name: setup-idp-auth0 description: Add Auth0 identity setup guidance and boundary-specific scaffolding for repositories that directly integrate with Auth0.
setup-idp-auth0 command
Shared guidance reads in this workflow refer to files under /home/tachiiri/.guide/.
Applies To
- BFF repositories that terminate browser login or validate Auth0-issued tokens
- Electron repositories that perform desktop login flows
- Frontend repositories only when they own Auth0 browser-login initiation details without token termination
- Gateway or adapter repositories only when they directly validate Auth0-issued credentials at their own boundary
Does Not Apply To
- Repositories that receive only normalized internal principal context
- Gateway or adapter repositories that do not directly terminate or validate Auth0 credentials
- Repositories that only consume downstream authorization results
Workflow
- Read
profiles/identity/auth0.md - Read
principles/domains/identity-and-access.md - Read
principles/domains/interaction-edges.md - Read the role document that matches the repository when relevant:
principles/roles/bff.mdprinciples/roles/electron.mdprinciples/roles/front.mdprinciples/roles/gateway.mdwhen a gateway directly validates Auth0-issued credentialsprinciples/roles/adapter.mdwhen an adapter directly validates Auth0-issued credentials
- Verify working tree is clean
- Classify whether the repository directly terminates, exchanges, refreshes, initiates, or validates Auth0-issued credentials
- Stop with an explanation if the repository does not directly integrate with Auth0
- Prepare a single consolidated input checklist for the human before making repository changes
- Prepare a single consolidated manual Auth0 console checklist so the human can complete it in one pass
- Add minimal Auth0-related scaffolding only for the direct boundary in scope
- Add only the concrete placeholders and validation needed for the repository boundary
- Run the repository's standard validation commands
- Commit the setup changes
Required Inputs From Human
- Auth0 tenant or domain
- expected issuer or issuer family
- expected audience or API identifier
- application type in Auth0
- login callback URLs
- logout or post-logout URLs if applicable
- claims mapping inputs needed for
tenant_id,actor_id,actor_type, andsubject_id - session mode or token mode at the repository boundary
- support or ops access flow if applicable
Manual Auth0 Console Steps
- Create or identify the Auth0 application or API resource for the repository boundary
- Configure callback, logout, and allowed origin URLs in one pass
- Configure application type and grant types
- Configure RBAC, permissions, roles, or custom claims sources if required
- Confirm issuer and audience values to be copied into repository placeholders
- Create or retrieve client credentials or secrets only for the boundary that needs them
- Record the exact human-provided values before returning to repository changes
Common Automated Changes
- Add configuration placeholders only for:
- issuer
- audience
- claims mapping inputs
- session or token handling mode
- Add only the minimal scaffold needed for token validation, session handling, or login initiation at the repository boundary
- Keep all additions aligned with:
- browser login through BFF when a BFF exists
authorization_codewith PKCE for browser and desktop interactive loginclient_credentialsfor machine-to-machine flows
- Do not add Auth0 awareness to repositories that only consume normalized internal principal context
BFF
- Apply when the repository terminates browser login, exchanges authorization codes, validates Auth0 tokens, or creates first-party browser sessions
- Add callback and logout route placeholders only if the BFF owns them
- Add session configuration placeholders only if the BFF owns browser session issuance
- Normalize verified Auth0 claims into the internal principal shape before forwarding downstream
Electron
- Apply when the repository performs desktop interactive login or refreshes desktop credentials
- Add PKCE-oriented desktop login placeholders
- Add secure-storage integration placeholders for refresh-capable credentials
- Keep token refresh and revocation logic out of renderer-facing surfaces
Front
- Apply only when the repository owns login initiation details without terminating Auth0 tokens
- Add login-initiation placeholders only
- Do not add token validation, secret handling, or long-lived credential storage to the frontend
Gateway And Adapter Exceptions
- Apply only when the repository directly validates Auth0-issued credentials at its own boundary
- Keep the setup limited to direct validation requirements
- Do not make gateway or adapter repositories Auth0-aware by default
Verification
- Verify issuer and audience placeholders match the human-provided Auth0 values
- Verify the repository boundary matches the selected role section
- Verify browser repos do not bypass BFF session termination when a BFF exists
- Verify token or session handling does not leak raw provider tokens across internal boundaries
- Run the repository's standard validation commands
Constraints
- Do not make gateway or adapter repositories Auth0-aware by default
- Do not bypass BFF as the browser authentication termination point when a BFF exists
- Do not add provider-specific values into shared
principles/ - Do not invent repository-local auth flows that conflict with
profiles/identity/auth0.md - Do not use npm