- Set the
compliance_level
property to the desired profile, eitherfapi1_adv_pkj_par
orfapi1_adv_mtls_par
- Either Configure mTLS (including mTLS aliases) or Configure Private Key JWT
- Configure mTLS Token Binding
- Ensure Auth0 prompts users for consent
- Configure supported ACR claims for the tenant
- Remove the alg property from JWKS endpoint
- Add Action to require scope and redirect_uri
Ensure Auth0 prompts users for consent
You will need to ensure that Auth0 prompts users for consent. You may skip this step if the client is configured as a first-party app, and the or API supports skipping consent for first-party apps. To ensure Auth0 requests users for consent, set theis_first_party
property on the client to false
:
Configure supported ACR claims for the tenant
The FAPI tests pass a required ACR value ofurn:mace:incommon:iap:silver
. To include the required ACR value in the , add urn:mace:incommon:iap:silver
to the list of supported ACR values for the tenant:
Remove the alg property from JWKS endpoint
To allow for keys to be used with multiple algorithms, not just RS256, remove the tenant’salg
property from the output of the /.well-known/jwks.json
endpoint:
Add Action to require scope and redirect_uri
By default, Auth0 allows requests without a scope, assuming theopenid
scope if no scope is present. Auth0 also allows requests without a redirect_uri,
which you can set in Actions. However, the FAPI conformance tests require Auth0 to be more restrictive.
Add the following Action to enforce the necessary restrictions on scope and redirect_uri
: