connection
parameter. This value maps directly with any connection defined in your dashboard. When using the Hosted version of Lock by calling the /authorize
endpoint, you can pass along a connection
query string parameter containing the name of the connection. Alternatively, if you are using Embedded Lock, this is as simple as writing auth0.show({connections: ['{yourConnection}']});
.
connection
value. One of them is to use vanity URLs: for example, company employees will use https://internal.yoursite.com
, while external contractors will use https://external.yoursite.com
.domains
. If a connection has this setup, then the password textbox gets disabled automatically when typing an email with a mapped domain. Note that you can associate multiple domains to a single connection.
https://{yourDomain}/v2/logout
. Redirecting the user to this URL clears all cookies set by Auth0 for the user.federated
query string parameter to the logout URL: https://{yourDomain}/v2/logout?federated
.returnTo
query string parameter with the target URL as the value: https://{yourDomain}/v2/logout?returnTo=http://www.example.com
. Note, that you will need to add the returnTo
URL as an Allowed Logout URLs. For more information on how to implement this refer to: Logout.
The logout flow (not including federated logout) is as follows:
returnTo
query string parameter.Admin
group which will allow them to approve timesheets. The Authorization Extension allows for mapping groups to existing group membership.
All timesheet administrators will be assigned to the Timesheet Administrators
group on Active Directory, which will be automatically mapped to the Admin
group inside the Timesheet Application.
When you install the Authorization Extension, it creates a rule in the background, which does the following:
app_metadata
.Timesheet Admins
groups to the Admin
group you just created.
Timesheet Admins
group in Active Directory, and those users will be automatically mapped to the Admin
group inside our application.
For more information refer to the Authorization Extension documentation.
authorization
claim with all the authorization related settings for a particular user. The groups for a user will be added as a sub-claim of the authorization
claim called groups
and all the groups a user belongs to will be added as an array to this claim. This is an example of what JSON payload of a ID Token may look like with the groups listed:
authorization
claim. You can then store these groups, along with other user information inside the user’s session, and subsequently query these to determine whether a user has permissions to perform a certain action based on their group membership.