Auth0-React v2 includes many significant changes compared to v1:
Removal of polyfills from bundles
Introduction of authorizationParams and logoutParams for properties sent to Auth0
Removal of buildAuthorizeUrl and buildLogoutUrl
Removal of redirectMethod on loginWithRedirect in favour of openUrl
Removal of localOnly from logout in favour of openUrl
Renaming of ignoreCache to cacheMode and introduction of cache-only
Use application/x-www-form-urlencoded by default
Do not fallback to refreshing tokens via iframe by default
Changes to default scopes and removal of advancedOptions.defaultScope
Removal of claimCheck on withAuthenticationRequired
As with any major version bump, v2 of Auth0-React contains a set of breaking changes. Please review the migration guide thoroughly to understand the changes required to migrate your application to v2.
If you're using an existing application, verify that you have configured the following settings in your Single Page Application:
Click on the "Settings" tab of your application's page.
Ensure that "Token Endpoint Authentication Method" under "Application Properties" is set to "None"
Scroll down and click on the "Show Advanced Settings" link.
Under "Advanced Settings", click on the "OAuth" tab.
Ensure that "JsonWebToken Signature Algorithm" is set to RS256 and that "OIDC Conformant" is enabled.
Next, configure the following URLs for your application under the "Application URIs" section of the "Settings" page:
Allowed Callback URLs: http://localhost:3000
Allowed Logout URLs: http://localhost:3000
Allowed Web Origins: http://localhost:3000
These URLs should reflect the origins that your application is running on. Allowed Callback URLs may also include a path, depending on where you're handling the callback.
Take note of the Client ID and Domain values under the "Basic Information" section. You'll need these values in the next step.
Configure the SDK
Configure the SDK by wrapping your application in Auth0Provider:
Use the useAuth0 hook in your components to access authentication state (isLoading, isAuthenticated and user) and authentication methods (loginWithRedirect and logout):
Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
Auth0 is an easy to implement, adaptable authentication and authorization platform. To learn more checkout Why Auth0?
This project is licensed under the MIT license. See the LICENSE file for more info.
Auth0 SDK for React Single Page Applications (SPA)
We found that @auth0/auth0-react demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago.It has 45 open source maintainers collaborating on the project.
Last updated on 19 Jan 2023
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
CISA launched a new project called Vulnrichment to enrich CVEs with details that help prioritize patching and mitigation efforts, as the NVD backlog of unenriched CVEs awaiting analysis surpasses 10,000.
Socket is joining forces with CISA and other industry leaders at the RSA Conference to sign the Secure by Design pledge, committing to uphold the highest security standards in our products.
The Socket research team breaks down a sampling of malicious packages that download and execute files, among other suspicious behaviors, targeting the popular Discord platform.