response_mode
parameter in the authorization URL. This connection only supports the default response_mode
(query
).scope
parameters to send with the authorization request. Separate multiple scopes with spaces.
connection_scope
parameter is included when calling the IdP’s API. By default, scopes are delimited by a comma. If the toggle is enabled, scopes are delimited by a space. To learn more, read Add Scopes/Permissions to Call Identity Provider APIs.
https://{yourDomain}/login/callback
.GET
request to the /get-connections-by-id
endpoint. The response will be similar to:
options
object.
PATCH
request with the options
object and add "pkce_enabled":
true
.
options
object, information will be lost and the connection will break.user_id
property in the returned profile is required, and the email
property is optional but highly recommended. To learn more about what attributes can be returned, see User Profile Root Attributes.
You can filter, add, or remove anything from the profile returned from the provider. However, it is recommended that you keep this script as simple as possible. More sophisticated manipulation of user information can be achieved through the use of Rules. One advantage of using Rules is that they apply to any connection.
icon_url
property of the options
object and the display_name
property, respectively, via the Management API.
display_name
is not included in your request, the field is overwritten with the Connection name
value.display_name
and icon_url
only affect how the Connection displays in the Universal Login experience.authParams
element of the options
when configuring an OAuth 2.0 connection via the Management API. The call below will set a static parameter of custom_param
set to custom.param.value
on all authorization requests:
authParamsMap
element of the options
to specify a mapping between one of the existing additional parameters accepted by the Auth0 /authorize
endpoint to the parameter accepted by the Identity Provider.
Using the same example above, let’s assume that you want to pass the custom_param
parameter to the authorization endpoint, but you want to specify the actual value of the parameter when calling the Auth0 /authorize
endpoint.
In this case, you can use one of the existing addition parameters accepted by the /authorize
endpoint, such as access_type
, and map that to the custom_param
parameter:
/authorize
endpoint, you can pass the access type in the access_type
parameter, and that value will in turn be passed along to the authorization endpoint in the custom_param
parameter.
Authorization
header with Basic access authentication credentials. In this scenario, you can specify the following JSON object in the Custom Headers field:
[your credentials]
are the actual credentials to send to the Identity Provider.