If you want to extend Auth0, we highly recommend you use Actions, which are a cornerstone of our overall extensibility product. With Actions, you have access to rich type information, inline documentation, and public npm packages, and can connect external integrations that enhance your overall extensibility experience. To learn more about what Actions offer, read Understand How Auth0 Actions Work.
The context object stores contextual information about the current authentication transaction, such as the user's IP address, application, or location.
If you change token content using the context object within a rule, your changes will be available in tokens after all rules have finished running. If your application also requires multifactor authentication or user consent, the user will be prompted before changes in the token are available.
The following properties are available for the context object.
A string containing the name of the tenant.
The client id of the application the user is logging in to.
The name of the application (as defined on the dashboard).
An object for holding other application properties. Its keys and values are strings.
A string containing the connection's unique identifier.
The name of the connection used to authenticate the user (such as: twitter or some-g-suite-domain)
The type of connection. For social connection connectionStrategy === connection. For enterprise connections, the strategy will be waad (Windows Azure AD), ad (Active Directory/LDAP), auth0 (database connections), and so on.
An object representing the options defined on the connection. connectionOptions.tenant_domain is a string containing the domain being used for authentication when using an Enterprise connection. connectionOptions.domain_aliases is an array containing the optional domains registered as aliases in addition to the primary domain (specified in the connectionOptions.tenant_domain property).
An object representing metadata defined on the connection. Its keys and values are strings.
An object that controls the behavior of the SAML and WS-Fed endpoints. Useful for advanced claims mapping and token enrichment (only available for samlp and wsfed protocol).
The authentication protocol. Possible values:
oidc-basic-profile: most used, web-based login
oidc-implicit-profile: used on mobile devices and single-page apps
An object containing specific user stats, like stats.loginsCount. Note that any of the counter variables returned as part of the stats object do not increase during silent authentication (as when prompt=none). There are also scenarios where the counter variables might increase yet a rule or set of rules do not execute, as in the case of a successful cross-origin authentication followed by a failed token request.
This object will contain information about the Single Sign-on (SSO) transaction (if available)
with_auth0: when a user signs in with SSO to an application where the Use Auth0 instead of the IdP to do Single Sign-On setting is enabled (only for legacy tenants).
with_dbconn: an SSO login for a user that logged in through a database connection.
current_clients: client IDs using SSO.
An object representing the options defined on the Access Token. You can use this object to add custom namespaced claims to the Access Token. context.accessToken.scope can be used to change the Access Token's returned scopes. When provided, it is an array containing permissions in string format. Custom claims will be included in the Access Token after all rules have run.
An object representing the options defined on the ID Token. Used to add custom namespaced claims to the ID Token. Custom claims will be included in the ID Token after all rules have run.
An internal identification for the authentication session. Value is kept only if prompt=none is used in the authorization request. Note that the session ID can change after rule execution on other flows, so the value available in context.sessionID might not match the new session ID that the user will receive. This makes this value only meaningful when prompt=none is used.
An object containing useful information of the request. This can also be set to undefined. It has the following properties:
userAgent: the user-agent of the application that is trying to log in.
ip: the originating IP address of the user trying to log in. We expose IPv6 addresses in our public endpoints (e.g., travel0.us.auth0.com). If a request arrives from a machine that supports IPv6, then this will contain an IPv6 address. If you perform manual IP address manipulation, we suggest you use the firstname.lastname@example.org library.
hostname: the hostname that is being used for the authentication flow.
query: an object containing the querystring properties of the login transaction sent by the application.
body: the body of the POST request on login transactions used on oauth2-resource-owner, oauth2-resource-owner-jwt-bearer or wstrust-usernamemixed protocols.
geoip: an object containing geographic IP information. It has the following properties:
country_code: a two-character code for the country associated with the IP address.
country_code3: a three-character code for the country associated with the IP address.
country_name: the country name associated with the IP address.
city_name: the city or town name associated with the IP address.
latitude: the latitude associated with the IP address.
longitude: the longitude associated with the IP address.
time_zone: the timezone associated with the IP address.
continent_code: a two-character code for the continent associated with the IP address.
subdivision_code: the ISO 3166-2 code for the top-level subdivision/region.
subdivision_name: The English name of this subdivision/region.
The unique user id of the primary account for the user. Used to link user accounts from various identity providers.
An object containing information related to the authentication transaction with the following properties:
methods: an array of objects containing the authentication methods a user has completed during their session. For example, a user that has completed a password-based authentication followed by MFA may have the following methods:
An object containing information related to the authorization transaction with the following properties:
roles: an array of strings containing the names of a user's assigned roles. You can see a sample use case using the context.authorization.roles property to add roles to tokens in Sample Use Cases: Rules with Authorization.
Object containing information related to the organization. Includes the following properties:
id: String containing the ID of the organization with which the user is logging in.
name: String containing the name of the organization (as defined in the Auth0 Dashboard).
metadata: Dictionary of string key/value pairs containing other organization properties.