Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DXCDT-297: Update documentation #555

Merged
merged 5 commits into from
Dec 14, 2022

Conversation

willvedd
Copy link
Contributor

@willvedd willvedd commented Dec 13, 2022

🔧 Changes

Updating documentation to more accurately advise private cloud users on how to authenticate. Removing the previous login instructions because we're still working through some issues on authenticating as a user via device code flow.

📚 References

Related PR: #554

📝 Checklist

  • All new/changed/fixed functionality is covered by tests (or N/A)
  • I have added documentation for all new/changed functionality (or N/A)

@willvedd willvedd requested a review from a team as a code owner December 13, 2022 20:25
Comment on lines +136 to +143
To log in, run:

```bash
auth0 login
```

To log in to an Auth0 private cloud please ensure you have a native application type created
with the Device Code grant type enabled and set the following env variables:

- `AUTH0_AUDIENCE` - The audience of the Auth0 Management API (System API) to use.
- `AUTH0_CLIENT_ID` - Client ID of a native application configured with the **Device Code** grant type.
- `AUTH0_DEVICE_CODE_ENDPOINT` - Device Authorization URL, you can find this under **Advanced Settings -> Endpoints**.
- `AUTH0_OAUTH_TOKEN_ENDPOINT` - OAuth Token URL, you can find this under **Advanced Settings -> Endpoints**.

```bash
AUTH0_AUDIENCE="https://my-org.example.com/api/v2/" \
AUTH0_DEVICE_CODE_ENDPOINT="https://my-org.example.com/oauth/device/code" \
AUTH0_OAUTH_TOKEN_ENDPOINT="https://my-org.example.com/oauth/token" \
AUTH0_CLIENT_ID="xxxxxxxxxxxxxxxx" \
auth0 login
```
> **Warning**
> Authenticating as a user via `auth0 login` is not supported for **private cloud** tenants. Instead, those users should authenticate with client credentials via `auth0 tenants add`.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is the only content change being made in this PR.

@willvedd willvedd merged commit a925f4f into main Dec 14, 2022
@willvedd willvedd deleted the DXCDT-297-private-cloud-readme-updates branch December 14, 2022 15:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants