Availability varies by Auth0 plan
Your Auth0 plan or custom agreement affects whether this feature is available. To learn more, read Pricing.
name
that asserts that the name of the user authenticating is “John Doe”.
There are two types of JWT claims:
- Registered: Claims defined by the JWT specification to ensure interoperability with third-party, or external, applications. OpenID Connect (OIDC) standard claims are reserved claims.
- Custom: Claims that you define yourself. These claims can be non-registered, collision-resistant public claims or non-registered, non-public private claims subject to collision. Name these claims carefully, such as through namespacing, to avoid collision with reserved claims or other custom claims. It can be challenging to deal with two claims of the same name that contain differing information.
Authenticate users through an organization
To authenticate a user through an organization, anorganization
parameter is added to a call to the /authorize
endpoint. Examples of tokens returned when a user logs in through organizations are provided below.
By default, ID and access tokens only include organization IDs. However, you can configure your tenant to allow the use of organization names in the Authentication API. When configured, ID and access tokens contain both the
org_id
and org_name
claims. To learn more, review Use Organization Names in Authentication API.ID token
In the following example, note thathttps://marketplace/roles
and https://namespace.exampleco.com/
are custom claims that have been added to the token, while the other included claims are standard.
Access token
Machine-to-Machine access to an organization
In machine-to-machine use cases, anorganization
parameter is added to the Client Credentials request to the /oauth/token
endpoint so that an application can obtain an access token for itself rather than a user.
By default, ID and access tokens only include organization IDs. However, you can configure your tenant to allow the use of organization names in the Authentication API. When configured, ID and access tokens contain both the
org_id
and org_name
claims. To learn more, read Use Organization Names in the Authentication API.Validate tokens
When theorganization
parameter is added to a call to the /authorize
endpoint or the /oauth/token
endpoint, Auth0 SDKs automatically validate the org_id
claim, which is returned as part of any generated tokens. However, for security purposes, additional validation should be performed when tokens are received.
If you have configured your tenant to allow the use of organization names in the Authentication API, ID and access tokens contain both the
org_id
and org_name
claims. If present, validate the org_name
claim in addition to org_id
to ensure the received values correspond to a trusted entity.In general, using organization IDs is the preferred method for validating tokens. However, organization names can be used if they are more appropriate for your use case. To understand the potential implications of using organization names to validate tokens, review Use Organization Names in Authentication API.organization
parameter was passed to the /authorize
endpoint, but an org_id
claim is present in the , then your application should validate the claim to ensure that the value received is expected or known and that it corresponds to an entity your application trusts, such as a paying customer. If the claim cannot be validated, then the application should deem the token invalid.
For APIs:
If an org_id
claim is present in the access token, then your API should validate the claim to ensure that the value received is expected or known and that it corresponds to an entity your application trusts, such as a paying customer. If the claim cannot be validated, then the API should deem the token invalid.
In particular:
- The
iss
(issuer) claim should be checked to ensure the token was issued by Auth0. - The
org_id
claim should be checked to ensure it is a value that is already known to the application. This could be validated against a known list of organization IDs, or perhaps checked in conjunction with the current request URL. For example, the subdomain may hint at which organization should be used when validating the ID Token.
org_id
. This ensures that only information about a given organization can be accessed or modified when the org_id
value corresponding to that organization is received in the access token.