How it works
When a user signs in to your application, we create a token that contains information about the user and sign the token using its private key before we send it back to your application. Auth0 secures the private key, which is unique per tenant. To verify that the token is valid and originated from Auth0, your application validates the token’s signature using the public key. We provide other application security key management capabilities through both our Dashboard and . Auth0 recommends that you rotate keys regularly to ensure you will be ready for action in case of a security breach. Additional application signing certificates are listed below.These links populate using your active tenant to provide you with accurate information. You must be logged in to auth0.com/docs with your tenant credentials to access these links.To sign in, select Log in to the top right. After logging in, you can switch between tenants by selecting your profile icon and choosing Switch tenant.
We use the application signing key to sign assertions that are sent to applications. These assertions may include ID tokens, access tokens, SAML assertions, and WS-Fed assertions. Note that these keys are different from those used to sign interactions with connections, including signing SAML requests to Identity Providers (IdPs) and encrypting responses from IdPs.By default, SAML assertions for IdP connections are signed, which we recommend. To get public keys you can use to configure the IdP, see SAML Identity Provider Configuration: Signed Assertions.
- Currently used: Key that is currently being used to sign all new assertions.
- Previously used: Key that was previously used, but has been rotated out. Assertions that were generated with this key will still work.
- Next in queue: Key that is queued and will replace the current key when the application signing key is next rotated.
Always test signing key rotation on a development tenant before rotating application signing keys in production.