Auth0
Integrate TigerIdentity with Auth0 for developer-friendly identity sync, log streaming, and context-aware access control for B2C and B2B applications.
Key Features
Management API
Full integration with Auth0 Management API for comprehensive user and tenant data.
Real-Time Sync
Sync users, roles, and organizations from Auth0 with real-time webhook support.
Security Context
Import authentication context, anomaly detection, and brute force protection signals.
Log Streams
Subscribe to Auth0 log streams for instant visibility into authentication events.
B2B Organizations
Map Auth0 Organizations to your identity graph for multi-tenant access control.
Custom Claims
Sync custom user metadata and app metadata as identity attributes.
How It Works
Create Machine-to-Machine App
Set up an M2M application in Auth0 with Management API permissions.
Initial Sync
TigerIdentity syncs users, roles, organizations, and connection data from Auth0.
Configure Log Streams
Enable Auth0 log streams to send authentication and lifecycle events to TigerIdentity.
Apply Policies
Use Auth0 identity data and authentication context in your access policies.
Configuration Example
connector:
type: auth0
name: "auth0-production"
config:
domain: "your-tenant.auth0.com"
client_id: "${AUTH0_CLIENT_ID}"
client_secret: "${AUTH0_CLIENT_SECRET}"
sync:
users: true
roles: true
organizations: true
connections: true
events:
- successful_login
- failed_login
- user_created
- user_deleted
- role_assigned
- organization_member_added
mapping:
user_attributes:
- auth0: email
tiger: email
- auth0: user_metadata.department
tiger: department
- auth0: app_metadata.employee_id
tiger: employee_idUse Cases
Customer Identity
Use Auth0 as the identity source for customer-facing applications with B2C or B2B flows.
Multi-Tenant SaaS
Leverage Auth0 Organizations for tenant isolation and cross-tenant access policies.
Anomaly Detection
Incorporate Auth0 anomaly detection signals into real-time access decisions.
Social Login Context
Track social identity provider connections and use as context in access policies.
Ready to connect Auth0?
See how TigerIdentity integrates with your Auth0 tenant in a personalized demo.
Schedule Your Demo