npm
packages, and can connect external integrations that enhance your overall extensibility experience. To learn more about what Actions offer, read Understand How Auth0 Actions Work.To help with your migration, we offer guides that will help you migrate from Rules to Actions and migrate from Hooks to Actions. We also have a dedicated Move to Actions page that highlights feature comparisons, an Actions demo, and other resources to help you on your migration journey.To read more about the Rules and Hooks deprecation, read our blog post: Preparing for Rules and Hooks End of Life.POST /oauth/token
endpoint using the Client Credentials Flow. For example, you may deny the token from being issued, add custom claims to the access token, or modify its scopes. To learn more, read Client Credentials Flow.
Hooks at this extensibility point are blocking (synchronous), which means they execute as part of the trigger’s process and prevent the rest of the Auth0 pipeline from running until the Hook is complete.
triggerId
for the Client Credentials Exchange extensibility point is credentials-exchange
. To learn how to create hooks for this extensibility point, read Create Hooks.cb
) at the end of the sample code signals completion and must be included.
access_token.scope = scope
ensures that all granted scopes will be present in the access token. Removing it will reset all scopes, and the token will include only scopes you add with the script.
scope
property of the response objectcontext.webtask.secrets.SECRET_NAME
.client_credentials
grant from the /oauth/token
endpoint, Auth0 will respond with:
client_credentials
grant is from the /oauth/token
endpoint, Auth0 responds with:
client_credentials
grant from the /oauth/token
endpoint, Auth0 will respond with:
client_credentials
grant from the /oauth/token
endpoint, Auth0 responds with:
Error
class and ServerError
is identical, but the ServerError
class allows you to be explicit about the OAuth2 error that will be returned.