- Set the
compliance_levelproperty to the desired profile, eitherfapi1_adv_pkj_parorfapi1_adv_mtls_par - Either Configure mTLS (including mTLS aliases) or Configure Private Key JWT
- Configure mTLS Token Binding
- Ensure Auth0 prompts users for consent
- Configure supported ACR claims for the tenant
- Remove the alg property from JWKS endpoint
- Add Action to require scope and redirect_uri
Ensure Auth0 prompts users for consent
You will need to ensure that Auth0 prompts users for consent. You may skip this step if the client is configured as a first-party app, and the or API supports skipping consent for first-party apps. To ensure Auth0 requests users for consent, set theis_first_party property on the client to false:
Configure supported ACR claims for the tenant
The FAPI tests pass a required ACR value ofurn:mace:incommon:iap:silver. To include the required ACR value in the , add urn:mace:incommon:iap:silver to the list of supported ACR values for the tenant:
Remove the alg property from JWKS endpoint
To allow for keys to be used with multiple algorithms, not just RS256, remove the tenant’salg property from the output of the /.well-known/jwks.json endpoint:
Add Action to require scope and redirect_uri
By default, Auth0 allows requests without a scope, assuming theopenid scope if no scope is present. Auth0 also allows requests without a redirect_uri, which you can set in Actions. However, the FAPI conformance tests require Auth0 to be more restrictive.
Add the following Action to enforce the necessary restrictions on scope and redirect_uri: