user@example.com
) into the Auth0 page, and then are redirected to your IdP to complete authentication.
Property | Values |
---|---|
Entity ID | urn:auth0:auth0:{assignedConnectionName} |
Callback endpoint | https://auth0.auth0.com/login/callback |
Claim | Claim identifier | Value |
---|---|---|
Name Identifier | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier | E-Mail-Addresses or User-Principal-Name |
Email Address | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress | N/A |
Name | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | N/A |
https://{yourServer}/adfs/ls
)https://auth0.auth0.com/login/callback
.
https://login. microsoftonline.com/{yourAzureAdTenantId}/v2.0/.well-known/openid-configuration
)Property | Value |
---|---|
Identifier (Entity ID) | urn:auth0:auth0:{assignedConnectionName} |
Reply (ACS) URL | https://auth0.auth0.com/login/callback |
Sign-on URL | https://manage.auth0.com/login?connection={assignedConnectionName} |
email
, Unique User Identifier
, and optionally name -
unchanged from Azure’s suggestions.
https://login.microsoftonline.com/{azureAdTenantId}/federationmetadata /2007-06/federationmetadata.xml?appid={appId}
).Property | Value |
---|---|
Entity ID | urn:auth0:auth0:{assignedConnectionName} |
Callback endpoint (ACS URL) | https://auth0.auth0.com/login/callback |
https://{org}.okta.com/app/{appId}/sso/saml/metadata
.https://manage.auth0.com/login?connection={assignedConnectionName}
. This is the application that users will be able to select to log in.Property | Value |
---|---|
Entity ID | urn:auth0:auth0:{assignedConnectionName} |
Callback endpoint (ACS URL) | https://auth0.auth0.com/login/callback |
Login URL | https://manage.auth0.com/login?connection={assignedConnectionName} |
Property | Value |
---|---|
Callback URL | https://auth0.auth0.com/login/callback |
https://{idpDomain}/[...]/.well-known/openid-configuration
)Property | Value |
---|---|
Entity ID | urn:auth0:auth0:{assignedConnectionName} |
Callback endpoint | https://auth0.auth0.com/login/callback |
Claim | Claim identifier | Value |
---|---|---|
Name Identifier | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier | upn or emailaddress |
Email Address | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress | N/A |
Name | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | N/AA |
https://manage.auth0.com/login?connection={assignedConnectionName}
https://accounts.auth0.com/teams/{team-identifier}.
https://manage.auth0.com/login?connection=auth0
This URL bypasses HRD, and allows them to log in with their email/password identity.
Tenant | Tenant Member | Connection | Affected? |
---|---|---|---|
fabrikam@us | user1@example.com | email/password | Yes |
fabrikam@us | user1@gmail.com | google-oauth2 | No |
fabrikam@us | user2@example.com | github | No |
fabrikam@us | user3@acme.com | email/password | No |
fabrikam@us | user4@example.com | email/password | Yes |
fabrikam-dev@us | user5@example.com | email/password | Yes |
fabrikam-dev@us | user1@example.com | email/password | Yes |
user1@gmail.com
, user2@example.com
, and user3@acme.com
are able to log in as they have previously, because they use either a social provider, or an email with a unassociated domain.
Alternatively, the Tenant Members user1@example.com
, user4@example.com
, and user5@example.com
are not able to log in as they have previously, because their emails are associated with the domain configured for HRD.
https://manage.auth0.com/login?connection={assignedConnectionName}