- Set the
compliance_levelproperty to the desired profile, eitherfapi1_adv_pkj_par,fapi1_adv_mtls_par,fapi2_sp_pkj_mtls, orfapi2_sp_mtls_mtls - Either Configure mTLS (including mTLS aliases) or Configure Private Key JWT
- Configure mTLS Token Binding
- Configure Pushed Authorization Requests
- Ensure the
oidc_conformantproperty is set totruefor any clients used for the test. This is the default value for clients created with the Auth0 Dashboard.
- Ensure Auth0 prompts users for consent
- Configure supported ACR claims for the tenant
- Remove the alg property from JWKS endpoint
- Add Action to require scope and redirect_uri
- (FAPI2 profiles only) Ensure
issclaim is returned in responses
Ensure Auth0 prompts users for consent
You will need to ensure that Auth0 prompts users for consent. You may skip this step if the client is configured as a first-party app, and the or API supports skipping consent for first-party apps. To ensure Auth0 requests users for consent, set theis_first_party property on the client to false:
Configure supported ACR claims for the tenant
The FAPI tests pass a required ACR value ofurn:mace:incommon:iap:silver. To include the required ACR value in the , add urn:mace:incommon:iap:silver to the list of supported ACR values for the tenant:
Remove the alg property from JWKS endpoint
To allow for keys to be used with multiple algorithms, not just RS256, remove the tenant’salg property from the output of the /.well-known/jwks.json endpoint:
Add Action to require scope and redirect_uri
By default, Auth0 allows requests without a scope, assuming theopenid scope if no scope is present. Auth0 also allows requests without a redirect_uri, which you can set in Actions. However, the FAPI conformance tests require Auth0 to be more restrictive.
Add the following Action to enforce the necessary restrictions on scope and redirect_uri:
(FAPI2 profiles only) Ensure iss claim is returned in responses
The FAPI 2.0 Security Profile requires that the iss parameter is returned in authorization responses according to RFC9207. For compatibility reasons, Auth0 does not do this by default. To enable this behaviour, set the authorization_response_iss_parameter_supported property in tenant settings to true.