Traditionally, the Implicit Flow was used by applications that were incapable of securely storing secrets. Using this flow is no longer considered a best practice for requesting ; new implementations should use Authorization Code Flow with PKCE. However, when used with Form Post response mode, Implicit Flow does offer a streamlined workflow if the application needs only an to perform user authentication; in these cases, it would be used as part of the Hybrid Flow. will no longer be returned when using the Implicit Flow for authentication. In addition, the OIDC-conformant pipeline affects the Implicit Flow in the following areas: authentication request, authentication response, ID token structure, and access token structure.Documentation Index
Fetch the complete documentation index at: https://docs-staging.auth0-mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Authentication request
Legacy
device parameter is only needed if requesting a refresh token by passing the offline_access scope. To learn more, read Refresh Tokens.
OIDC-conformant
response_typeindicates that we want to receive both an access token and ID token.- Refresh tokens are not allowed in the implicit grant. Use
prompt=noneinstead. To learn more read Configure Silent Authentication. favorite_coloris no longer a valid scope.audienceis optional.noncemust be a cryptographically secure random string. To learn more, read Mitigate Replay Attacks When Using the Implicit Flow.
Authentication response
Legacy
- The returned access token is valid for calling the
/userinfoendpoint. - A refresh token will be returned only if a
deviceparameter was passed and theoffline_accessscope was requested.
OIDC-conformant
- The returned access token is valid for calling the
/userinfoendpoint (provided that the API specified by theaudienceparam usesRS256as signing algorithm) and optionally the specified by theaudienceparameter. - If using
response_type=id_token, Auth0 will only return an ID token. Refresh Tokens are not allowed in the implicit grant. Useprompt=noneinstead.
ID token structure
Legacy
OIDC-conformant
- The
favorite_colorclaim must be namespaced and added through a rule. To learn more, read Create Namespaced Custom Claims. - After validating the ID token, the application must validate the to mitigate replay attacks.
Access token structure (optional)
Legacy
HTTP
/userinfo endpoint.
OIDC-conformant
- The returned access token is a valid for calling the
/userinfoendpoint (provided that the API specified by theaudienceparam usesRS256as signing algorithm) as well as the resource server specified by theaudienceparameter. - An opaque access token could still be returned if
/userinfois the only specified .