Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Auth0 connector uses OpenID Connect to federate authentication with Auth0. It usestype: auth0 in the connector configuration and supports standard OIDC flows — designed for organizations that use Auth0 as their identity platform, whether for customer-facing (CIAM) or workforce identity scenarios. The connector can also facilitate Auth0 tenant migrations and multi-IdP orchestration.
Use Cases
- Auth0 SSO federation — Extend Auth0 authentication to legacy applications that don’t support OIDC natively
- Auth0 tenant migration — Gradually migrate users between Auth0 tenants without downtime
- Combining Auth0 with enterprise IdPs — Orchestrate authentication across Auth0 and enterprise identity providers like Azure AD or Okta
Configuration
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Configuration Reference
| Key | Type | Required | Description |
|---|---|---|---|
name | string | Yes | Unique connector identifier referenced in app policies |
type | string | Yes | Must be auth0 |
oidcWellKnownURL | string | Yes | OIDC discovery endpoint URL (Auth0 tenant domain) |
oauthClientID | string | Yes | OAuth 2.0 client ID from the Auth0 dashboard |
oauthClientSecret | string | Yes | OAuth 2.0 client secret (use secret reference syntax) |
oauthRedirectURL | string | Yes | Callback URL registered with the Auth0 application |
scopes | string | No | Space-separated OAuth scopes (default: openid profile email) |
oauthExtraParams | map | No | Additional query parameters for the authorization request |
tls | string | No | Named TLS profile for provider communication |
Troubleshooting
- Verify the
oidcWellKnownURLis accessible from the Orchestrator host — ensure the Auth0 domain is correct (e.g.,your-tenant.auth0.comor custom domain) - Ensure the
oauthRedirectURLmatches exactly what is registered in the Auth0 application under Allowed Callback URLs - Check that the client secret reference resolves correctly via your secret provider