strategy=waad
) connections configured to use the Azure Active Directory (v1) Identity API.
If you received a notification via email, one or more of your tenants one or more tenants associated with your Auth0 tenant admin user account haa a Microsoft Azure AD connection targeting the Azure Active Directory (v1) identity API and configured to obtain extended attributes and could potentially be impacted.
You must review applicable tenants. For connections dependent on the deprecated functionality, you must either:
event.request.query
and event.request.body
objects when executing Actions for the post-login
and credentials-exchange
triggers. Only tenants identified as using Actions to reference request properties planned for restriction will maintain access until September 16, 2025.
The service will restrict the following property names in the request-related objects:
auth_session
authn_response
client_secret
client_assertion
refresh_token
PATCH
request to the /api/v2/emails/provider endpoint
, you may need to specify a password for the credentials.smtp_pass
field.
A SMTP email provider’s credentials object supports the following fields:
credentials.smtp_pass
: SMTP email provider’s passwordcredentials.smtp_host
: SMTP email provider’s hostcredentials.smtp_port
: SMTP email provider’s portcredentials.smtp_user
: SMTP email provider’s usernamecredentials.smtp_pass
field in the following cases:
credentials.smtp_host
, credentials.smtp_port
, or credentials.smtp_user
fields with a value that is different from the existing value or updating just a subset of those three fields.credentials.smtp_pass
field in the following cases:
credentials.smtp_host
, credentials.smtp_port
, and credentials.smtp_user
fields.PATCH /api/v2/users/{id}
) will no longer invalidate user sessions for database connection users when:
email
or email_verified
attributes are set to an unchanged value.email_verified
attribute is set to a true
value.read:connections_options
scope to view the options
field:
Requests to the following Management API endpoints will require the update:connections_options
to modify the options
field:
GET
, POST
, and PATCH
) will no longer allow retrieving or setting values for the following protected properties in the context of the options
object for non-custom social connections:
POST /api/v2/users/{id}/roles
) to represent their intended permissions. Currently, roles can be assigned to users with read:roles
scope via the Management API. This capability is being deprecated, and role updates will require the create:role_members
scope.
cross_origin_authentication
.