{https://yourApp/callback}
.auth0.com
.
Field | Description |
---|---|
Name | The name of your application. |
Authorized JavaScript origins | https://{yourDomain} |
Authorized redirect URIs | https://{yourDomain}/login/callback |
auth0.com
, separated by the dot (.
) symbol.
For example, if your tenant name is exampleco-enterprises
, and your tenant is in the US region, your Auth0 domain name would be exampleco-enterprises.us.auth0.com
and your Redirect URI would be https://exampleco-enterprises.us.auth0.com/login/callback
.
However, if your tenant is in the US region and was created before June 2020, then your Auth0 domain name would be exampleco-enterprises.auth0.com
and your Redirect URI would be https://exampleco-enterprises.auth0.com/login/callback
.
If you are using custom domains, your Redirect URI would be https://<YOUR CUSTOM DOMAIN>/login/callback
.
+
.
Field | Description |
---|---|
Connection name | Logical identifier for your connection; it must be unique for your tenant. Once set, this name can’t be changed. |
Google Workspace Domain | Google Workspace domain name for your organization. |
Client ID | Unique identifier for your registered Google application. Enter the saved value of the Client ID for the app you just registered in the Google developer console. |
Client Secret | String used to gain access to your registered Google application. Enter the saved value of the Client Secret for the app you just registered in the Google developer console. |
Attributes | Basic attributes for the signed-in user that your app can access. Indicates how much information you want stored in the Auth0 User Profile. Options include: Basic Profile (email , email verified flag) and Extended Profile (name, public profile URL, photo, gender, birthdate, country, language, and timezone). |
Extended Attributes (optional) | Extended attributes for the signed-in user that your app can access. Options include: Groups (distribution list(s) to which the user belongs, including the Extended Group Attributes Format option that retrieves the group name, group email address, and the unique group ID), Is Domain Administrator (indicates whether the user is a domain administrator), Is Account Suspended (indicates whether the user’s account is suspended), and Agreed to Terms (indicates whether the user has agreed to the terms of service). |
Auth0 APIs (optional) | When Enable Users API is selected, indicates that you require the ability to make calls to the Google Directory API. |
Auth0 User ID (optional) | By default, the Auth0 user_id maps to email . By enabling Use ID instead of Email for Auth0 User ID, user_id instead maps to id . This can only be set for new connections and cannot be changed once configured. |
Sync user profile attributes at each login | When enabled, Auth0 automatically syncs user profile data with each user login, thereby ensuring that changes made in the connection source are automatically updated in Auth0. |
Field | Description |
---|---|
Home Realm Discovery | Compares a user’s email domain with the provided identity provider domains. For more information, read Configure Identifier First Authentication |
Display connection button | This option displays the following choices to customize your application’s connection button. |
Button display name (Optional) | Text used to customize the login button for Universal Login. When set the button reads: “Continue with {Button display name}”. |
Button logo URL (Optional) | URL of image used to customize the login button for Universal Login. When set, the Universal Login login button displays the image as a 20px by 20px square. |
access_type=offline&approval_prompt=force
to the authorization request, Auth0 will forward these parameters to Google. Google will then return a , which will also be stored in the user profile.
user
object for individual users and on the connection
object for workspace admins.
To retrieve all extended group properties for a user with Google’s Directory Admin API, navigate to the Goolgle Workspace connection in your Auth0 Dashboard and enable the Groups extended attribute. Then, complete administrator consent using the Setup tab.
After these steps are complete, use the Get a connection endpoint of the Auth0 to retrieve the admin access token stored on the connection
object. You can then use this token to call Google’s Manage Groups endpoint.
Example call:
post-login
Actions to validate whether authentication events are coming from legitimate users who are members of a Google organization. This can help mitigate potential vulnerability by preventing unauthorized access to your applications after users are no longer part of your organization.
To verify legitimate Google authentications, use post-login
Actions to validate the idp_tenant_domain
claim associated with the user and ensure the value matches the expected organization for that user.
You can only verify idp_tenant_domain
for users who authenticate with the following connection types:
idp_tenant_domain
using post-login
Actions.