Documentation Index
Fetch the complete documentation index at: https://auth0-sdk8048.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Use AI to integrate Auth0
Use AI to integrate Auth0
If you use an AI coding assistant like Claude Code, Cursor, or GitHub Copilot, you can add Auth0 authentication automatically in minutes using agent skills.Install:Then ask your AI assistant:Your AI assistant will automatically create your Auth0 application, fetch credentials, and configure mod_auth_openidc. Full agent skills documentation →
System RequirementsThis tutorial and sample project have been tested with the following:
- Apache 2.4
Get Started
This tutorial demonstrates how to configure Apache to add authentication and authorization to your web app. We recommend that you log in to follow this quickstart with examples configured for your account.Install and Enable mod_auth_openidc Module
First, install the
mod_auth_openidc module for Apache.You can get the binaries from GitHub and install them for your OS. If your OS isn’t compatible with any of the binaries, you can still build it from source.Once you’ve installed the module, enable it for Apache with the a2enmod command. To learn more, read a2enmod on Ubuntu Manpage:For Windows, you can use this Powershell script to get
a2enmod working on your system.Configure the Module with Your Auth0 Account Information
Update your new configuration file (
auth_openidc.conf), located in the /etc/apache2/mods-available folder.For Windows, you must use the
/apache/conf/httpd.conf file.Configure Auth0
In the Auth0 Dashboard:
- Go to Applications > Applications, and then select your application from the list.
- Switch to the Settings view, and then locate the Application URIs section.
- Add the value of
OIDCRedirectURIto Allowed Callback URLs. - Locate Advanced Settings at the bottom of the page.
- Switch to the OAuth view.
- Set JSON Web Token (JWT) Signature Algorithm to
RS256.
Authorization
You can configure Apache to protect a specific location based on the value of a claim in the user’s ID token by adding a
Location block to your auth_openidc.conf file.For example, you could create an Action that reads the user’s roles, and then adds a claim that grants access to a protected location:CheckpointExcellent work! If you made it this far, you should now have login, logout, and user profile information running in your application.
Next Steps
This concludes our quickstart tutorial, but there is so much more to explore. To learn more about what you can do with Auth0, check out:- Auth0 Dashboard - Learn how to configure and manage your Auth0 tenant and applications
- Auth0 Marketplace - Discover integrations you can enable to extend Auth0’s functionality