post-login
Action triggers to ensure web sessions created through Native to Web SSO are time-boxed appropriately and expire quickly when inactive.
You can use post-login
Actions to detect when a session is initiated through a session_transfer_token
and apply shorter idle and absolute timeouts:
session_transfer_token
to the origin environment using enforce_device_binding
.
session_transfer_token
to the web application using a secure, HTTPOnly cookie scoped to your Auth0 domain to prevent accidental logging or sharing of the token via URLs and to reduce the attack surface for token interception. If you need to use a query parameter (for example, for Chrome Custom Tabs) ensure that the URL uses HTTPS and remove the token from the URL after use.
allow_refresh_token
for web applications that truly need long-lived tokens. In most cases, short-lived combined with silent authentication are sufficient and safer in browser contexts.
allow_refresh_token
setting to ensure refresh tokens issued via Native to Web SSO are bound to the session that issued them. If the session is revoked or expires, the refresh token is automatically invalidated.
session_transfer_token
are revoked, enable enforce_cascade_revocation
in the native application. This is critical to ensure secure session invalidation across applications.