/oauth/token
. Usage of the /oauth/ro
endpoint was deprecated on 08 July 2017. The /oauth/ro
endpoint was previously used to exchange a one-time password (OTP) received by the end-user email or SMS for an and an . Auth0 has implemented a new API that replaces /oauth/ro
for this use case and we recommend that you migrate to using the new endpoint.
/oauth/ro
directly without the use of any Auth0 libraries or SDKs. Auth0 libraries such as Lock or Auth0.js have been updated to stop using /oauth/ro
internally. If you use the lock- library, you can now use Passwordless Mode in Lock instead.
/oauth/ro
based access token has expired, Auth0 forces them to reauthenticate (forced logout required) because the /oauth/ro
refresh token cannot be used to call /oauth/token
for a new access token. All currently logged in user’s must log in again during an /oauth/ro
to /oauth/token
migration./oauth/ro
looked similar to this:
/oauth/token
.favorite_color
, is no longer a valid scope.device
parameter is removed.audience
parameter is optional./oauth/token
:
password-realm
, rather than the standard password
.client_id
, username
, and password
are unchanged.realm
is included because we are using Password Realm grant type, and replaces the connection
parameter from previous calls.scope
parameter is mostly the same, but does not accept non-OIDC values.audience
parameter can be added, indicating the API the token will be intended for./oauth/ro
were similar in format to the following:
/userinfo
endpoint (provided that the API specified by the audience
param uses RS256 as ) and optionally the custom API if one was specified.offline_access
scope was granted and the API has Allow offline access set./oauth/token
:
/oauth/ro
Endpoint. Turning off this switch disables the deprecated endpoint for your tenant, preventing it from being used.