Auth0 Overview

Auth0 is a service that abstracts how users authenticate to applications.

You can connect any application (written in any language or on any stack) to Auth0 and define its connection, the method used to authenticate the users of that application:

Video: Developer Overview

This video will give you a walkthrough of Auth0 and how it will help save you time adding identity to your application.

Integrating Auth0 Into Your Application

The default protocol between your application(s) and Auth0 is OpenID Connect, a modern, lightweight, simple to use, and simple to integrate protocol.

Heads up! As part of our efforts to improve security and standards-based interoperability, we have implemented several new features in our authentication flows and made changes to existing ones. For an overview of these changes, and details on how you adopt them, refer to Introducing OIDC Conformant Authentication.

Auth0 ships SDKs for all major platforms (.NET, Java, PHP, Python, node, iOS, and many more), but the use of Auth0 SDKs is not required. Virtually anything able to send HTTP requests can integrate with Auth0.

Auth0 also supports other common identity protocols, such as WS-Federation and SAML. Applications that are already "claims enabled" can easily connect to Auth0.

An Extensible Platform

You can extend the functionality of Auth0 with JavaScript or C# through the use of rules. Rules are custom functions that are executed just after successful authentication and before control returns to the app. They can be used for Access Control, Webhooks, Profile Enrichment, Multi-factor Authentication, and many other things.

Flexible Deployment Models

Auth0 is a service usually running in the public cloud, but it can also be deployed in Private Instances (PI). PIs are dedicated installations of Auth0. You may choose to run PIs in Auth0's datacenters (which are separate from those that run the multi-tenant services), in your own cloud hosting environments (e.g. AWS, Azure, Rackspace, DigitalOcean), or even on-premises.

Custom Domain Names

The public, multi-tenant cloud service version of Auth0 supports a domain name based off of Auth0 assigns Clients deployed using this service a domain name in one of the two formats:

  • {account-name}
  • {account-name}.{location}

For example, if your company is My Company, you would receive some or all of the following addresses:

With the Auth0 public cloud service, the * endpoints are only used for authentication and the API, not user access to your Client.

You may choose to use a custom domain name that obscures the Auth0 reference, such as Using a custom domain name requires a single-tenant implementation of Auth0, which can be deployed in one of three locations:

  • The Auth0-managed cloud.
  • A customer-managed cloud.
  • An on-premise installation.

Due to the additional features offered by these three options, these deployment options do come with a higher cost.

If you are unable to use a multi-tenant cloud service due to compliance or other policy requirements, please take a look at the Auth0 appliance.