We run a multi-tenant application with multiple enterprise connections, some of which use IdP-initiated logins. We recently made a change to our applications to be fully oidc-compliant and enabled the oidc-compliant flag on our auth0 tenants.
When we released, we received complaints from some of our customers that their users could not login anymore and it appears to be related to the id_token (and userinfo) missing the email claim. The documentation (here) states that IdP-initiated logins do not support OIDC, but the “Response Protocol” in the configuration indicates that you can use OpenID Connect. Is there something we’re missing? Is there a configuration we need to update?