Signed Requests for Enterprise OIDC connection

We want to establish a federation from Auth0 to Criipto using an Enterprise OIDC connection. The IdP requires signed requests for the authorization endpoint call as defined in the OIDC spec. Is there a way to configure the Enterprise OIDC connection via the Auth0 dashboard (or Management API) that it sends the parameters in a signed JWT token instead of request parameters as required by the OIDC spec? If not, any other ideas how to establish this federation?

Hi @elster,

Thanks for your question.

You could use a post-login action script to append the query parameters as a custom claim in the JWT token. You could call the event.request.query property to get the query parameters that were passed in the login request.

I recommend checking out our Adding custom claims to tokens knowledge solution on how to accomplish this.

Let me know if you have any other questions.

Best,
Rueben

https://marketplace.auth0.com/integrations/criipto-verify-e-id