npm install auth0-lock
Install via bower:
bower install auth0-lock
Include via our CDN (Replace .x
and .y
with the latest minor and patch release numbers from the Lock Github repository:
Latest Minor Release:<script src="https://cdn.auth0.com/js/lock/11.x/lock.min.js"></script>
Latest Patch Release:
<script src="https://cdn.auth0.com/js/lock/11.x.y/lock.min.js"></script>
It is recommended that production applications use a specific patch version, or at the very least a specific minor version. Regardless of the method by which Lock is included, the recommendation is that the version should be locked down and only manually updated, to ensure that those updates do not adversely affect your implementation. Check the GitHub repository for a current list of releases.
head
:
<meta name="viewport" content="width=device-width, initial-scale=1"/>
auth0-lock
module, you will need to bundle it with all its dependencies. Examples are available for Browserify and webpack.
Auth0Lock
object, and provide it with your Auth0 (the unique client ID for each Auth0 application, which you can get from the management dashboard) and your Auth0 domain (for example yourname.auth0.com
).
on
method for the authenticated
event. When the event occurs, use the accessToken
which was received to call the getUserInfo
method and acquire the user’s profile information (as needed).
<h2>Welcome <span id="nick" class="nickname"></span></h2>
Note that if you are storing the user profile, you will want to JSON.stringify
the profile object and then, when using it later, JSON.parse
it, because it will need to be stored in localStorage
as a string rather than a JSON object.
lock.show();
on page load.
This will show the Lock widget, and paired with the above, you’re now ready to handle logins!
Auth0LockPasswordless
rather than with Auth0Lock
:
allowedConnections
option with either email
or sms
as the value:
email
, you have one more option to select - whether you wish your users to receive a code to input, or a “magic link” to use. This is done via the passwordlessMethod
option, which takes values of code
or link
.
foo.auth0.com
, but custom domains allow you to use the same domain for each of the applications in question as well as your Auth0 tenant, preventing the risk of CSRF attacks./co/authenticate
endpoint, which has the following errors.
The error description is human readable. It should not be parsed by any code and it subject to change at any time.
Status | Code | Description |
---|---|---|
400 | invalid_request | Invalid request body. All and only of client_id, credential_type, username, otp, realm are required. |
401 | unauthorized_client | Cross origin login not allowed. |
400 | unsupported_credential_type | Unknown credential type parameter. |
400 | invalid_request | Unknown realm non-existent-connection. |
403 | access_denied | Wrong email or password. |
403 | access_denied | Authentication error |
403 | blocked_user | Blocked user |
401 | password_leaked | This login attempt has been blocked because the password you’re using was previously disclosed through a data breach (not in this application). |
429 | too_many_attempts | Your account has been blocked after multiple consecutive login attempts. We’ve sent you a notification via your preferred contact method with instructions on how to unblock it. |
429 | too_many_attempts | We have detected suspicious login behavior and further attempts will be blocked. Please contact the administrator. |