DEV Community

Shahriyar Al Mustakim Mitul
Shahriyar Al Mustakim Mitul

Posted on

2

Authenticate using Auth0

In authentication, a user or application proves they are who they say they are by providing valid credentials. The most common verification is password, often combined with other methods, such as a fingerprint.

Auth0 simplifies the use of open industry standards like OAuth 2.0, OIDC, and SAML to authenticate. Users can log into your applications with social media credentials, corporate accounts, and a broad range of other credentials.

Image description

So , we have 2 ways.

1) Add Login

2)Provision Users

Add Login
Here we have 3 options.

  • Login

  • Single Sign on

  • Passwordless

Provision Users
Here we have:

  • Identity Providers

  • Database connections

  • Enterprise connections

  • Protocols

  • Connection setting best practices

For detailed information, kindly follow this official documentation

Sentry image

See why 4M developers consider Sentry, “not bad.”

Fixing code doesn’t have to be the worst part of your day. Learn how Sentry can help.

Learn more

Top comments (0)

A Workflow Copilot. Tailored to You.

Pieces.app image

Our desktop app, with its intelligent copilot, streamlines coding by generating snippets, extracting code from screenshots, and accelerating problem-solving.

Read the docs