Auth0 Integration
Auth0 is a cloud-based identity provider offering authentication and authorization as a service. By integrating Auth0 as a custom IDP in LoginRadius, you can enable federated login for users managed in Auth0. This allows them to authenticate via OAuth 2.0 while benefiting from LoginRadius' centralized identity workflows and security controls.
Key Features
-
OAuth 2.0 protocol-based integration
-
Login via existing Auth0-managed users
-
Secure token exchange and session management
-
Easy mapping of standard fields like
email
andsub
-
Compatibility with LoginRadius IDX (hosted login pages)
-
Custom scopes and headers are supported.
Use-Cases
-
Enable federated login for partner/affiliate networks using Auth0.
-
Migrate gradually from Auth0 to LoginRadius without user disruption.
-
Centralize analytics and user management across multiple IDPs.
-
Offer identity orchestration between brands or vendors.
-
Integrate multiple authentication flows under a unified LoginRadius IDX interface.
Configuration
- Setup in Auth0
- Configure in LoginRadius Console
-
Log in to Auth0.
-
Navigate to Applications > Applications and select the app.
-
Under Application URIs, add the following callback URL:
https://your_domain.hub.loginradius.com:443/socialauth/validate.sauth
-
Save the changes.
-
Under Advanced Settings > Endpoints, note down:
-
Authorization URL (Login Endpoint)
-
Token URL (Access Token Endpoint)
-
UserInfo URL (Profile Endpoint)
-
-
Under Settings, note down:
-
Client ID = Application Key
-
Client Secret = Application Secret
-
-
Go to Authentication > Custom IDPs.
-
Click Add Custom IDP → Select Custom OAuth Provider.
-
Fill in the required fields:
Field | Value |
---|---|
Provider Name | auth0 (or your custom label) |
Login Endpoint | e.g., https://your-domain.auth0.com/authorize |
Access Token Endpoint | e.g., https://your-domain.auth0.com/oauth/token |
Application Key | (From Auth0 – Client ID) |
Application Secret | (From Auth0 – Client Secret) |
Scope | openid email |
Response Type | code |
Profile Endpoint | e.g., https://your-domain.auth0.com/userinfo |
Request Token HTTP Method | POST |
- Header:
Key | Value |
---|---|
Authorization | Bearer #accesstoken# |
- Data Mapping (Mandatory Fields):
Field | Value |
---|---|
ID | sub |
- Save the configuration.
Integration Details
-
Create a user in Auth0 under User Management > Users.
-
Access your LoginRadius IDX URL:
https://your_domain.hub.loginradius.com/
-
Click the Auth0 (custom provider) icon.
-
You’ll be redirected to Auth0’s login screen.
-
Authenticate with the Auth0 credentials.
-
Upon successful login, you’ll be redirected back to the LoginRadius profile page with a valid session.
Best Practices
-
Use
openid email
scopes only unless others are required. -
Always use HTTPS endpoints.
-
Rotate your Auth0 client secrets periodically.
-
Implement token validation on your server before trusting user data.
-
Use a dedicated Auth0 application for each environment (dev, staging, prod).
-
Enable and monitor logs in both LoginRadius and Auth0 for troubleshooting.