Auth0.AuthenticationApi 7.0.0-beta1

Prefix Reserved
This is a prerelease version of Auth0.AuthenticationApi.
There is a newer version of this package available.
See the version list below for details.
dotnet add package Auth0.AuthenticationApi --version 7.0.0-beta1                
NuGet\Install-Package Auth0.AuthenticationApi -Version 7.0.0-beta1                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Auth0.AuthenticationApi" Version="7.0.0-beta1" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Auth0.AuthenticationApi --version 7.0.0-beta1                
#r "nuget: Auth0.AuthenticationApi, 7.0.0-beta1"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Auth0.AuthenticationApi as a Cake Addin
#addin nuget:?package=Auth0.AuthenticationApi&version=7.0.0-beta1&prerelease

// Install Auth0.AuthenticationApi as a Cake Tool
#tool nuget:?package=Auth0.AuthenticationApi&version=7.0.0-beta1&prerelease                

Auth0 .NET SDK

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net452 is compatible.  net46 was computed.  net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (19)

Showing the top 5 NuGet packages that depend on Auth0.AuthenticationApi:

Package Downloads
Auth0Net.DependencyInjection

Dependency Injection, HttpClientFactory & ASP.NET Core extensions for Auth0.NET

Ark.Tools.AspNetCore.Auth0

Extensions of Auth0 for AspNetCore

SoftwarePioniere.Fx.Auth0

Package Description

Ark.Tools.Auth0

Extensions of Auth0

Hood.Core

Package Description

GitHub repositories (1)

Showing the top 1 popular GitHub repositories that depend on Auth0.AuthenticationApi:

Repository Stars
auth0/auth0.net
.NET client for the Auth0 Authentication & Management APIs.
Version Downloads Last updated
7.30.0 21,568 11/28/2024
7.29.0 213,893 11/11/2024
7.28.0 94,483 10/25/2024
7.27.0 83,034 9/30/2024
7.26.2 1,046,936 4/24/2024
7.26.1 732,338 1/11/2024
7.26.0 78,356 12/21/2023
7.25.1 39,930 12/14/2023
7.25.0 52,800 12/4/2023
7.24.0 212,976 11/8/2023
7.23.1 111,024 10/25/2023
7.23.0 24,784 10/19/2023
7.22.3 234,158 8/29/2023
7.22.2 82,831 8/14/2023
7.22.1 73,238 7/28/2023
7.22.0 41,674 7/19/2023
7.21.1 12,362 7/13/2023
7.21.0 164,247 6/21/2023
7.20.0 248,023 5/20/2023
7.19.1 107,530 5/8/2023
7.19.0 384,737 3/13/2023
7.18.0 531,786 1/24/2023
7.17.4 1,080,330 10/17/2022
7.17.3 112,737 10/3/2022
7.17.2 158,890 9/13/2022
7.17.1 43,432 9/7/2022
7.17.0 333,108 7/26/2022
7.16.1 52,007 7/12/2022
7.16.0 474,204 5/3/2022
7.15.0 667,391 3/6/2022
7.14.0 214,937 2/15/2022
7.13.0 9,818 2/14/2022
7.12.1 231,729 1/10/2022
7.12.0 326,662 10/27/2021
7.11.0 70,261 10/12/2021
7.10.0 690,245 8/31/2021
7.9.0 48,502 8/24/2021
7.8.1 203,157 7/7/2021
7.8.0 820,183 4/2/2021
7.7.0 41,128 3/23/2021
7.6.1 30,438 3/12/2021
7.6.0 129,545 2/15/2021
7.5.1 76,197 2/2/2021
7.5.0 47,144 1/21/2021
7.4.0 109,807 12/11/2020
7.3.2 48,332 11/13/2020
7.3.1 4,617 11/12/2020
7.3.0 60,708 10/23/2020
7.2.0 62,793 10/9/2020
7.1.0 121,841 9/2/2020
7.0.9 229,453 6/24/2020
7.0.8 180,436 5/11/2020
7.0.7 25,479 4/24/2020
7.0.6 2,044 4/23/2020
7.0.5 15,219 4/20/2020
7.0.4 334,002 4/1/2020
7.0.3 12,806 3/30/2020
7.0.2 65,727 3/9/2020
7.0.1 105,495 2/12/2020
7.0.0 32,570 1/30/2020
7.0.0-beta2 1,431 1/16/2020
7.0.0-beta1 14,539 12/10/2019
6.5.6 403,444 1/13/2020
6.5.5 188,427 12/6/2019
6.5.4 486,342 10/4/2019
6.5.3 81,362 9/3/2019 6.5.3 has at least one vulnerability with high severity.
6.5.2 23,621 8/27/2019 6.5.2 has at least one vulnerability with high severity.
6.5.1 4,603 8/22/2019 6.5.1 has at least one vulnerability with high severity.
6.5.0 21,032 8/19/2019 6.5.0 has at least one vulnerability with high severity.
6.4.0 179,387 7/23/2019 6.4.0 has at least one vulnerability with high severity.
6.3.0 77,845 6/14/2019 6.3.0 has at least one vulnerability with high severity.
6.2.0 118,851 5/23/2019 6.2.0 has at least one vulnerability with high severity.
6.1.0 20,155 5/8/2019 6.1.0 has at least one vulnerability with high severity.
6.0.0 220,246 4/2/2019 6.0.0 has at least one vulnerability with high severity.
5.11.0 374,359 1/23/2019 5.11.0 has at least one vulnerability with high severity.
5.10.0 220,157 8/30/2018 5.10.0 has at least one vulnerability with high severity.
5.9.0 124,782 8/1/2018 5.9.0 has at least one vulnerability with high severity.
5.8.0 49,581 7/26/2018 5.8.0 has at least one vulnerability with high severity.
5.7.0 126,770 7/9/2018
5.6.0 101,224 6/18/2018
5.5.0 136,405 6/4/2018
5.4.0 6,288 5/28/2018
5.3.1 10,766 5/7/2018
5.3.0 10,798 4/24/2018
5.2.0 3,974 4/18/2018
5.1.0 30,624 3/30/2018
5.0.0 14,703 3/28/2018
5.0.0-beta1 1,452 3/23/2018
4.3.1 287,681 1/10/2018
4.3.0 4,628 1/8/2018
4.2.0 241,246 6/12/2017
4.1.0 20,253 4/26/2017
4.0.0 5,204 4/24/2017
4.0.0-beta1 2,426 1/13/2017
3.7.0 197,048 1/9/2017
3.6.0 134,247 11/28/2016
3.5.0 21,845 10/21/2016
3.4.1 5,501 10/4/2016
3.4.0 2,491 9/27/2016
3.3.0 38,478 8/16/2016
3.2.1 5,686 7/21/2016
3.2.0 64,302 6/30/2016
3.2.0-beta1 1,382 6/30/2016
3.1.1 7,661 5/20/2016
3.1.0 6,433 3/21/2016
3.0.0 2,154 3/2/2016
3.0.0-beta1 1,375 3/2/2016
2.2.1 3,041 2/24/2016
2.2.0 1,815 2/23/2016
2.1.3 1,689 2/22/2016
2.1.2 1,822 2/10/2016
2.1.1 1,671 2/10/2016
2.1.0 1,676 2/5/2016
2.0.0 7,093 1/5/2016
2.0.0-beta1 1,421 12/15/2015

Version 7.0.0-beta.1
     Many breaking changes. A migration guide will be produced while the beta runs and
     made available before GA.  The summary is:

     - Authentication SDK includes all-new ID Token Validation which will now validate H256.
       - If your app is configured for HS256 and is confidential such as a web server then you will
         need to set SigningAlgorithm to SigningAlgorithm.HS256 on your AuthenticationApiClient requests.
       - If your app is configured for HS256 and is NOT confidential such as a native client you should
         reconfigure your app for RS256 as soon as possible.
       - If your app is configured for RS256 no changes are required.  JWKS caches are now only valid for
         10 minutes and will not cache the JWKS keys indefinitely.

     - Improved testing and mocking support. You can now mock IAuthenticationConnection and/or
       IManagementConnection classes to provide local unit-testing functionality against
       AuthenticationApiClient and ManagementApiClient respectively.  Each has just two methods that can be
       mocked - one for GET and one for other HTTP verbs.

     - Many classes moved namespace especially ones that were in "Core" as part of the long-term plan to
       only have AuthenticationApi and ManagementApi packages.  Visual Studio should be able to suggest where
       classed you were using now reside.

     - Disposal is now more consistent. If an AuthenticationApiClient or ManagementApiClient create a
       connection for you they will manage its lifecycle. If you pass in a connection then it will be your
       responsibility to manage it. This also applies to how HttpClientAuthenticationConnection and
       HttpClientManagementConnection will only dispose of HttpClients they create and not ones they are given.

     - Rate Limiting information is now only available on the RateLimitApiException which is raised when
       the rate limit is exceeded.
       
     - ApiException is now ErrorApiException. If you relied on the status code or error message of this exception
       you will need to switch to catching the later. The former is now a base class without this information
       that ensures any old catch ApiException will continue to catch rate limit exceptions which also now
       inherit from this class.

     - Microsoft recommend HttpClient is reused as much as possible.  Therefore you should use dependency
       injection or inversion of control to ensure that either a single instance of AuthenticationApiClient /
       ManagementApiClient or it's connections HttpClient*Connection are create to ensure sharing.  These
       classes are now thread-safe. You can additionally share HttpClient objects between them if you wish
       by injecting it into the HttpClient*Connection constructor.      

     -
     Version 6.5.5
     - Signup API result now handles custom databases returning variations of "id" name
     - Fix EnrollmentAuthMethod.Authenticator enum name
     - ClientBase now has property for `initiate_login_uri`

     Version 6.5.4
     - SECURITY FIX for CVE-2019-16929. See
       https://github.com/auth0/auth0.net/blob/master/SECURITY-NOTICE.md#idtokenvalidator-public for more details.

     Version 6.5.3
     WARNING: If you generate tokens in your project via System.IdentityModel.Tokens.Jwt
     please read the important notice at https://github.com/auth0/auth0.net/issues/300

     - Upgraded System.IdentityModel.Tokens.Jwt to 5.5 to fix incompatible kid
     - Upgraded Microsoft.IdentityModel.Protocols.OpenIdConnect to 5.5
     - Add ClientId to VerifyEmailJobRequest
     - Updated all test dependencies (xunit, FluentAssertions, .NET Test SDK)
     - Removed unused Console Workbench project

     Version 6.5.2
     - UserClient.GetEnrollments now correctly passes user id.

     Version 6.5.1
     - User and role permissions endpoints in UsersClient and RolesClient paging fix.

     Version 6.5.0
     - Assembly is now strong-name-signed so it can be used by other strong-name-signed packages.
     - NOTE: This is code signing only using a non-secret key. It is not authenticode or tamper protection.
     - User and role permissions endpoints in UsersClient and RolesClient now correctly honoring paging.
     - User model optional fields (CreatedAt, UpdatedAt, LastLogin) are now nullable.

     Version 6.4.0
     - TenantSettings lifetimes are now double not integer.
     - Added various Guardian-related endpoints on UserClient.

     Version 6.3.0
     - Missing Tenant settings now available (device flow, Guardian MFA, Change Password, flags etc.

     Version 6.2.0
     - Added client_id to GetDeviceCredentials response
     - Added various user properties to UserUpdateRequest

     Version 6.1.0
     - New user permission endpoints added to UsersClient
     - New role permission endpoints added to RolesClient
     - AuthenticationApiClient now implements IDisposable to dispose ApiConnection and HttpClient
     - Added various new and missing properties to Resource Servers (ResourceServerBase)

     Version 6.0.0
     - New GuardianClient for managing /guardian endpoints
     - New RolesClient for managing /roles endpoints
     - PasswordChangeTicket now has IncludeEmailInRedirect and MailEmailAsVerified
     - ApiConnection now has Dispose to dispose the HttpClient it creates
     - ManagementApiClient now has Dispose to dispose the ApiConnection it creates
     - XML documentation tweaks
     - Dependencies updated

     BREAKING CHANGES
     See our migration guide at https://github.com/auth0/auth0.net/blob/prepare-6.0.0/docs-source/migrating.md

     - All I*Client interfaces have been removed so adding endpoints is no longer breaking
     - IManagementApi interface was removed so adding new clients is no longer breaking
     - All non-paging GetAll methods have been removed
     - DiagnosticsHeader/DiagnosticsComponent are no longer available

     Version 5.11
     - Add TokenLifetimeForWeb to ResourceServerBase
     - Documentation fixes, improvements, sync with portal, remove old v4 breaking changes
     - Changes to await behavior to stop locking in some scenarios
     - Update XUnit dependencies

     Version 5.10
     - Add support for managing custom domains
     - Add AccessTokenSecret property for Twitter identities

     Version 5.9.0
     - Validation of ID Tokens when calling any of the /oauth/token endpoints
     - Expanded properties for the LogEntry class to include all properties returned in the payload
     - Fix issue where Rate Limit headers were not extracted when an error was returned from the API

     Version 5.8.0
     - Add ability to send auth0-forwarded-for header with the Resource Owner Password grant
     - Fix issue with incorrect escaping of data strings in URLs
     - Add extra application types for the Clients-related endpoints
     - Adds server time to API Info to more accurately determine time to rate limit resets

     Version 5.7.0
     - Add pagination methods for Client Grants, Resource Servers and Rules
     - Made all pagination methods consistent by introducing Get*Request and PaginationInfo classes
     - Allow passing HttpClient to constuctor of AuthenticationApiClient and ManagementApiClient so you can manage lifetime outside of the Auth0 classes. Thank you @davidallyoung!
     - Updated LoginRequestQuery with additional fields passed from rules

     Version 5.6.0
     - Add GetLastApiInfo() to IAuthenticationApiClient

     Version 5.5.0
     - Adds paging when returning a list Clients and connections

     Version 5.4.0
     - Change in Target Frameworks. Now targets .NET 4.5.2 (and higher), .NET Standard 1.1 and .NET Standard 2.0. Along with this made changes to how System.Net.Http is referenced.

     Version 5.3.1
     - Fix RelayState parameter casing (#186)

     Version 5.3
     - Fix issue with deserialization of user log entries (#184)

     Version 5.2
     - Allow management of email templates
     - [BREAKING CHANGE] Fixed bug when specifying SMTP provider port. Data type was changed from string to int?

     Version 5.1
     - Allow specifying metadata for connections

     Version 5.0
     - Update to remove methods for endpoints related to 1 April 2018 deprecations
     - Various small additions to models for Management API