Assessor | Risk Signal | How it is computed |
---|---|---|
NewDevice | User attempts to sign in from a device that has not been used to access the account in the last 30 days. | User agent and browser cookies identify a device. At login time, the device information is compared to the list of devices for the account. |
ImpossibleTravel | User attempts to sign in from a geolocation that indicates an impossible travel situation when compared to the last login. | The distance between the last valid location and the location of the attempted sign in is computed; the time difference between the sign in attempt is used to compute a hypothetical travel velocity. Velocity is compared to a reasonable travel velocity. |
UntrustedIP | User attempts to sign in from an IP address known to be associated with suspicious behavior. | Auth0 uses intelligence from traffic events to determine the likelihood that the IP address has been used by bad actors to perpetrate high velocity attacks. |
Overall Risk Score | A combination of all 3 factors above. | Auth0 uses all 3 scores to assign an overall score. Use Actions if you want to implement your own business logic. |
Protocol | Flow | Supported |
---|---|---|
OIDC/OAuth2 | Authorization Code Flow | Supported |
OIDC/OAuth2 | Authorization Code Flow with PKCE | Supported |
OIDC/OAuth2 | Implicit Flow with Form Post | Supported |
OIDC/OAuth2 | Hybrid Flow | Supported |
OIDC/OAuth2 | Client Credentials | Not supported |
OIDC/OAuth2 | Device Authorization | Not supported |
OIDC/OAuth2 | Resource Owner Password (ROP) | Not supported |
SAML | Service Provider-Initiated (SP-initiated) | Supported |
SAML | Identity Provider-Initiated (IdP-initiated) | Not supported* |
WS-Federation | N/A | Supported |
AD/LDAP | N/A | Supported |
Login Flow Implementation | Adaptive MFA Support Level |
---|---|
Universal Login | Supported |
Classic Login with no customization | Supported |
Classic Login (hosted by Auth0), custom login page with lock.js Lock template | Supported |
Classic Login (hosted by Auth0), custom login page with auth0.js Custom Login Form template | Supported |
Classic Login (hosted by Auth0), custom login page with email passwordless flow and lock.js Passwordless template | Supported |
Classic Login (hosted by Auth0), custom login page with SMS passwordless flow and lock.js Passwordless template | Not supported, because it does not make an email address available, which is a requirement. |
Web or native apps using Resource Owner Password Grant (ROPG) flow (including those using older versions of lock.android and lock.swift SDKs | Supported, with the following limitations: • Works when all end users are already enrolled in MFA (when users are required to enroll on signup). Users who are not already enrolled will be blocked in risky scenarios. • Risk assessment to determine if a user is logging in from a new device will not work. The ROPG flow does not support the browser cookies needed to determine risk. • You must pass auth0-forwarded-for header with information from the originating IP address for risk assessments for IP reputation to work. |
Native apps using newest version of SDKs that support embedded Universal Login | Supported |
Native apps using newest version of SDKs and ROPG flow | Supported with the following limitations: • Works when all end users are already enrolled in MFA (when users are required to enroll on signup). Users who are not already enrolled will be blocked in risky scenarios. • Risk assessment to determine if a user is logging in from a new device will not work. The ROPG flow does not support the browser cookies needed to determine risk. • You must pass auth0-forwarded-for header with information from the originating IP address for risk assessments for IP reputation to work. |
Flows hosted by you (not Auth0) using lock.js or auth0.js that perform cross-origin authentication (co/authenticate endpoint) | Supported |