webAuth.parseHash
of the library and set the flag __enableIdPInitiatedLogin
to true
.
const lock = new Auth0Lock(clientID, domain, options)
Here’s the flag itself:
var options = { _enableIdPInitiatedLogin: true };
Note that the enableIdPInitiatedLogin
flag is preceded by one underscore when used with Lock and two underscores when used with the auth0.js library.
redirect_uri
if you use OIDC.
Setting | Description |
---|---|
redirect_uri | When the IdP-initiated login has completed the request is then redirected to the first URL listed in the Allowed Callback URLs for the application. However, if you set a redirect_uri , the IdP will redirect to this URL. This adds flexibility for cases such as when you have a set subdomain scheme with a wildcard and you only want to redirect to one specific subdomain. |
scope | Define scopes for the ID token sent. You can set multiple scopes. |
response_type | Set the token for the Implicit Grant Flow for SPAs. You can set code for the Authorization Code Grant Flow for regular web apps. |
localhost
and 127.0.0.1 as unverified domains. If you use either as your callback URL, tokens from the /userinfo
endpoint will return an empty response. To get a token response with requested scopes, use a verified domain.redirect_uri=https://jwt.io&scope=openid email&response_type=token