id_token
to your Android application.id_token
to your Auth0 tenant for validation. Auth0 validates the client_id
from the id_token
against the client_id
of the Google social connection configured in your tenant.access_token
to your Android application.Android
. This is referred to as client_id_native
.
client_id_web
).
client_id
or an error will occur. In the ID Token returned from Google, the authorized party (azp) is automatically set to the Android OAuth Client ID, and the audience (aud) is set to the Web OAuth Client ID.When invoking the Credentials Manager from Android, the native application should use the client_id_web
via .setServerClientId
in the Credentials Manager SDK. client_id_web
corresponds to the Web Application OAuth 2 Credential in the Google Cloud Console, and it is configured in the Google OAuth2 social connection. For more information, refer to Google’s documentation.googleCredential
requires the native application code to invoke the Google library. For details, refer to Google’s Credential Manager documentation.
id_token
as demonstrated in previous examples.
To do so, decode the Google token and pass the email
provided in the as a login_hint
. This prevents the end user from having to re-enter their email address in the web flow.
id_token
. In this scenario, the end user will only see the MFA screen.