crossOriginVerification
method from the Auth0.js SDK in your application on a dedicated page to handle cases when third-party cookies are disabled.
For browsers that are not supported, such as Chrome, Opera, and Safari, cross-origin authentication will not work when third-party cookies are disabled unless you enable Custom Domains.
WebAuth
from Auth0.js. Call crossOriginVerification
immediately. The name of the page is up to you.
localhost
. The page must be in the same domain where the embedded login form is hosted and must have an https
scheme./co/authenticate
endpoint, which has the following errors:
Status | Code | Description |
---|---|---|
400 | invalid_request | Invalid request body. All and only of client_id, credential_type, username, otp, realm are required. |
400 | unsupported_credential_type | Unknown credential type parameter. |
400 | invalid_request | Unknown realm non-existent-connection. |
401 | unauthorized_client | Cross origin login not allowed. |
401 | password_leaked | This login attempt has been blocked because the password you’re using was previously disclosed through a data breach (not in this application). |
403 | access_denied | Wrong email or password. |
403 | access_denied | Authentication error |
403 | blocked_user | Blocked user |
429 | too_many_attempts | Your account has been blocked after multiple consecutive login attempts. We’ve sent you a notification via your preferred contact method with instructions on how to unblock it. |
429 | too_many_attempts | We have detected suspicious login behavior and further attempts will be blocked. Please contact the administrator. |
403
error without an error
or error_description
property. The response body would just include something similar to the following:
Origin https://test.app is not allowed.
samesite
cookie attribute options were true
, false
, strict
or lax
. If you didn’t set the attribute manually, Auth0 would use the default value of false
.Effective February 2020, Google Chrome v80 changed the way it handles cookies, and Auth0 implemented the following changes accordingly:samesite
attribute set will be set to lax
.sameSite=none
must be secured, otherwise they cannot be saved in the browser’s cookie jar.