Identity Provider (IdP) access tokens do not require validation. Pass the IdP access token to the issuing IdP to handle the validation. For more information, see Identity Provider Access Tokens for details.
401 Unauthorized result.
- Perform standard JWT validation. Because the access token is a JWT, you need to perform the standard JWT validation steps. See Validate JSON Web Tokens for details.
-
Verify token audience claims. If you’ve performed the standard JWT validation, you have already decoded the JWT’s payload and looked at its standard claims. The token audience claim (
aud, array of strings) depends on the initial token request. Theaudfield could contain both an audience corresponding to your custom API and an audience corresponding to the/userinfoendpoint. At least one of the audience values for the token must match the unique identifier of the target API as defined in your API’s Settings in the Identifier field. See Get Access Tokens for details. -
Verify permissions (scopes). Verify that the application has been granted the permissions required to access your API. To do so, you will need to check the
scopeclaim (scope, space-separated list of strings) in the decoded JWT’s payload. It should match the permissions required for the endpoint being accessed. For example, if your custom API provides three endpoints to read, create, or delete a user record, when you registered your API with Auth0, you created three corresponding permissions:create:usersprovides access to the/createendpointread:usersprovides access to the/readendpointdelete:usersprovides access to the/deleteendpoint
/createendpoint, but the access token’sscopeclaim does not include the valuecreate:users, then the API should reject the request.