You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/includes/callapi.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ You have two options: (a) use the same client id and secret for both your applic
7
7
8
8
### <i class="icon icon-html5" style="margin-right: 10px;font-size: 25px;"></i> Single Page Applications / HTML5 JavaScript Front End
9
9
10
-
The `JWT` is available on the location hash of the browser as the `id_token` parameter. You probably want to store it in local/session storage or a cookie `auth0.parseHash(window.location.hash, ...)`. <a href="singlepageapp-tutorial" target="_new">Read more...</a>
10
+
The `JWT` is available on the location hash of the browser as the `id_token` parameter. You probably want to store it in local/session storage or a cookie `auth0.getProfile(window.location.hash, ...)`. <a href="singlepageapp-tutorial" target="_new">Read more...</a>
11
11
12
12
### <i class="icon icon-mobile-phone" style="margin-right: 10px;font-size: 30px;"></i> Native Mobile Applications
*__showForgot__: Show/Hide the "Forgot your password?" link. Default: true.
55
55
*__showSignup__: Show/Hide the "Sign Up" link. Default: true.
56
+
*__enableReturnUserExperience__: Show the account used last time the user signed in. Default: `true`.
56
57
*__userPwdConnectionName__: Specify which Database/AD-LDAP connection should be used with the Email/Password fields. Default: the first Database connection found (if it exists) or the first AD-LDAP connection found.
57
58
*__username_style__: Specify the format of the username. Options: `email` or `username`.
Copy file name to clipboardExpand all lines: docs/singlepageapp-tutorial.md
+1-11Lines changed: 1 addition & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,8 +12,6 @@
12
12
13
13
@@sdk2WithCallbackOnHash@@
14
14
15
-
> Ignore the `callbackOnLocationHash` option and the `widget.parseHash` method if you are using the <atarget="_new"href="https://github.com/auth0/auth0-aspnet-owin">Auth0-ASPNET-Owin</a> nuget package (use `@ClaimsPrincipal.Current.FindFirst("id_token").Value` instead).
16
-
17
15
### 3. Validate the JsonWebToken on the server
18
16
19
17
Auth0 returns a standard [JSON Web Token](http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-12) in the browser location hash (http://yourapp#id_token=...). This token should be sent to the backend APIs to be validated in the `Authorization` header.
@@ -31,12 +29,4 @@ This sample code sends the JSON Web Token on each call:
31
29
32
30
> Setting the cookie on the client-side using this method requires [jQuery.Cookie](https://github.com/carhartl/jquery-cookie).
33
31
34
-
To validate the token on the server side, we have tutorials for several platforms and languages to get you up and running as quickly as possible:
35
-
36
-
*[ASP.NET Web API](aspnetwebapi-tutorial)
37
-
*[Node.js API](nodeapi-tutorial)
38
-
*[Ruby API](rubyapi-tutorial)
39
-
*[PHP API](phpapi-tutorial)
40
-
41
-
> If your language or platform is not on this list, google for "JWT or JSON Web Token {your platform}". It is likely you will find an implementation. Or let us know: [[email protected]](mailto:[email protected])
42
-
32
+
To validate the token on the server side, we have tutorials for several platforms and languages to get you up and running as quickly as possible. Look at the Web APIs section on the sidebar.
0 commit comments