- Social login
- Passkeys
- SMS-based passwordless authentication
- Email-based passwordless authentication
- Biometrics (WebAuthn)
Passwordless connections vs. passwordless authentication
A passwordless connection is a distinct connection type from database, social, or enterprise connections. Passwordless connections are used specifically for: Even though a user from an Auth0 user database or social provider might share the same email address, the identity associated with their passwordless connection is distinct. Account linking can be used to associate passwordless connection identities with other connection identities.You cannot create passwordless users from the Auth0 Dashboard. Create them directly from the Management API if signup is disabled. In the Connection field, use email for passwordless users using an email address and SMS for passwordless users using a mobile phone number.
Social Login
Social login is a method of authentication that allows users to log in to an application using existing credentials from a social , such as Google or Facebook. As users frequently have their social credentials stored in their browser or device, social login provides a frictionless user experience that requires minimal manual interaction with your application. The general workflow for social login is as follows:- A user arrives at your application’s login screen and selects the Continue with [provider] option.
- The user follows prompts from the selected provider to authenticate with their existing social credentials.
- The user is redirected to your application to complete the login process.
Passkeys
Passkeys are a phishing-resistant alternative to traditional authentication factors modeled from FIDO® W3C Web Authentication (WebAuthn) and Client to Authenticator Protocol (CTAP) specifications. Auth0 supports passkeys as an authentication method for database connections and offers two methods of implementation:- Universal Login passkeys for web-based applications
- Native passkeys for Android and iOS applications
- A user arrives at your application’s Universal Login page and enters their email address.
- The user then has the choice to create a passkey or continue with traditional authentication.
- When the user selects Create a new passkey, the browser’s passkey flow initiates and prompts the user to authenticate with their device credentials, such as biometrics.
- After local authentication is complete, the passkey is saved to the user’s device and synced with their passkey provider (such as iCloud or Google).
SMS-Based Passwordless Authentication
SMS-based passwordless authentication allows users to access applications using single-use codes known as one-time passwords (OTP). With this implementation, OTPs are sent to users’ phone numbers via SMS. The general workflow for SMS-based OTPs is as follows:- A user arrives at your application’s login screen and enters their phone number.
- Auth0 sends the user an OTP through SMS.
- The user copies the code and returns to your login screen.
- The user enters the code in the space provided and logs in to your application.
- Passwordless Authentication with Universal Login
- Passwordless Authentication with Classic Login
- Passwordless Authentication with Embedded Login
This category of passwordless authentication is currently treated as a unique connection type in your tenant, separate from other database, social, or enterprise connections.When a user authenticates with this method, their profile is created on the passwordless connection using Auth0 as the Identity Provider (IdP). As you cannot ensure users will log in with the same email or phone number every time, users may end up with multiple user profiles in the Auth0 datastore. If duplicates are created, you can associate multiple user profiles by linking their accounts.In some scenarios, a user profile created through this type of passwordless connection may share an identifier (such as email or phone number) with a profile associated with another type of connection, such as enterprise or social. If this occurs, you can use account linking to associate passwordless profiles with identities from other connections.
Email-Based Passwordless Authentication
Email-based passwordless authentication encompasses two methods:This category of passwordless authentication is currently treated as a unique connection type in your tenant, separate from other database, social, or enterprise connections.When a user authenticates with this method, their profile is created on the passwordless connection using Auth0 as the Identity Provider (IdP). As you cannot ensure users will log in with the same email or phone number every time, users may end up with multiple user profiles in the Auth0 datastore. If duplicates are created, you can associate multiple user profiles by linking their accounts.In some scenarios, a user profile created through this type of passwordless connection may share an identifier (such as email or phone number) with a profile associated with another type of connection, such as enterprise or social. If this occurs, you can use account linking to associate passwordless profiles with identities from other connections.
One-time passwords
This method of passwordless authentication allows users to access applications using single-use codes known as one-time passwords (OTP). With this implementation, OTPs are sent to users through their email. The general workflow for email-based OTPs is as follows:- A user arrives at your application’s login screen and enters either their email.
- Auth0 sends an OTP to the user’s email.
- The user copies the code and returns to your login screen.
- The user enters the code in the space provided and logs in to your application.
- Passwordless Authentication with Universal Login
- Passwordless Authentication with Classic Login
- Passwordless Authentication with Embedded Login
Magic Links
Magic links are a method of passwordless authentication that allow users to access an application through a link sent to their email. If the user does not access the link within a specific timeframe, the link becomes inaccessible. The general workflow for magic links is as follows:- A user arrives at your application’s login screen and enters their email.
- Auth0 sends a magic link to the user at the provided email.
- The user selects the magic link in their email and automatically logs in to your application.
Biometrics (WebAuthn)
Biometrics is a method of passwordless authentication that uses an individual’s physical attributes to verify their identity and grant them access to an application. Auth0 currently supports biometric authentication using fingerprint scans and facial recognition.While Auth0 still supports the legacy Identifier First with Biometrics authentication method, it is strongly recommended that you use passkey-based authentication instead.
- Enabling Universal Login.
- Setting up a database connection.
- Configuring Identifier First + Biometrics authentication.
- A user arrives at your application’s Universal Login page and enters their email address.
- The user first authenticates with their traditional credentials. Then, they are prompted to enroll their device in biometrics.
- If the user chooses to enroll, they follow their device’s prompts to complete the biometric setup process.