-
Notifications
You must be signed in to change notification settings - Fork 405
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[SDK-3887] Always honor auth0Logout config #1104
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎ 1 Ignored Deployment
|
@adamjmcgrath is there a way to set |
Hi @blakeplumb - how did |
@adamjmcgrath - I work with Blake. We are currently using @auth0/nextjs-auth0 because it gives us great support for doing OAuth2 auth in NextJS but we are using Okta as our Identity provider. When we go to logout it passes |
Hi @KentDi801 - we should have an environment variable for auth0logout, so you can set it to false. Will add a PR for that shortly. |
@KentDi801 @blakeplumb the |
@adamjmcgrath thank you for the quick response on this. |
See auth0/express-openid-connect#447
Description
The OIDC RP Initiated Logout endpoint is incompatible with Auth0's proprietary logout. Make sure this SDK does not use it if
auth0Logout
is configured and anend_session_endpoint
is Discovered in the OIDC Discovery document.Testing
If
auth0Logout
is true -> use v2/logout regardless of discoveryIf
auth0Logout
is false -> use discovered endpoint or nothingIf
auth0Logout
is not set -> use v2/logout regardless of discovery (this is different from express as this is an auth0 SDK)Checklist