Identity Provider Integration

Auth0

Integrate TigerIdentity with Auth0 for developer-friendly identity sync, log streaming, and context-aware access control for B2C and B2B applications.

Key Features

Management API

Full integration with Auth0 Management API for comprehensive user and tenant data.

Real-Time Sync

Sync users, roles, and organizations from Auth0 with real-time webhook support.

Security Context

Import authentication context, anomaly detection, and brute force protection signals.

Log Streams

Subscribe to Auth0 log streams for instant visibility into authentication events.

B2B Organizations

Map Auth0 Organizations to your identity graph for multi-tenant access control.

Custom Claims

Sync custom user metadata and app metadata as identity attributes.

How It Works

1

Create Machine-to-Machine App

Set up an M2M application in Auth0 with Management API permissions.

2

Initial Sync

TigerIdentity syncs users, roles, organizations, and connection data from Auth0.

3

Configure Log Streams

Enable Auth0 log streams to send authentication and lifecycle events to TigerIdentity.

4

Apply Policies

Use Auth0 identity data and authentication context in your access policies.

Configuration Example

connector:
  type: auth0
  name: "auth0-production"

  config:
    domain: "your-tenant.auth0.com"
    client_id: "${AUTH0_CLIENT_ID}"
    client_secret: "${AUTH0_CLIENT_SECRET}"

  sync:
    users: true
    roles: true
    organizations: true
    connections: true

  events:
    - successful_login
    - failed_login
    - user_created
    - user_deleted
    - role_assigned
    - organization_member_added

  mapping:
    user_attributes:
      - auth0: email
        tiger: email
      - auth0: user_metadata.department
        tiger: department
      - auth0: app_metadata.employee_id
        tiger: employee_id

Use Cases

Customer Identity

Use Auth0 as the identity source for customer-facing applications with B2C or B2B flows.

Multi-Tenant SaaS

Leverage Auth0 Organizations for tenant isolation and cross-tenant access policies.

Anomaly Detection

Incorporate Auth0 anomaly detection signals into real-time access decisions.

Social Login Context

Track social identity provider connections and use as context in access policies.

Ready to connect Auth0?

See how TigerIdentity integrates with your Auth0 tenant in a personalized demo.

Schedule Your Demo