{yourDomain}
will no longer be valid once you start using your custom domain, so users will have to log in again.
Feature | Section to read |
---|---|
with a customized login page | Universal Login |
Lock embedded in your application | Embedded Lock |
Auth0 SPA SDK, Auth0.js, or other Auth0 SDKs | Auth0 SPA SDK, Auth0.js, and other SDKs |
Custom domain with Auth0 emails | Use custom domains in emails |
Social identity providers | Configure social identity providers |
Google Workspace connections with your custom domain | Configure Google Workspace connections |
Issue Access Tokens for your APIs or access Auth0 APIs from your application | APIs |
Identity Providers | Configure SAML identity providers |
SAML applications | Configure SAML applications |
Web Service Federation (WS-Fed) applications | Configure WS-Fed applications |
Azure AD connections | Configure Azure AD connections |
ADFS connections | Configure ADFS connections |
AD/LAP connections with Kerberos support | Configure AD/LAP connections |
configurationBaseUrl
and overrides
options as seen in the following sample script:
overrides
option.
/usernamepassword/login
) and the issuer (required for id_token
validation) from the domain. However, if you’re a Private Cloud customer who uses a proxy or a custom domain name where the domain name is different from the tenant/issuer, you can use __tenant
and __token_issuer
to provide your unique values.
configurationBaseUrl
to the appropriate CDN URL.
https://cdn.[us|eu|au|jp].auth0.com
(us
for US, eu
for Europe, au
for Australia, or jp
for Japan).
https://cdn.auth0.com
if the region is the United States, or add eu
, au
, jp
for Europe, Australia, or Japan. If your tenant was created after 11 June 2020, use https://cdn.us.auth0.com
if the region is the United States.https://login.northwind.com/login/callback
).
You cannot use Auth0 developer keys with custom domains.
https://<YOUR-CUSTOM-DOMAIN>/login/callback
that includes your custom domain (such as https://login.northwind.com/login/callback
).
audience
) will not change. This is a constant value for each API, and despite the fact that it’s conventional to use a URI, it is completely independent of the domain used to obtain the token.
Auth0 issues tokens with the iss
claim of whichever domain you used to obtain the token.
https://{yourDomain}/userinfo
and https://{yourDomain}/api/v2/
) instead of your custom domain when specifying an audience
. This is the only place to use your default tenant domain.
All requests (i.e. obtaining the token, and actually calling the API) must use the same domain. Tokens obtained via a custom domain must be used on an Auth0 API using the same custom domain.
If you use an authentication flow with your Custom Domain to request to access the , you must call the Management API endpoint with your Custom Domain too.
https://<YOUR-CUSTOM-DOMAIN>/samlp/metadata?connection=<YOUR-CONNECTION-NAME>
. This will include the updated ACS URL. Then, you must manually update this value in your IdP(s) settings. This change to your IdP(s) must happen at the same time as you begin using your custom domain in your applications. This can pose a problem if there are multiple IdPs to configure.https://<TENANT>.auth0.com/pem
. Note that https://<YOUR-CUSTOM-DOMAIN>.com/pem
will return the same certificateAuthnRequest
message that Auth0 sends to the IdPAuthnRequest
messages it sends to the IdP.https://<YOUR-CUSTOM-DOMAIN>/samlp/metadata/<YOUR-CLIENT-ID>
. Note that the issuer entity ID for the assertion returned by Auth0 will change when using a custom domain (from something like urn:northwind.auth0.com
to one with the custom domain, such as urn:login.northwind.com
).
If you have an IdP-initiated authentication flow, you will need to update the URL used to invoke the IdP-initiated authentication flow to reflect the custom domain. Instead of https://<TENANT>.auth0.com/samlp/<YOUR-CLIENT-ID>
, you should use https://<YOUR-CUSTOM-DOMAIN>/samlp/<YOUR-CLIENT-ID>
.
https://<YOUR-CUSTOM-DOMAIN>/wsfed/FederationMetadata/2007-06/FederationMetadata.xml
.
https://<YOUR-CUSTOM-DOMAIN>/login/callback
(such as https://login.northwind.com/login/callback
).
https://<YOUR-CUSTOM-DOMAIN>/login/callback
(such as https://login.northwind.com/login/callback
).
config.json
file needs to be modified, with the PROVISIONING_TICKET
value changed to use your custom domain in the format https://<YOUR-CUSTOM-DOMAIN>/p/ad/jUG0dN0R
.
Once this change is saved, you need to restart the AD/LDAP Connector service for the change to take effect.