/logout
endpoint. However, if you call the Update a User endpoint to reset user attributes (passing values email
, email_verified
, phone_number
, and password
), auth0.checkSession
does not renew the session, and the user must re-login.https://{yourCNAME}
or {yourTenant}.auth0.com/oidc/logout
- typically performed via use of the appropriate method in the Auth0 SDK for your technology stack. This will clear your Auth0 session. You will also want to add a query parameter for that request called id_token_hint
- this parameter should contain a URL that has been pre-registered and protects you against open redirect attacks.
Auth0 only redirects to AllowListed URLs after logout and there are two places you can configure these. The first place you can set this is at your Auth0 tenant level where you can put the set of logout URLs that are shared between all applications. The second place is in the application settings: if you need different redirects for each application, you can allowlist the URLs in your application settings. This allows you to set logout URLs in an application-specific context.
federated
query parameter to the redirect to /oidc/logout
. This redirects the user to their identity provider and logs them out there as well. To learn more about federated logout, review the article Log Users Out of Identity Providers.