Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Tip

This feature is supported for Aspenware Cloud customers who have contracted with Auth0.

Key Terms

Excerpt

Key Term 1

{1-2 sentence definition. Confirm that key term is not defined in another section first. }

Key Term 2

{1-2 sentence definition. Confirm that key term is not defined in another section first. }

...

Actions

Secure, tenant-specific, versioned functions written in Node.js that execute at certain points during the Auth0 runtime. Actions are used to customize and extend Auth0's capabilities with custom logic.

Applications

Software that relies on Auth0 for authentication and identity management. Auth0 supports single-page, regular web, native, and machine-to-machine applications.

Biometrics

Authentication process that allows the user to leverage FaceID or Fingerprint scanning.

Connection

Relationship between Auth0 and the sources of users for your applications. Examples include identity providers (such as Google or Active Directory), passwordless authentication methods, or user databases.

Custom Domain

Third-party domain with a specialized, or vanity, name. Also known as a CNAME.

Organizations

Auth0 product that allows B2B customers to categorize end-users and define specific roles, login experience, and access to resources.

Tenants

A logically-isolated group of users who share common access with specific privileges to a single software instance.

...

What is Auth0?

Auth0 is an identity access management (IAM) provider. An IAM solution is a gatekeeper to the resources you provide to customers as web applications, APIs, etc, adding layers of authentication to secure your users’ digital identities and your product. The Auth0 identity platform supports regular web, mobile, or machine-to-machine apps.

...