GDPR: Data Minimization
According to Article 5 of GDPR, the personal data you collect must be limited to what is necessary for processing and must be kept only as long as needed. Appropriate security must be ensured during data processing, including protection against unauthorised or unlawful processing and against accidental loss, destruction, or damage.
There are several Auth0 features than can help you achieve these goals, like account linking, user profile encryption, and more.
Restrict user profile information
To limit the amount of personal information in the Auth0 user profile, you can:
Minimize (or avoid) saving personal information in the metadata section of the user profile
If you use enterprise directories, configure them to return only the minimum information needed
If you use social providers, configure them to return only the minimum information needed
Blacklist the user attributes that you do not want to persist in the Auth0 databases
Encrypt user profile information
You can encrypt user information before you save it in the user profile. You can use any encryption mechanism you like prior to storing data in the metadata fields. When a user sets sensitive information, call the Update a user endpoint.
Every time a user uses a connection to log in to your application, a user profile is created if it doesn't already exist. Note that this is per connection.
To better understand this, consider the following scenario. Your application offers three different options for signup:
sign up with email/password
login with Google
login with Facebook
If a user signs up with Google, this will create a user profile in Auth0. If the same user, upon return, does not remember what he signed up with, and chooses to login with Facebook, Auth0 will create another user profile for the user. So now you have two profiles for the same user.
You can fix this with account linking. You can link multiple accounts under a single user profile, regardless of the connection's type (for example, user/password, social, or SAML).
There are two ways to implement this:
User-initiated account linking: your app must provide the UI so an authenticated user can link their accounts manually.
Suggested account linking: in this case you still configure a rule that will link accounts with the same verified email address. However, instead of completing the link automatically, your app will first prompt the user to link their identities.
You can export Auth0 logs and either store them yourself or automatically push them to external log services. This functionality can help you with data retention requirements, as well as log analysis requirements.
Export logs with the API
You can use the Management API to export logs and store them yourself. There are the two available endpoints, each providing slightly different information.
Search all logs
The Search log events endpoint retrieves log entries that match the search criteria you provided. If you do not provide any search criteria, you will get a list of all available entries.
You can provide search criteria using the q parameter and retrieve specific fields using the fields parameter.
To access the API, you need a Management APIv2 token.
This sample request retrieves all logs for successful logins (the event acronym for successful login is
s). The list of fields we will retrieve per log entry is: date, description, client_id, and log_id.
Get a single log entry
The Get a log event by ID endpoint retrieves the log entry associated with the provided ID.
This sample request retrieves a single log entry with the ID
Use Extensions to export to an external service
You can install and configure an Auth0 Extension in order to export logs automatically to another provider, like Sumo Logic or Loggly. For a list of available providers and detailed steps to configure each, see Export Auth0 logs to an external service.
Keep sensitive information from logs
You should minimize any sensitive information contained in URLs that might be captured by Auth0 log files. For example, consider using
health-site or similar as your domain name instead of
You also need to ensure that you do the following:
Analyze what you are collecting in sign up and through social media and whether that is necessary for the purpose of your service.
Configure enterprise identity providers to control what data is returned to Auth0.
Specify what data you want to collect from the social provider and negotiate any particular terms around social login with the social provider around use of the data they will get around your users’ login.