Tenant Settings

Use the Tenant Settings page in the Auth0 Dashboard at Dashboard > Settings to configure various settings related to your Auth0 tenant.

When you configure your tenant, set the following items:

  • Specify the Environment Tag. Tenants tagged as Production are granted higher rate limits than tenants tagged as Development or Staging. On non-Enterprise plans, only one tenant per subscription can be tagged as Production. To learn more, read Set Up Multiple Environments.

  • Set the Support Email and Support URL. If a user encounters an issue while logging in, they'll want to reach out for help. Set these values to direct them to an email address or landing page to get assistance.

  • Configure a custom error page. If possible, you should host your own custom error page and configure Auth0 to use it instead of the default page. This allows you to provide more complete and customized explanations to users about what to do in the event of an error.

  • Set up a custom domain. If you are on a paid plan, you can configure a custom domain for your Auth0 tenant. A custom domain unifies the login experience with your brand and provides additional benefits. To learn more, read Custom Domains.

  • Set the Single Sign-On (SSO) session timeout. The SSO session timeout value specifies the time until a user's session expires. The value is 7 days by default, which is the length of time users can access your Auth0-integrated applications without re-entering their credentials. To learn more, read Sessions.

  • Set up tenant members. Configure additional Auth0 Dashboard users and enable multi-factor authentication (MFA). To learn more, read Manage Dashboard Access and Manage Dashboard Access with Multi-Factor Authentication.

  • Disable the Enable Application Connections setting. If this setting is enabled, all configured connections will be automatically enabled for any new application you create. As a result, users may be able to log in to the application through connections that you did not intend to be available. Disable this setting so you can explicitly enable the connections appropriate for each application.

  • Enable Attack Protection. Protect your users against brute force attacks and breached passwords. To learn more, read Attack Protection.

General

On the General tab, you can customize basic tenant settings.

Settings

Dashboard Tenant Settings General Settings tab
  • Friendly Name: Name you want to be displayed to your users on the Universal Login page. Typically this is the name of your company or organization.

  • Logo URL: URL of the logo you want to be displayed on the Universal Login page. Minimum recommended resolution is 200 pixels (width) by 200 pixels (height).

  • Support Email: Email address used to contact your support team.

  • Support URL: Link to your company or organization support page.

Environment Tag

You can identify your tenant as a production, staging, or development tenant to differentiate it from other tenants. Higher rate limits apply to tenants tagged as Production with a paid subscription. To learn more, read Set Up Multiple Environments.

undefined

API Authorization Settings

Dashboard Tenant Settings General Tab API Authorization Settings
  • Default Audience: API identifier to use for Authorization Flows. If you enter a value, all access tokens issued by Auth0 will specify this API identifier as an audience. Setting the Default Audience is equivalent to appending this audience to every authorization request made to your tenant for every application. This will cause new behavior that might result in breaking changes for some of your applications. Please contact support if you require assistance.

  • Default Directory: Name of the default connection to be used for both the Resource Owner Password Flow and Universal Login Experience. Its value should be the exact name of an existing connection for one of the following strategies: auth0-adldap, ad, auth0, email, sms, waad, or adfs.

Error Pages

In the event of an authorization error, you can either display a generic error page to your users or you can redirect users to your own custom error page. To learn more, read Custom Error Pages.

Dashboard Tenant Settings General Error Pages

Languages

Dashboard Tenant Settings General Tab Languages
  • Default Language: Language your tenant will use by default.

  • Supported Languages: Languages also supported by your tenant.

Subscription

On the Subscription tab, you can review your current subscription and compare features of your current plan to other Auth0 subscription plans. You can also change your subscription plan. To learn more, read Manage Subscription.

If you have an Enterprise subscription, please refer to your Auth0 agreement for details.

Auth0 Tenant Settings Subscription tab

Payment

On the Payment tab, you can enter or update your billing details.

Tenant Members

On the Tenant Members tab, you can view a list tenant members assigned to your tenant. You may also add or remove tenant members and review their assigned roles and if they have multi-factor authentication (MFA) enabled. To learn more, read Manage Dashboard Access.

Dashboard Tenant Settings Tenant Members tab

Custom Domains

On the Custom Domains tab, you can configure a custom domain to maintain a consistent user experience. When you create a custom domain, users will remain in your domain for login rather than being redirected to your auth0.com domain. To learn more, read Custom Domains.

Availability varies by Auth0 plan

Both your specific login implementation and your Auth0 plan or custom agreement affect whether this feature is available. To learn more, read Pricing.

Dashboard Tenant Settings Custom Domains tab

Signing Keys

On the Signing Keys tab, you can securely manage the signing key and certificate used to sign ID tokens, access tokens, SAML assertions, and WS-Fed assertions that are sent to your applications.

Dashboard Tenant Settings Signing Keys tab
  • Rotation Settings: Settings that allow you to rotate the application signing key and certificate. You can choose whether or not to revoke the signing key upon rotation. To learn more, read Signing Keys.

    • Rotate Signing Key: Rotates the signing key without revoking it; effectively, moves the current key to the previous key. All tokens signed with the previous key will still be valid until it is revoked.

    • Rotate & Revoke Signing Key: Rotates the signing key and then revokes it; effectively, moves the current key to the previous key, and then invalidates the previous key. Make sure you have updated your application with the next key in the queue before you rotate and revoke the current key.

  • List of Valid Keys: List of valid application signing keys for your tenant, which are also available at the Metadata endpoint for your application. Valid keys include:

    • Next in queue: Key that will be used when the signing key is next rotated.

    • Currently used: Key that is currently in use.

    • Previously used: Key that was previously used. Its appearance indicates that the signing key has been rotated, but the previously-used key has not yet been revoked.

  • List of Revoked Keys: List of the last three revoked keys for your tenant. More data about revoked keys is available in tenant logs.

Advanced

On the Advanced tab, you can configure advanced tenant settings.

Login and Logout

Dashboard Tenant Settings Advanced Tab Login and Logout
  • Allowed Logout URLs: URLs that Auth0 can redirect to after logout when no client_id is specified on the Logout endpoint invocation. Useful as a global list when Single Sign-on (SSO) is enabled. To learn more, see Logout.

  • Tenant Login URI: URI that points to a route in your application that starts the OIDC login flow by redirecting to the /authorize endpoint; it should take the form of https://mytenant.org/login. This will only be used in scenarios where Auth0 needs your tenant to start the OIDC login flow. To learn more, see Configure Default Login Routes.

Login Session Management

The Login Session Management settings configure the login session lifetime that represents the Auth0 Authorization Server session layer. The authorization server session layer drives single sign-on (SSO). To learn more, read Single Sign-on.

Timeouts for tokens issued by Auth0 can be configured elsewhere. Token timeouts are often used to drive the Application session layer and appear in token claims, such as in the expiration claim for OpenID Connect (OIDC) ID tokens or the lifetime assertion for SAML.

Dashboard Tenant Settings Advanced Login Session Management
  • Inactivity timeout: Timeframe (in minutes) after which a user's session will expire if they haven’t interacted with the Authorization Server. It will be superseded by system limits if over 4,320 minutes (3 days) for non-Enterprise plans or 144,000 minutes (100 days) for Enterprise plans.

  • Require log in after: Timeframe (in minutes) after which a user will be required to log in again, regardless of their activity. It will be superseded by system limits if over 43,200 minutes (30 days) for non-Enterprise plans or 525,600 minutes (365 days) for Enterprise plans.

Device Flow User Code Format

If you are using the Device Authorization Flow, these settings configure the randomly generated user code. To learn more, read Configure Device User Code Settings.

Dashboard Tenant Settings Advanced Tab Device Flow User Code Format
  • User Code Character Set: Character set used to generate the user code.

  • User Code Mask: Mask used to format the user code. The mask defines the length of the user code and formats it into a friendly, readable value, allowing spaces or hyphens for readability.

Global client information

The Global Client ID and Global Client Secret are used to generate tokens for legacy Auth0 APIs. Typically, you will not need these values. If you need to have the global client secret changed, please contact support.

Dashboard Tenant Settings Advanced Tab Global Client Information

Settings (Advanced)

Dashboard Tenant Settings Advanced Tab Settings
  • Change Password Flow v2: When enabled, the newest version of the Change Password Flow will be used. The previous version has been deprecated, and we strongly recommend enabling v2. This flag is presented only for backward compatibility, and once enabled, you can no longer disable it. You can customize the user interface for the Change Password widget on the Universal Login > Password Reset tab in the Auth0 Dashboard.

  • OIDC Dynamic Application Registration: When enabled, third-party developers will be able to dynamically register applications for your APIs. You can also update this flag using the /tenant/patch_settings endpoint of the Auth0 Management API. By default, this feature is disabled. To learn more, read Dynamic Client Registration.

  • Enable Application Connections: When enabled, all current connections will be enabled for any new application that is created.

  • Use a generic response in public signup API error message: When enabled, errors generated while using the public signup API will return a generic response. This helps protect against user registration enumeration by preventing bad actors from being able to guess previously-registered email addresses or usernames from reading error response codes, such as user_exists.

  • Enable Publishing of Enterprise Connections Information with IdP domains: When enabled, it supports Home Realm Discovery and Auth0 Lock relies on a checked public file that includes enterprise connection information. If you don’t require that functionality, you can disable it.

  • Enable email verification flow during login for Azure AD and ADFS connections: When enabled, users will be presented with an email verification prompt during their first login when using Azure AD or ADFS connections.

  • Refresh Token Revocation Deletes Grant: When enabled, it deletes the underlying grant when you revoke a refresh token using the Authentication API /oauth/revoke endpoint.

  • Allow Organization Names in Authentication API: When enabled, /authorize and SAML endpoints can accept both organization IDs and names. Additionally, ID and access tokens will include both org_id and org_name claims. Before enabling this setting, review Use Organization Names in Authentication API for important considerations and potential impacts.

  • Allow Pushed Authorization Requests (PAR): When enabled, the /par endpoint can accept authorization requests pushed to it from a client application. This prevents the client application from sending requests via the insecure front channel (i.e. the browser).

Extensibility

Dashboard Tenant Settings Advanced Tab Extensibility

Migrations

In this section, you can choose to enable or disable various migrations that are available.

Feature Previews

In this section, you can choose to enable or disable feature previews that are available.

Delete tenant or subscription

Deleted tenants cannot be restored and the tenant name cannot be used again when creating new tenants. To learn how to reset your tenant configuration, read Delete or Reset Tenants.

Learn more