read:balance
), one that authorizes fund transfers (transfer:funds
). Your API is registered with Auth0.
A calling application will request authorization from the user to access the requested scopes, and the user will approve or deny the request. The app may request read access to the user’s balance by including the read:balance
scope in its request, access to make fund transfers by including the transfer:funds
scope in its request, or access to both read the user’s balance and transfer funds by including both the read:balance
and transfer:funds
scopes in its request.
Now, when the app calls your API, it will include a token which verifies that the user has provided authorization to access their content and also indicates which scopes the user has approved. Your API should respect the approved scopes and only release information that was authorized by the user to the calling application.
organizer
and a role of participant
. Users with a role of organizer
need to create and update events, whereas users with a role of participant
need to view events and register for events. To do this, you create four scopes for your API: one that authorizes create access for events(create:events
), one that authorizes update access for events (update:events
), one that authorizes read-only access for events (view:events
), and one that authorizes registration access for events (register:events
). Both your API and event application are registered with Auth0, and the Allow Skipping User Consent for first-party applications option is enabled for your API. You have installed the Authorization Extension and configured an organizer
role and created the create:events
and update:events
scopes for it, and assigned it to User A. You have also configured a participant
role and created the view:events
and register:events
scopes for it, and assigned it to User B.
User A authenticates with the calling application, which requests the necessary scopes, but because it is a first-party application, user consent will not be requested. The app may request any combination of create:events
, update:events
, view:events
, and register:events
scopes, but User A is recognized as having the role of organizer
and therefore is only granted the create:events
and update:events
scopes.
Now, when the app calls your API, it will include a token which verifies that it has authorization for only the scopes associated with the role of the authenticated user.
read:images
) and one that authorizes delete access to your imaging data (delete:images
). Your API and automated service are registered with Auth0, and you have authorized the automated service to request tokens for your API.
The calling automated service will request the necessary scopes, but because there is no user, consent will not be requested. The service may request read access to your imaging data by including the read:images
scope in its request, delete access by including the delete:images
scope in its request, or both read and delete access by including the read:images
and delete:images
scopes in its request.
Now, when the automated service calls your API, it will include a token which verifies that it has authorization for the requested scopes.