We are excited to introduce Developer Preview, a new product release stage designed to get upcoming capabilities into your hands faster!
Developer Preview serves as a new release phase for new Auth0 product introductions. We utilize this stage when a new product capability will eventually be a paid feature, but we want to grant you access before the official pricing is applied.
Key Highlights:
To participate in an active Developer Preview, you will simply need to sign up and accept the specific opt-in requirements for that feature.
To learn more about how Developer Preview fits into our overall release process, visit our updated Product Release Stages documentation.
We are excited to introduce Developer Preview, a new product release stage designed to get upcoming capabilities into your hands faster!
Developer Preview serves as a new release phase for new Auth0 product introductions. We utilize this stage when a new product capability will eventually be a paid feature, but we want to grant you access before the official pricing is applied.
Key Highlights:
To participate in an active Developer Preview, you will simply need to sign up and accept the specific opt-in requirements for that feature.
To learn more about how Developer Preview fits into our overall release process, visit our updated Product Release Stages documentation.
Auth0 developers using Express Configuration with Okta now have a streamlined process for submitting applications to the Okta Integration Network. The OIN Wizard has been updated with a new section that automatically populates required configuration fields for OpenID Connect (OIDC), System for Cross-domain Identity Management (SCIM), and Global Token Revocation (GTR) integrations based on Auth0 Dashboard information.
You can now manage custom authentication screen partials directly in the Auth0 dashboard with a purpose-built visual editor. Instead of encoding HTML as strings and sending them through the API, you get a proper code editor with syntax highlighting and live feedback.
The editor includes supporting tools:
This update also expands what's possible with partials:
Head over to the Auth0 Docs to learn more.
You can now manage custom authentication screen partials directly in the Auth0 dashboard with a purpose-built visual editor. Instead of encoding HTML as strings and sending them through the API, you get a proper code editor with syntax highlighting and live feedback.
The editor includes supporting tools:
This update also expands what's possible with partials:
Head over to the Auth0 Docs to learn more.
You can now manage custom authentication screen partials directly in the Auth0 dashboard with a purpose-built visual editor. Instead of encoding HTML as strings and sending them through the API, you get a proper code editor with syntax highlighting and live feedback.
The editor includes supporting tools:
This update also expands what's possible with partials:
Head over to the Auth0 Docs to learn more.
You can now manage custom authentication screen partials directly in the Auth0 dashboard with a purpose-built visual editor. Instead of encoding HTML as strings and sending them through the API, you get a proper code editor with syntax highlighting and live feedback.
The editor includes supporting tools:
This update also expands what's possible with partials:
Head over to the Auth0 Docs to learn more.
You can now manage custom authentication screen partials directly in the Auth0 dashboard with a purpose-built visual editor. Instead of encoding HTML as strings and sending them through the API, you get a proper code editor with syntax highlighting and live feedback.
The editor includes supporting tools:
This update also expands what's possible with partials:
Head over to the Auth0 Docs to learn more.
A new product release stage designed to get upcoming capabilities into your hands faster. Developer Preview serves as a new release phase for new Auth0 product introductions, granting free production access before official pricing is applied. Key features include free production access, clear expectations about future paid components, and the ability to shape the product through early feedback.
We've updated session handling in SAML-P and WS-Fed authentication flows to align with industry best practices and our existing OAuth2/OIDC behavior. Following a successful login via SAML-P or WS-Fed, the session ID will now be rotated and a new session cookie will be issued.
If your implementation includes client-side logic, downstream services, or integrations that read or store session IDs across SAML-P or WS-Fed login flows, you will now receive a new session ID after authentication completes. Please review and update any such implementations accordingly.
This change brings SAML-P and WS-Fed session handling in line with the existing behavior of OAuth2 and OIDC flows, ensuring consistent and secure session management across all authentication protocols.
We've updated session handling in SAML-P and WS-Fed authentication flows to align with industry best practices and our existing OAuth2/OIDC behavior. Following a successful login via SAML-P or WS-Fed, the session ID will now be rotated and a new session cookie will be issued.
If your implementation includes client-side logic, downstream services, or integrations that read or store session IDs across SAML-P or WS-Fed login flows, you will now receive a new session ID after authentication completes. Please review and update any such implementations accordingly.
This change brings SAML-P and WS-Fed session handling in line with the existing behavior of OAuth2 and OIDC flows, ensuring consistent and secure session management across all authentication protocols.
We've updated session handling in SAML-P and WS-Fed authentication flows to align with industry best practices and our existing OAuth2/OIDC behavior. Following a successful login via SAML-P or WS-Fed, the session ID will now be rotated and a new session cookie will be issued.
If your implementation includes client-side logic, downstream services, or integrations that read or store session IDs across SAML-P or WS-Fed login flows, you will now receive a new session ID after authentication completes. Please review and update any such implementations accordingly.
This change brings SAML-P and WS-Fed session handling in line with the existing behavior of OAuth2 and OIDC flows, ensuring consistent and secure session management across all authentication protocols.
We've updated session handling in SAML-P and WS-Fed authentication flows to align with industry best practices and our existing OAuth2/OIDC behavior. Following a successful login via SAML-P or WS-Fed, the session ID will now be rotated and a new session cookie will be issued.
If your implementation includes client-side logic, downstream services, or integrations that read or store session IDs across SAML-P or WS-Fed login flows, you will now receive a new session ID after authentication completes. Please review and update any such implementations accordingly.
This change brings SAML-P and WS-Fed session handling in line with the existing behavior of OAuth2 and OIDC flows, ensuring consistent and secure session management across all authentication protocols.
We've updated session handling in SAML-P and WS-Fed authentication flows to align with industry best practices and our existing OAuth2/OIDC behavior. Following a successful login via SAML-P or WS-Fed, the session ID will now be rotated and a new session cookie will be issued.
If your implementation includes client-side logic, downstream services, or integrations that read or store session IDs across SAML-P or WS-Fed login flows, you will now receive a new session ID after authentication completes. Please review and update any such implementations accordingly.
This change brings SAML-P and WS-Fed session handling in line with the existing behavior of OAuth2 and OIDC flows, ensuring consistent and secure session management across all authentication protocols.
Manage custom authentication screen partials directly in the Auth0 dashboard with a purpose-built visual editor. Features include syntax highlighting, a code snippet library for common use cases, template variable reference, Actions shortcut, and interactive preview. The update also expands partials to support passkey screens and custom database connections with data capture.
We are excited to announce the release of auth0-springboot-api, a new official SDK designed to streamline authentication and security for Spring Boot backend applications.
Key Benefits:
Getting Started:
We are excited to announce the release of auth0-springboot-api, a new official SDK designed to streamline authentication and security for Spring Boot backend applications.
Key Benefits:
Getting Started:
We are excited to announce the release of auth0-springboot-api, a new official SDK designed to streamline authentication and security for Spring Boot backend applications.
Key Benefits:
Getting Started:
We are excited to announce the release of auth0-springboot-api, a new official SDK designed to streamline authentication and security for Spring Boot backend applications.
Key Benefits:
Getting Started:
We are excited to announce the release of auth0-springboot-api, a new official SDK designed to streamline authentication and security for Spring Boot backend applications.
Key Benefits:
Getting Started: