Data Security

  • Auth0 IP Addresses for Allow Lists - If your environment is behind a firewall, custom database connections, Actions, Hooks, and Rules may require you to add specific Auth0 IP addresses to the AllowList to ensure proper functionality.

  • Add User Attributes to Deny List - If there are user fields that should not be stored in Auth0 databases due to privacy reasons, you can add user attributes to the Deny List. 

  • User Data Storage - Learn the differences between using the Auth0 data store and an external database to store user data.

  • Token Storage - Learn how and where to store tokens used in token-based authentication.

Learn more