This section contains some advice on how to configure your client if you would like to test your solution using the OpenID FAPI Conformance Tests. To pass the FAPI Conformance Tests, first configure the following:Documentation Index
Fetch the complete documentation index at: https://docs-staging-quickstart-revamp.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
- Set the
compliance_levelproperty to the desired profile, eitherfapi1_adv_pkj_parorfapi1_adv_mtls_par - Either Configure mTLS (including mTLS aliases) or Configure Private Key JWT
- Configure mTLS Token Binding
- Ensure Auth0 prompts users for consent
- Configure supported ACR claims for the tenant
- Remove the alg property from JWKS endpoint
- Add Action to require scope and redirect_uri
Ensure Auth0 prompts users for consent
You will need to ensure that Auth0 prompts users for consent. You may skip this step if the client is configured as a first-party app, and the or API supports skipping consent for first-party apps. To ensure Auth0 requests users for consent, set theis_first_party property on the client to false:
Configure supported ACR claims for the tenant
The FAPI tests pass a required ACR value ofurn:mace:incommon:iap:silver. To include the required ACR value in the , add urn:mace:incommon:iap:silver to the list of supported ACR values for the tenant:
Remove the alg property from JWKS endpoint
To allow for keys to be used with multiple algorithms, not just RS256, remove the tenant’salg property from the output of the /.well-known/jwks.json endpoint:
Add Action to require scope and redirect_uri
By default, Auth0 allows requests without a scope, assuming theopenid scope if no scope is present. Auth0 also allows requests without a redirect_uri, which you can set in Actions. However, the FAPI conformance tests require Auth0 to be more restrictive.
Add the following Action to enforce the necessary restrictions on scope and redirect_uri: