Don’t let the term “implicit” mislead you! Although OAuth now discourages the use of the implicit grant for obtaining access tokens in SPAs, the scenario addressed by Implicit Flow with Form Post is completely different and is unaffected by the security issues that led to discouraging use with SPAs. Specifically, Implicit Flow with Form Post applies to traditional web apps as opposed to SPAs. You obtain ID tokens as opposed to access tokens, which have a completely different intended use. The flow uses POST as opposed to placing tokens in URL fragments (as with SPAs) which can expose token bits to browser history attacks, redirect headers, and so on.
How it works
You should use this flow for login-only use cases; if you need to request Access Tokens while logging the user in so you can call an API, use the Authorization Code Flow with PKCE or the Hybrid Flow.

- The user clicks Login in the app.
- Auth0’s SDK redirects the user to the Auth0 Authorization Server (
/authorize
endpoint) passing along aresponse_type
parameter ofid_token
that indicates the type of requested credential. It also passes along aresponse_mode
parameter ofform_post
to ensure security. - Your Auth0 Authorization Server redirects the user to the login and authorization prompt.
- The user authenticates using one of the configured login options and may see a consent page listing the permissions Auth0 will give to the app.
- Your Auth0 Authorization Server redirects the user back to the app with an ID Token.
How to implement it
You can use our Express OpenID Connect SDK to securely implement the Implicit Flow with Form Post.The Auth0 Single-Page App SDK and Single-Page Quickstarts adhere to the new recommendations and use the Authorization Code Flow with PKCE.