We want to establish a federation from Auth0 to Criipto using an Enterprise OIDC connection. The IdP requires signed requests for the authorization endpoint call as defined in the OIDC spec. Is there a way to configure the Enterprise OIDC connection via the Auth0 dashboard (or Management API) that it sends the parameters in a signed JWT token instead of request parameters as required by the OIDC spec? If not, any other ideas how to establish this federation?
Hi @elster,
Thanks for your question.
You could use a post-login action script to append the query parameters as a custom claim in the JWT token. You could call the event.request.query
property to get the query parameters that were passed in the login request.
I recommend checking out our Adding custom claims to tokens knowledge solution on how to accomplish this.
Let me know if you have any other questions.
Best,
Rueben
https://marketplace.auth0.com/integrations/criipto-verify-e-id