Enterprise providers
Most businesses already have a corporate identity repository which has information on all the employee users and user profile information. It may also contain information on partners and contractors. A common requirement for the B2E scenario therefore, is to allow such users to log in via Auth0 Enterprise connections such as SAML2 providers, ADFS, Google Workspace, Azure AD or an on-premise corporate directory service. This is attractive to users because it allows them to avoid creating yet another username and password for each application and instead leverage the same login credential across all their enterprise applications. This is especially attractive to security interests within the company because user credentials are only exposed to the identity stack instead of to each application. Furthermore, this architecture allows the business to retain control over access to applications because the enterprise identity provider provides a single shutoff point. If a user leaves the organization, administrators can simply disable the user’s account in the corporate identity provider and the user can no longer log in to any of the applications using that identity provider. Auth0 makes it easy to enable login via a wide variety of enterprise providers with just a few simple configuration steps.Groups and roles
With a lot of users, you may set up groups and roles to manage access and privileges. Often, these are stored and administered in a directory service. Auth0 can get user attributes, like groups and roles, from a directory service or enterprise identity provider during authentication. You can then make the attributes available through tokens returned to the application or with the Auth0 .Profile translation
Sometimes a directory or identity provider returns attributes in one format, but your application uses another format. Using Auth0’s Rules, you can map and translate user profile attributes. You can even translate between OIDC/OAuth, SAML, , and LDAP. For example, you retrieve attributes in SAML assertion format from a SAML Identity Provider. With a rule you can then translate the attributes to custom claims in an for an OIDC/OAuth application. You can also map SAML attributes to the Auth0 user profile from the dashboard. To do this, go to Connections > Enterprise > SAMLP Identity Provider, select your SAML connection, and set your attribute mappings in the Mappings tab.Extensibility with augmented user profiles
You may want to enrich user profiles with attributes or data retrieved from other services. For example, you might receive an address or phone number and wish to translate that into a geographic region. Auth0 Rules enable you to write small snippets of code that execute during the authentication transaction. This lets you execute logic or call other services for user information, then add user metadata to the Auth0 user profile and optionally the resulting tokens sent to your applications.Single Sign-on
If you have several internal applications, you can set up Single Sign-on (SSO) across them so users only have to log in once. Auth0 supports integration with applications that externalize authentication using industry standard identity protocols:- OIDC/OAuth
- SAML2
- WS-Fed
Single Sign-on integrations
You can also integrate purchased applications with Auth0 for Single Sign-on (SSO). Auth0 provides pre-built integrations for applications such as:- Salesforce
- Zendesk
- Slack
- New Relic