{https://yourApp/callback}
.https://{yourDomain}/login/callback?connection={yourConnectionName}
urn:auth0:{yourTenant}:{yourConnectionName}
cat signing-cert.crt | base64
.
+
.
Field | Description |
---|---|
Connection name | Logical identifier for your connection; it must be unique for your tenant and the same name used when setting the Post-back URL and Entity ID at the IdP. Once set, this name can’t be changed. |
Sign In URL | SAML single login URL. |
X.509 Signing Certificate | Signing certificate (encoded in PEM or CER) you retrieved from the IdP earlier in this process. |
Enable Sign Out | When enabled, a specific Sign Out URL can be set. Otherwise, the Sign In URL is used by default. |
Sign Out URL (optional) | SAML single logout URL. |
User ID Attribute (optional) | Attribute in the SAML token that will be mapped to the user_id property in Auth0. |
Debug Mode | When enabled, more verbose logging will be performed during the authentication process. |
Sign Request | When enabled, the SAML authentication request will be signed. (Be sure to download and provide the accompanying certificate so the SAML IdP can validate the assertions’ signature.) |
Sign Request Algorithm | Algorithm Auth0 will use to sign the SAML assertions. |
Sign Request Digest Algorithm | Algorithm Auth0 will use for the sign request digest. |
Protocol Binding | HTTP binding supported by the IdP. |
Request Template (optional) | Template that formats the SAML request. |
Field | Description |
---|---|
Sync user profile attributes at each login | When enabled, Auth0 automatically syncs user profile data with each user login, thereby ensuring that changes made in the connection source are automatically updated in Auth0. |
Sync user profiles using SCIM | When enabled, Auth0 allows user profile data to be synced using SCIM. For more information, see Configure Inbound SCIM. |
Field | Description |
---|---|
Home Realm Discovery | Compares a user’s email domain with the provided identity provider domains. For more information, read Configure Identifier First Authentication |
Display connection button | This option displays the following choices to customize your application’s connection button. |
Button display name (Optional) | Text used to customize the login button for Universal Login. When set the button reads: “Continue with {Button display name}”. |
Button logo URL (Optional) | URL of image used to customize the login button for Universal Login. When set, the Universal Login login button displays the image as a 20px by 20px square. |
POST
call to the Create a Connection endpoint. Be sure to replace MGMT_API_ACCESS_TOKEN
, CONNECTION_NAME
, SIGN_IN_ENDPOINT_URL
, SIGN_OUT_ENDPOINT_URL
, and BASE64_SIGNING_CERT
placeholder values with your Management API , connection name, sign in URL, sign out URL, and Base64-encoded signing certificate (in PEM or CER format), respectively.
Value | Description |
---|---|
MGMT_API_ACCESS_TOKEN | Access Token for the Management API with the scope create:connections . |
CONNECTION_NAME | Τhe name of the connection to be created. |
SIGN_IN_ENDPONT_URL | SAML single login URL for the connection to be created. |
SIGN_OUT_ENDPOINT_URL | SAML single logout URL for the connection to be created. |
BASE64_SIGNING_CERT | X.509 signing certificate (encoded in PEM or CER) you retrieved from the IdP. |
metadataXml
) or the URL of the document (metadataUrl
). When providing the URL, content is downloaded only once; the connection will not automatically reconfigure if the content of the URL changes in the future.
metadataXml
option to provide content of the document:
metadataUrl
option to provide the URL of the document:
metadataUrl
manually./api/v2/connections/CONNECTION_ID
endpoint, passing a body containing {options: {metadataUrl: '$URL'}}
where $URL
is the same metadata URL with which you created the connection. You use the metadata URL to create a new temporary connection, then compare the properties of the old and new connections. If anything is different, update the new connection and then delete the temporary connection.
options.metadataUrl
. The connection object will be populated with information from the metadata./api/v2/connections/CONNECTION_ID
endpoint with {options: {metadataUrl: '$URL'}}
. Now the connection object is updated with the new metadata content.options
parameter, you override the entire options
object. Be sure all parameters are present.urn:auth0:YOUR_TENANT:YOUR_CONNECTION_NAME
. Set the connection.options.entityID
property when the connection is first created or by updating an existing connection.
The JSON example below can be used to create a new SAML connection using the SAML IdP’s metadata URL while also specifying a custom Entity ID. The Entity ID is still unique since it is created using the name of the connection.
{}
, and select Save.