pkce
property to one of the supported values listed below.Value | Description |
---|---|
auto | Default value. Uses the strongest algorithm available. |
s256 | Uses the SHA-256 algorithm. Auth0 does not currently support RS512 tokens. |
plain | Uses plaintext as described in the PKCE specification. |
disabled | Disables support for PKCE. |
pkce
property to a value other than auto
may prevent a connection from working properly if the selected value is not supported by the identity provider.Do not set the property to disabled
except when troubleshooting authentication issues.pkce
to s256
as the connection’s metadata does not expose the hashing algorithm used. Currently, the Azure AD Enterprise connection does not support PKCE.options.attribute_map
object properties listed below. Templates must be in JSON format with valid key/value pairs.
Property | Required? | Description |
---|---|---|
mapping_mode | Required | Method used to map incoming claims. |
userinfo_scope | Optional | Scopes to send to the IdP’s Userinfo endpoint. |
attributes | Required | Object containing mapping details for incoming claims. |
mapping_mode
property defines the method used to map incoming claims from the IdP to the Auth0 user profile. mapping_mode
supports the following values:
Value | Description |
---|---|
use_map | Uses the provided template to map the data. |
bind_all | Copies all data elements provided by the IdP. |
mapping_mode
property to bind_all
, your IdP may attempt to map values to one or more of these restricted claims. While this does not prevent users from authenticating on your connection, values associated with restricted claims are not mapped to the Auth0 user profile.
If you set mapping_mode
to use_map
, you can map the incoming restricted claim to a valid one:
userinfo_scope
property defines the scopes that Auth0 sends to the IdP’s UserInfo endpoint when requested.
For example, if you want to send the standard OIDC scopes and the groups
scope when requesting the UserInfo endpoint, you can do so as follows:
attributes
property is an object containing mapping information that allows Auth0 to interpret incoming claims from the IdP. Mapping information must be provided as key/value pairs.
The key to the left corresponds to an Auth0 user profile attribute. The value to the right represents the incoming claim from the IdP, which can be expressed as a literal value, a dynamic context object, or a combination of both. Dynamic context objects are template expressions written in the familiar ${variable}
format.
context
object. This allows you to store unique values for individual profiles, as opposed to literal values that are static across all profiles.
The context
object supports the following properties:
Property | Description |
---|---|
context.connection | Contains the following properties: - id : The connection’s unique identifier (for example, con_4423423423432423 ). - strategy : The connection’s strategy (for example, oidc ). |
context.tokenset | Contains the following properties: - access_token : The entire validated access token sent by the IdP. - <claim name> : Any ID token claim sent by the IdP. |
context.userinfo | Contains the following properties: - <claim name> : Any available claim provided by the IdP’s UserInfo endpoint. |