-
Notifications
You must be signed in to change notification settings - Fork 405
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[SDK-3887] Always honor auth0Logout config #1104
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎ 1 Ignored Deployment
|
@adamjmcgrath is there a way to set |
Hi @blakeplumb - how did |
@adamjmcgrath - I work with Blake. We are currently using @auth0/nextjs-auth0 because it gives us great support for doing OAuth2 auth in NextJS but we are using Okta as our Identity provider. When we go to logout it passes |
Hi @KentDi801 - we should have an environment variable for auth0logout, so you can set it to false. Will add a PR for that shortly. |
@KentDi801 @blakeplumb the |
@adamjmcgrath thank you for the quick response on this. |
See auth0/express-openid-connect#447
Description
The OIDC RP Initiated Logout endpoint is incompatible with Auth0's proprietary logout. Make sure this SDK does not use it if
auth0Logout
is configured and anend_session_endpoint
is Discovered in the OIDC Discovery document.Testing
If
auth0Logout
is true -> use v2/logout regardless of discoveryIf
auth0Logout
is false -> use discovered endpoint or nothingIf
auth0Logout
is not set -> use v2/logout regardless of discovery (this is different from express as this is an auth0 SDK)Checklist