Access Token Vault Flow
Token Vault organizes federated access and refresh tokens issued by external providers into tokensets, with one tokenset per authorized connection. Applications can access the Token Vault when they exchange a valid Auth0 refresh token for a federated access token stored in the tokenset. This enables applications to request federated access tokens without the user having to re-authorize the connection. Using the federated access token, the application can call third-party APIs on the user’s behalf.
Let’s walk through a real-world example: A user wants to schedule a meeting in their Google Calendar using a productivity app.
Get access to third-party API
To schedule the meeting, the productivity app needs the user’s permission to access the Google Calendar API.
When the user logs into a new Google social connection:
Similar to a regular social login flow, the Auth0 SDK makes a
GET
request to the/authorize
endpoint with the following additional parameters:
Parameter | Description |
---|---|
connection |
The name of a social identity provider. In this case, google-oauth2 . |
connection_scope |
Requests additional scopes to be authorized for the connection. In this case, it includes the Google Calendar API scopes. Note: At runtime, the list of connection scopes is merged with the scopes you statically configured for the connection. Whenever the user is redirected to authorize this connection, Auth0 will always request the scopes you selected. To learn more, read Configure Token Vault. |
scope |
Requests Auth0 scopes to be authorized for the application. Include offline_access to get an Auth0 refresh token from the Auth0 Authorization Server. |
2. The Auth0 Authorization Server redirects the user to the consent prompt for the Google connection. The user authenticates using one of the configured login options and authorizes the Google connection, giving the application permission to access the Google Calendar API.
3. The Auth0 Authorization Server redirects the user back to the application with the single-use authorization code.
4. The Auth0 SDK makes a POST request to the /oauth/token
endpoint with the authorization code, application's client ID, and application's credentials, such as client secret or Private Key JWT.
5. The Auth0 Authorization Server verifies the request and responds with an Auth0 access token, refresh token, and ID token. The application can use the ID token containing the user’s profile information to link user accounts. To learn more, read User account linking.
6. The Auth0 Authorization Server stores the Google access and refresh tokens in a secure tokenset within the user's Token Vault.
Call third-party API
To schedule the meeting, the application needs to call the Google Calendar API. The application can use a valid Auth0 refresh token to request a Google access token with the scopes granted in the login flow without the user having to re-authorize the connection. To learn more, read Manage federated refresh tokens.
To call the Google Calendar API:
The application calls Auth0 SDKs to make a request to the
/oauth/token
endpoint with the following parameters:
POST https://YOUR_AUTH0_TENANT.auth0.com/oauth/token
Request:
{
"grant_type": "urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token",
"client_id": "AUTH0_CLIENT_ID",
"client_secret": "AUTH0_CLIENT_SECRET",
"subject_token_type": "urn:ietf:params:oauth:token-type:refresh_token",
"subject_token": "AUTH0_REFRESH_TOKEN",
"requested_token_type": "http://auth0.com/oauth/token-type/federated-connection-access-token"
"connection": "google-oauth2",
"login_hint": "idp_user_id"
}
Was this helpful?
Parameter | Description |
---|---|
grant_type |
The grant type. For Token Vault, set to urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token |
client_id |
Client application ID |
client_secret |
Client secret. Note: You can use any client authentication method to get a federated access token. |
subject_token_type |
Type of subject token. For Token Vault, set to refresh token: urn:ietf:params:oauth:token-type:refresh_token |
subject_token |
The Auth0 refresh token that the Auth0 Authorization Server validates to identify the user. |
requested_token_type |
The requested token type. For Token Vault, set to federated access token or http://auth0.com/oauth/token-type/federated-connection-access-token |
connection |
The connection name, in this case, google-oauth2 . |
login_hint |
(Optional) The user ID for the identity provider. A user can have several connections to an identity provider, so this parameter is optional. If not provided, the first identity matching the connection is used. |
Auth0 checks if the user profile’s
identities
array contains a user account with the connection name passed in the authorization request.If the authorization request contains
login_hint
, Auth0 looks for an identity matching both the connection name and thelogin_hint
.If Auth0 can’t find the user, it returns a
401
status code with an error message.
Once the Auth0 Authorization Server validates the user, it locates the federated access token within the Token Vault. If it is still valid, Auth0 returns the federated access token with its scopes and expiry time:
{
"access_token": "GOOGLE_ACCESS_TOKEN",
"scope": "https://www.googleapis.com/auth/calendar https://www.googleapis.com/auth/calendar.events"
"expires_in": 3600,
"issued_token_type": "urn:ietf:params:oauth:token-type:access_token",
"token_type": "Bearer"
}
Was this helpful?
If the federated access token has expired, Auth0 uses the federated refresh token stored in the Token Vault to get a new federated access token with the same scopes. Auth0 then stores it in the corresponding tokenset and returns it to the application. To learn more about how Auth0 manages federated refresh tokens, read Manage federated refresh tokens.
Using the federated access token, the application calls the Google Calendar API on the user’s behalf.
Manage federated refresh tokens
Auth0 securely stores the federated refresh and access tokens of external providers in a tokenset within the Token Vault, with one tokenset per authorized connection. Auth0 manages federated refresh tokens on the server, so your application only has to handle storing and exchanging Auth0 refresh tokens for federated access tokens.
To learn more about how Auth0 manages Auth0 refresh tokens for different types of applications, read Refresh tokens.
Federated refresh token expiration policy
Auth0 deletes federated refresh tokens from tokensets when they expire based on the expiration date set by the external provider or if they have not been exchanged for a federated access token for 1+ years.