameter is removed. - The
audienceparameter is optional.
Authentication response
Legacy
- The returned access token is only valid for calling the
/userinfoendpoint. - A Refresh Token will be returned only if a
deviceparameter was passed and theoffline_accessscope was requested.
OIDC-conformant
- The returned access token is valid for calling the
/userinfoendpoint (provided that the API specified by theaudienceparam usesRS256as signing algorithm) and optionally the specified by theaudienceparameter. - The ID token will be forcibly signed using
RS256if requested by a public application. To learn more, read Confidential and Public Applications. - A refresh token will be returned only if the
offline_accessscope was granted.
ID Token structure
Legacy
JSON
OIDC-conformant
JSON
- The ID token will be forcibly signed using
RS256if requested by a public application. - The
favorite_colorclaim must be namespaced and added through a rule. To learn more, read Create Namespaced Custom Claims.
Access Token structure (optional)
Legacy
JSON
/userinfo endpoint.
OIDC-conformant
JSON
- The returned access token is a valid for calling the
/userinfoendpoin (provided that the API specified by theaudienceparameter usesRS256as ) as well as the resource server specified by theaudienceparameter. - Note that an opaque access token could still be returned if
/userinfois the only specified .
Standard password grant requests
The Auth0 password realm grant is not defined by standard OIDC, but it is suggested as an alternative to the legacy resource owner endpoint because it supports the Auth0-specificrealm parameter. The standard OIDC flow is also supported when using OIDC authentication.