Skip to content

Update for EA Additional Signing Algo for Private Key JWT Okta and OIDC#993

Open
avanscoy wants to merge 1 commit intomainfrom
feat/docs-5084
Open

Update for EA Additional Signing Algo for Private Key JWT Okta and OIDC#993
avanscoy wants to merge 1 commit intomainfrom
feat/docs-5084

Conversation

@avanscoy
Copy link
Copy Markdown
Contributor

Description

Private Key JWT for Okta and OIDC connections release

References

Testing

Checklist

  • I've read and followed CONTRIBUTING.md.
  • I've tested the site build for this change locally.
  • I've made appropriate docs updates for any code or config changes.
  • I've coordinated with the Product Docs and/or Docs Management team about non-trivial changes.

@avanscoy avanscoy added the main-docs Changes related to auth0's main docs (https://auth0.com/docs) label Apr 20, 2026
@avanscoy avanscoy requested a review from a team as a code owner April 20, 2026 21:30
@avanscoy avanscoy added the DO NOT MERGE Only the PR author should merge, even if approved. label Apr 20, 2026
@mintlify
Copy link
Copy Markdown
Contributor

mintlify Bot commented Apr 20, 2026

Preview deployment for your docs. Learn more about Mintlify Previews.

Project Status Preview Updated (UTC)
auth0 🟢 Ready View Preview Apr 20, 2026, 9:37 PM

💡 Tip: Enable Workflows to automatically generate PRs for you.

@github-actions
Copy link
Copy Markdown

Summary

Status Count
🔍 Total 77
✅ Successful 9
⏳ Timeouts 0
🔀 Redirected 2
👻 Excluded 65
❓ Unknown 0
🚫 Errors 1
⛔ Unsupported 0

Errors per input

Errors in main/docs/get-started/applications/configure-private-key-jwt.mdx

Redirects per input

Redirects in main/docs/get-started/applications/configure-private-key-jwt.mdx

Redirects in main/docs/get-started/authentication-and-authorization-flow/authenticate-with-private-key-jwt.mdx

* Set **Communication Channel** to **Back Channel**.
* Set **Authentication Method** to **Private Key JWT**.
5. Select **Save** at the bottom of the screen.
6. On the confirmation popup, select **Change** to implement your modifications.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This confirmation popup was brought back, should this remain?

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes - the popup is still there

Image

| `token_endpoint_auth_method` | Set this property to `private_key_jwt`.<br/><br/>**Notes:**<ul><li> By default, this property is set to `client_secret_post`. </li><li>Errors may occur if this property is set to a value other than `private_key_jwt` or `client_secret_post`.</li></ul> |
| `token_endpoint_auth_signing_alg` | Set this property to `RS256`.<br/><br/>**Notes:** <ul><li>This feature does not currently support additional algorithms.</li><li>Omitting this property will default its value to `RS256`.</li></ul> |
| `token_endpoint_auth_method` | Authentication method used at the identity provider's token endpoint. Set to `private_key_jwt` to use a signed JWT assertion for enhanced security, or `client_secret_post` to send credentials in the request body. Defaults to `client_secret_post`. Applicable to `oidc` and `okta` strategies only. |
| `token_endpoint_auth_signing_alg` | Optional. Algorithm used to sign client assertions. Accepted values: `RS256`, `RS384`, `RS512`, `PS256`, `PS384`, `ES256`, `ES384`. Defaults to `RS256` if not set. Switching between RSA/PS (`RS*`, `PS*`) and EC (`ES*`) algorithm families requires generating a new signing key pair. Applicable to `oidc` and `okta` strategies only. |
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Switching between RSA/PS (RS*, PS*) and EC (ES*) algorithm families requires generating a new signing key pair.

Key generation happens automatically on our end and the customer need not take any action - this sentence can be removed.

| `token_endpoint_auth_method` | Authentication method used at the identity provider's token endpoint. Set to `private_key_jwt` to use a signed JWT assertion for enhanced security, or `client_secret_post` to send credentials in the request body. Defaults to `client_secret_post`. Applicable to `oidc` and `okta` strategies only. |
| `token_endpoint_auth_signing_alg` | Optional. Algorithm used to sign client assertions. Accepted values: `RS256`, `RS384`, `RS512`, `PS256`, `PS384`, `ES256`, `ES384`. Defaults to `RS256` if not set. Switching between RSA/PS (`RS*`, `PS*`) and EC (`ES*`) algorithm families requires generating a new signing key pair. Applicable to `oidc` and `okta` strategies only. |
| `id_token_signed_response_algs` | Optional. List of algorithms allowed to verify ID tokens issued by the identity provider. When set, Auth0 rejects ID tokens signed with any algorithm not in this list. Accepted values: `RS256`, `RS384`, `RS512`, `PS256`, `PS384`, `ES256`, `ES384`. If not set, Auth0 accepts ID tokens signed with any supported algorithm. Applicable to `oidc` and `okta` strategies only. |
| `token_endpoint_jwtca_aud_format` | Optional. Specifies the format of the `aud` (audience) claim in the JWT used for client authentication at the token endpoint. Set to `issuer` to use the OIDC issuer URL, or `token_endpoint` to use the token endpoint URL. |
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

token_endpoint is the default behavior.

| `type` | Set this property to `back_channel`. |
| `token_endpoint_auth_method` | Set this property to `private_key_jwt`.<br/><br/>**Notes:** <ul><li> Errors may occur if this property is set to a value other than `private_key_jwt` or `client_secret_post`. </li></ul> |
| `token_endpoint_auth_method` | Authentication method used at the identity provider's token endpoint. Set to `private_key_jwt` to use a signed JWT assertion for enhanced security, or `client_secret_post` to send credentials in the request body. Defaults to `client_secret_post`. Applicable to `oidc` and `okta` strategies only. |
| `token_endpoint_auth_signing_alg` | Optional. Algorithm used to sign client assertions. Accepted values: `RS256`, `RS384`, `RS512`, `PS256`, `PS384`, `ES256`, `ES384`. Defaults to `RS256` if not set. Switching between RSA/PS (`RS*`, `PS*`) and EC (`ES*`) algorithm families requires generating a new signing key pair. Applicable to `oidc` and `okta` strategies only. |
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Switching between RSA/PS (RS*, PS*) and EC (ES*) algorithm families requires generating a new signing key pair.

Same comment as above applies about not needing this sentence.

| `type` | Set this property to `back_channel`. |
| `token_endpoint_auth_method` | Set this property to `private_key_jwt`.<br/><br/>**Notes:**<ul><li> By default, this property is set to `client_secret_post`. </li><li>Errors may occur if this property is set to a value other than `private_key_jwt` or `client_secret_post`.</li></ul> |
| `token_endpoint_auth_signing_alg` | Set this property to `RS256`.<br/><br/>**Notes:** <ul><li>This feature does not currently support additional algorithms.</li><li>Omitting this property will default its value to `RS256`.</li></ul> |
| `token_endpoint_auth_signing_alg` | Set this property to `RS256`, `RS512`, `PS256`, `PS384`, `ES256`, or `ES384`.<br/><br/>Omitting this property will default its value to `RS256`.|
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it worthwhile to mention token_endpoint_jwtca_aud_format here too?

* With RS256, if the private key is compromised, you can implement key rotation without having to re-deploy your application or API with the new secret (which you would have to do if using HS256).

<Callout icon="file-lines" color="#0EA5E9" iconType="regular">
If you are configuring Private Key JWT Authentication with an Okta or OpenID Connection (OIDC) enterprise connection, you may have to choose an [additional signing algorithms](/docs/authenticate/enterprise-connections/private-key-jwt-client-auth#configure-private-key-jwt-client-authentication).
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
If you are configuring Private Key JWT Authentication with an Okta or OpenID Connection (OIDC) enterprise connection, you may have to choose an [additional signing algorithms](/docs/authenticate/enterprise-connections/private-key-jwt-client-auth#configure-private-key-jwt-client-authentication).
If you are configuring Private Key JWT Authentication with an Okta or OpenID Connection (OIDC) enterprise connection, you may have to choose [additional signing algorithms](/docs/authenticate/enterprise-connections/private-key-jwt-client-auth#configure-private-key-jwt-client-authentication).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

DO NOT MERGE Only the PR author should merge, even if approved. main-docs Changes related to auth0's main docs (https://auth0.com/docs)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants